JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

C

cascade printing, index iconHow to Configure Cascade Printing on a Labeled System
CD-ROM drives
accessing, index iconDevice Protection With Trusted Extensions Software
playing music automatically, index iconHow to Configure an Audio Player Program for Use in Trusted CDE
CDE actions, See actions
Change Password menu item
description, index iconTrusted Extensions Security Features
using to change root password, index iconHow to Change the Password for root
changing
IDLETIME keyword, index iconHow to Modify policy.conf Defaults
labels by authorized users, index iconHow to Enable a User to Change the Security Level of Data
rules for label changes, index iconsel_config File
security level of data, index iconHow to Enable a User to Change the Security Level of Data
Selection Confirmer defaults, index iconsel_config File
system security defaults, index iconHow to Change Security Defaults in System Files
user privileges, index iconHow to Restrict a User's Set of Privileges
Check Encodings action, index iconTrusted CDE Actions
Check TN Files action, index iconTrusted CDE Actions
chk_encodings command, index iconCommand Line Tools in Trusted Extensions
action for invoking, index iconTrusted CDE Actions
choosing, See selecting
classification label component, index iconDominance Relationships Between Labels
clearances, label overview, index iconLabels in Trusted Extensions Software
Clone Zone action, index iconTrusted CDE Actions
colors, indicating label of workspace, index iconWhat Labels Protect and Where Labels Appear
commands
executing with privilege, index iconHow to Enter the Global Zone in Trusted Extensions
troubleshooting networking, index iconHow to Debug the Trusted Extensions Network
trusted_edit trusted editor, index iconHow to Edit Administrative Files in Trusted Extensions
commercial applications, evaluating, index iconSecurity Administrator Responsibilities for Trusted Programs
Common Tasks in Trusted Extensions (Task Map), index iconCommon Tasks in Trusted Extensions (Task Map)
compartment label component, index iconDominance Relationships Between Labels
component definitions, label_encodings file, index iconLabel Encodings File
computer access
administrator responsibilities, index iconInformation Protection
restricting, index iconEffects of Label Range on a Device
Computers and Networks tool
adding known hosts
index iconHow to Add Hosts to the System's Known Network
index iconHow to Assign a Security Template to a Host or a Group of Hosts
modifying tnrhdb database, index iconConfiguring Trusted Network Databases (Task Map)
Computers and Networks tool set, index iconTrusted Extensions Tools in the Solaris Management Console
Configure Device Attributes authorization, index iconHow to Assign Device Authorizations
Configure Selection Confirmation action, index iconTrusted CDE Actions
Configure Zone action, index iconTrusted CDE Actions
configuring
audio device to play music, index iconHow to Configure an Audio Player Program for Use in Trusted CDE
auditing, index iconAudit Tasks of the Security Administrator
authorizations for devices, index iconHow to Create New Device Authorizations
devices, index iconHow to Configure a Device in Trusted Extensions
labeled printing, index iconConfiguring Labeled Printing (Task Map)
routes with security attributes, index iconHow to Configure Routes With Security Attributes
serial line for login, index iconHow to Configure a Serial Line for Logins
startup files for users, index iconHow to Configure Startup Files for Users in Trusted Extensions
trusted network, index iconManaging Networks in Trusted Extensions (Tasks)
Configuring Labeled Printing (Task Map), index iconConfiguring Labeled Printing (Task Map)
Configuring Routes and Checking Network Information in Trusted Extensions (Task Map), index iconConfiguring Routes and Checking Network Information in Trusted Extensions (Task Map)
Configuring Trusted Network Databases (Task Map), index iconConfiguring Trusted Network Databases (Task Map)
controlling, See restricting
.copy_files file
description, index icon.copy_files and .link_files Files
setting up for users
index iconHow to Configure Startup Files for Users in Trusted Extensions
index iconHow to Configure Startup Files for Users in Trusted Extensions
startup file, index iconCommand Line Tools in Trusted Extensions
Copy Zone action, index iconTrusted CDE Actions
Create LDAP Client action, index iconTrusted CDE Actions
creating
authorizations for devices, index iconHow to Create New Device Authorizations
home directories, index iconHome Directory Creation in Trusted Extensions
customizing
device authorizations, index iconHow to Add Site-Specific Authorizations to a Device in Trusted Extensions
label_encodings file, index iconLabel Encodings File
unlabeled printing, index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
user accounts, index iconCustomizing the User Environment for Security (Task Map)
Customizing Device Authorizations in Trusted Extensions (Task Map), index iconCustomizing Device Authorizations in Trusted Extensions (Task Map)
Customizing User Environment for Security (Task Map), index iconCustomizing the User Environment for Security (Task Map)
cut and paste, and labels, index iconRules When Changing the Level of Security for Data
cutting and pasting, configuring rules for label changes, index iconsel_config File