JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Label Administration     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information


1.  Labels in Trusted Extensions Software

2.  Planning Labels (Tasks)

3.  Making a Label Encodings File (Tasks)

4.  Labeling Printer Output (Tasks)


6.  Example: Planning an Organization's Labels

Identifying the Site's Label Requirements

Satisfying Information Protection Goals

Trusted Extensions Features That Address Labeling and Access

Climbing the Security Learning Curve

Analyzing the Requirements for Each Label




Names of Groups With NEED_TO_KNOW Label

Understanding the Set of Labels

Defining the Set of Labels

Planning the Classifications

Planning the Compartments

Planning the Use of Words in MAC

Planning the Use of Words in Labeling System Output

Planning Unlabeled Printer Output

Planning for Supporting Procedures

Rules for Protecting a REGISTERED File or Directory

Rules for Configuring Printers

Rules for Handling Printer Output

Planning the Classification Values in a Worksheet

Planning the Compartment Values and Combination Constraints in a Worksheet

Planning the Clearances in a Worksheet

Planning the Printer Banners in a Worksheet

Planning the Channels in a Worksheet

Planning the Minimums in an Accreditation Range

Planning the Colors in a Worksheet

Editing and Installing the label_encodings File

Encoding the Version

Encoding the Classifications

Encoding the Sensitivity Labels

Encoding the Information Labels

Encoding the Clearances

Encoding the Channels

Encoding the Printer Banners

Encoding the Accreditation Range

Encoding the Local Definitions

Encoding the Column Headers in Label Builders

Encoding the Color Names

Configuring Users and Printers for Labels

A.  Sample Label Encodings File


Climbing the Security Learning Curve

The management identifies an experienced administrator with the following qualifications:

That person is assigned the job of security administrator.

Long before installing Trusted Extensions software, the security administrator starts to learn about security and to prepare a plan for the site's security policy. First, the security administrator reads the following documents:

Then, the security administrator starts with a plan for the site's labels. The planning process is described in the following sections.