L
- label audit token, label Token
- label_encodings file
- checking, How to Check and Install Your Label Encodings File
- contents, Label Encodings File
- installing, How to Check and Install Your Label Encodings File
- localizing, For International Customers of Trusted Extensions
- modifying, How to Check and Install Your Label Encodings File
- reference for labeled printing, Labeled Printer Output
- source of accreditation ranges, Label Encodings File
- label extensions
- IKE negotiations, Label Extensions for IKE
- IPsec SAs, Label Extensions for IPsec Security Associations
- label ranges
- restricting printer label range, How to Configure a Restricted Label Range for a Printer
- setting on frame buffers, Effects of Label Range on a Device
- setting on printers, Effects of Label Range on a Device
- labeld service, Enable Trusted Extensions and Reboot
- disabling, How to Remove Trusted Extensions From the System
- labeled IPsec, See IPsec
- labeled printing
- PostScript files, How to Enable Users to Print PostScript Files in Trusted Extensions
- removing label, How to Create a Rights Profile for Convenient Authorizations
- removing PostScript restriction, How to Create a Rights Profile for Convenient Authorizations
- without banner page
- How to Create a Rights Profile for Convenient Authorizations
- How to Suppress Banner and Trailer Pages for Specific Users
- Labeled Zone Manager, See txzonemgr script
- labeled zones, See zones
- labeling
- turning on labels, Log In to Trusted Extensions
- zones, How to Create Labeled Zones Interactively
- Labeling Hosts and Networks (Task Map), Labeling Hosts and Networks (Task Map)
- labels
- See also label ranges
- accreditation in tunnel mode, Labels and Accreditation in Tunnel Mode IPsec
- authorizing a user or role to change label of data, How to Enable a User to Change the Security Level of Data
- Change Workspace Label menu item, Unique Trusted Extensions Security Features
- classification component, Dominance Relationships Between Labels
- compartment component, Dominance Relationships Between Labels
- configuring rules for label changes, sel_config File
- default in remote host templates, Network Security Attributes in Trusted Extensions
- described, Trusted Extensions and Access Control
- determining text equivalents, How to Obtain a Readable Label From Its Hexadecimal Form
- displaying in hexadecimal, How to Obtain the Hexadecimal Equivalent for a Label
- displaying labels of file systems in labeled zone, How to Display the Labels of Mounted Files
- dominance, Dominance Relationships Between Labels
- downgrading and upgrading, sel_config File
- extensions for IKE SAs, Label Extensions for IKE
- extensions for IPsec SAs, Label Extensions for IPsec Security Associations
- of processes, What Labels Protect and Where Labels Appear
- of user processes, Label Ranges
- on IPsec exchanges, Labels for IPsec-Protected Exchanges
- on printer output, Labeled Printer Output
- overview, Labels in Trusted Extensions Software
- planning, Devising a Label Strategy
- printing without page labels, How to Remove Page Labels From All Print Jobs
- relationships, Dominance Relationships Between Labels
- repairing in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
- specifying for zones, How to Create Labeled Zones Interactively
- troubleshooting, How to Obtain a Readable Label From Its Hexadecimal Form
- well-formed, Label Ranges
- laptops, planning, Planning for Multilevel Services
- LDAP
- displaying entries, Using the LDAP Naming Service in Trusted Extensions
- managing the naming service, Using the LDAP Naming Service in Trusted Extensions
- naming service for Trusted Extensions, Using a Naming Service in Trusted Extensions
- planning, Planning for the LDAP Naming Service in Trusted Extensions
- starting proxy server, Using the LDAP Naming Service in Trusted Extensions
- starting server, Using the LDAP Naming Service in Trusted Extensions
- stopping proxy server, Using the LDAP Naming Service in Trusted Extensions
- stopping server, Using the LDAP Naming Service in Trusted Extensions
- troubleshooting, How to Debug a Client's Connection to the LDAP Server
- Trusted Extensions databases, Using a Naming Service in Trusted Extensions
- LDAP configuration
- creating client, Make the Global Zone an LDAP Client in Trusted Extensions
- for Trusted Extensions, Configuring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
- NFS servers, and, Configuring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
- LDAP server
- collecting information for, Collect Information for the Directory Server for LDAP
- configuring multilevel port, Configure a Multilevel Port for the Oracle Directory Server Enterprise Edition
- configuring naming service, Install the Oracle Directory Server Enterprise Edition
- configuring proxy for Trusted Extensions clients, Creating a Trusted Extensions Proxy for an Existing Oracle Directory Server Enterprise Edition
- creating proxy for Trusted Extensions clients, Create an LDAP Proxy Server
- installing in Trusted Extensions, Install the Oracle Directory Server Enterprise Edition
- protecting log files, Configure the Logs for the Oracle Directory Server Enterprise Edition
- limiting, defined hosts on the network, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- limiting Trusted Extensions user to desktop use only, Trusted Desktop Applets rights profile, How to Limit a User to Desktop Applications
- .link_files file
- description, .copy_files and .link_files Files
- setting up for users, How to Configure Startup Files for Users in Trusted Extensions
- log files, protecting Directory Server logs, Configure the Logs for the Oracle Directory Server Enterprise Edition
- logging in
- to a home directory server
- How to Enable Users to Access Their Remote Home Directories at Every Label by Logging In to Each NFS Server
- How to Enable Users to Access Their Remote Home Directories by Configuring the Automounter on Each Server
- using ssh command, How to Log In and Administer a Remote Trusted Extensions System
- login
- by roles, Roles in Trusted Extensions
- remote, Enable Remote Administration of a Remote Trusted Extensions System
- logout, requiring, How to Modify policy.conf Defaults