S
- scripts
- getmounts, How to Display the Labels of Mounted Files
- txzonemgr, How to Display Ready or Running Zones
- /usr/sbin/txzonemgr
- Administration Tools for Trusted Extensions
- Zone Administration Utilities in Trusted Extensions
- secure attention, key combination, How to Regain Control of the Desktop's Current Focus
- security
- initial setup team, Initial Setup Team Responsibilities
- publications, Additional Security References
- root password, Prepare an Installed Oracle Solaris System for Trusted Extensions
- site security policy, Site Security Policy
- Security Administrator role
- administering printer security, Labels, Printers, and Printing
- administering users, Managing Users and Rights (Task Map)
- assigning authorizations to users, How to Create a Rights Profile for Convenient Authorizations
- configuring a device, How to Configure a Device in Trusted Extensions
- creating, How to Create the Security Administrator Role in Trusted Extensions
- creating Convenient Authorizations rights profile, How to Create a Rights Profile for Convenient Authorizations
- creating Trusted Desktop Applets rights profile, How to Limit a User to Desktop Applications
- enabling unlabeled body pages from a public system, How to Modify policy.conf Defaults
- enforcing security, Enforcement of Device Security in Trusted Extensions
- protecting nonallocatable devices, How to Protect Nonallocatable Devices in Trusted Extensions
- security administrators, See Security Administrator role
- security attributes, Routing Table Entries in Trusted Extensions
- modifying defaults for all users, How to Modify policy.conf Defaults
- modifying user defaults, How to Modify Default User Label Attributes
- setting for remote hosts, How to Create Security Templates
- using in routing, How to Add Default Routes
- security information
- on printer output, Labeled Printer Output
- planning for Trusted Extensions, Resolving Additional Issues Before Enabling Trusted Extensions
- security label set, remote host templates, Network Security Attributes in Trusted Extensions
- security mechanisms
- extensible, Extension of Oracle Solaris Security Features by Trusted Extensions
- Oracle Solaris, Security Mechanisms for Oracle Solaris Software
- security policy
- auditing, Trusted Extensions Audit Policy Options
- training users, Users and Security Requirements
- users and devices, Enforcement of Device Security in Trusted Extensions
- security templates
- See remote host templates
- 0.0.0.0/0 wildcard assignment, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- sel_config file, sel_config File
- configuring selection transfer rules, sel_config File
- selecting, audit records by label, Audit Tasks in Trusted Extensions
- Selection Manager, configuring rules for selection confirmer, sel_config File
- Selection Manager application, Rules When Changing the Level of Security for Data
- Service Management Framework (SMF)
- dpadm, Install the Oracle Directory Server Enterprise Edition
- dsadm, Install the Oracle Directory Server Enterprise Edition
- labeld service, Enable Trusted Extensions and Reboot
- session range, Label Ranges
- sessions, failsafe, How to Log In to a Failsafe Session in Trusted Extensions
- Setting Up Remote Administration in Trusted Extensions (Task Map), Configuring and Administering Remote Systems in Trusted Extensions (Task Map)
- sharing, ZFS dataset from labeled zone, How to Share a ZFS Dataset From a Labeled Zone
- Shutdown authorization, How to Create a Rights Profile for Convenient Authorizations
- similarities
- between Trusted Extensions and Oracle Solaris auditing, Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS, Similarities Between Trusted Extensions and the Oracle Solaris OS
- single-label operation, Label Ranges
- single-label printing, configuring for a zone, How to Configure a Zone As a Single-Level Print Server
- site security policy
- common violations, Common Security Violations
- personnel recommendations, Personnel Security Recommendations
- physical access recommendations, Physical Security Recommendations
- recommendations, Computer Security Recommendations
- tasks involved, Site Security Policy
- Trusted Extensions configuration decisions, Site Security Policy and Trusted Extensions
- understanding, Understanding Your Site's Security Policy
- snoop command
- Network Commands in Trusted Extensions
- How to Debug the Trusted Extensions Network
- software
- administering third-party, Software Management in Trusted Extensions (Reference)
- importing, Adding Software to Trusted Extensions
- solaris.print.nobanner authorization
- How to Modify policy.conf Defaults
- How to Suppress Banner and Trailer Pages for Specific Users
- solaris.print.ps authorization, How to Enable Users to Print PostScript Files in Trusted Extensions
- solaris.print.unlabeled authorization, How to Modify policy.conf Defaults
- startup files, procedures for customizing, How to Configure Startup Files for Users in Trusted Extensions
- Stop-A, enabling, How to Change Security Defaults in System Files
- System Administrator role
- administering printers, Labels, Printers, and Printing
- creating, How to Create a System Administrator Role
- reclaiming a device, How to Revoke or Reclaim a Device in Trusted Extensions
- reviewing audit records, Audit Tasks in Trusted Extensions
- system files
- editing, How to Change Security Defaults in System Files
- Oracle Solaris /etc/default/print, How to Enable Users to Print PostScript Files in Trusted Extensions
- Oracle Solaris policy.conf, How to Enable Users to Print PostScript Files in Trusted Extensions
- Trusted Extensions sel_config, sel_config File
- Trusted Extensions tsol_separator.ps, How to Remove Page Labels From All Print Jobs