JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

T

tasks and task maps
Additional Trusted Extensions Configuration Tasks, index iconAdditional Trusted Extensions Configuration Tasks
Common Tasks in Trusted Extensions (Task Map), index iconCommon Tasks in Trusted Extensions (Task Map)
Configuring an LDAP Proxy Server on a Trusted Extensions System (Task Map), index iconConfiguring an LDAP Proxy Server on a Trusted Extensions System (Task Map)
Configuring Labeled IPsec (Task Map), index iconConfiguring Labeled IPsec (Task Map)
Configuring Labeled Printing (Task Map), index iconConfiguring Labeled Printing (Task Map)
Configuring LDAP on a Trusted Extensions Network (Task Map), index iconConfiguring LDAP on a Trusted Extensions Network (Task Map)
Creating Labeled Zones, index iconCreating Labeled Zones
Customizing Device Authorizations in Trusted Extensions (Task Map), index iconCustomizing Device Authorizations in Trusted Extensions (Task Map)
Customizing User Environment for Security (Task Map), index iconCustomizing the User Environment for Security (Task Map)
Getting Started as a Trusted Extensions Administrator (Task Map), index iconGetting Started as a Trusted Extensions Administrator (Task Map)
Handling Devices in Trusted Extensions (Task Map), index iconHandling Devices in Trusted Extensions (Task Map)
Labeling Hosts and Networks (Tasks), index iconLabeling Hosts and Networks (Tasks)
Managing Devices in Trusted Extensions (Task Map), index iconManaging Devices in Trusted Extensions (Task Map)
Managing Printing in Trusted Extensions (Task Map), index iconManaging Printing in Trusted Extensions (Tasks)
Managing Users and Rights, index iconManaging Users and Rights (Task Map)
Managing Zones (Task Map), index iconManaging Zones (Task Map)
Reducing Printing Restrictions in Trusted Extensions (Task Map), index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
Setting Up Remote Administration in Trusted Extensions (Task Map), index iconConfiguring and Administering Remote Systems in Trusted Extensions (Task Map)
Task Map: Choosing a Trusted Extensions Configuration, index iconTask Map: Choosing a Trusted Extensions Configuration
Task Map: Configuring Trusted Extensions to Your Site's Requirements, index iconTask Map: Configuring Trusted Extensions to Meet Your Site's Requirements
Task Map: Configuring Trusted Extensions With the Provided Defaults, index iconTask Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Preparing For and Enabling Trusted Extensions, index iconTask Map: Preparing for and Enabling Trusted Extensions
Troubleshooting the Trusted Network (Task Map), index iconTroubleshooting the Trusted Network (Task Map)
Using Devices in Trusted Extensions (Tasks Map), index iconUsing Devices in Trusted Extensions (Task Map)
Viewing Existing Security Templates (Tasks), index iconViewing Existing Security Templates (Tasks)
templates, See remote host templates
text label equivalents, determining, index iconHow to Obtain a Readable Label From Its Hexadecimal Form
tncfg command
creating a multilevel port, index iconHow to Create a Multilevel Port for a Zone
description, index iconNetwork Commands in Trusted Extensions
modifying DOI value, index iconHow to Configure a Different Domain of Interpretation
tnchkdb command, description, index iconNetwork Commands in Trusted Extensions
tnctl command, description, index iconNetwork Commands in Trusted Extensions
tnd command, description, index iconNetwork Commands in Trusted Extensions
tninfo command
description, index iconNetwork Commands in Trusted Extensions
using, index iconHow to Debug a Client's Connection to the LDAP Server
tools, See administrative tools
trailer pages, See banner pages
translation, See localizing
troubleshooting
failed login, index iconHow to Log In to a Failsafe Session in Trusted Extensions
IPv6 configuration, index iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
LDAP, index iconHow to Debug a Client's Connection to the LDAP Server
mounted file systems, index iconHow to Troubleshoot Mount Failures in Trusted Extensions
network, index iconTroubleshooting the Trusted Network (Task Map)
reclaiming a device, index iconHow to Revoke or Reclaim a Device in Trusted Extensions
repairing labels in internal databases, index iconHow to Obtain a Readable Label From Its Hexadecimal Form
Trusted Extensions configuration, index iconTroubleshooting Your Trusted Extensions Configuration
trusted network, index iconHow to Debug the Trusted Extensions Network
verifying interface is up, index iconHow to Verify That a System's Interfaces Are Up
viewing ZFS dataset mounted in lower-level zone, index iconHow to Share a ZFS Dataset From a Labeled Zone
Troubleshooting the Trusted Network (Task Map), index iconTroubleshooting the Trusted Network (Task Map)
trusted applications, in a role workspace, index iconAdministration Tools for Trusted Extensions
Trusted Extensions
See also Trusted Extensions planning
adding, index iconAdd Trusted Extensions Packages to an Oracle Solaris System
decisions to make before enabling, index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
differences from Oracle Solaris administrator's perspective, index iconResults of Enabling Trusted Extensions From an Administrator's Perspective
differences from Oracle Solaris auditing, index iconTrusted Extensions and Auditing
differences from Oracle Solaris OS, index iconDifferences Between Trusted Extensions and the Oracle Solaris OS
disabling, index iconHow to Remove Trusted Extensions From the System
enabling, index iconEnable Trusted Extensions and Reboot
IPsec protections, index iconLabels for IPsec-Protected Exchanges
man pages quick reference, index iconList of Trusted Extensions Man Pages
memory requirements, index iconPlanning System Hardware and Capacity for Trusted Extensions
networking, index iconTrusted Networking (Overview)
planning configuration strategy, index iconForming an Install Team for Trusted Extensions
planning for, index iconPlanning for Security in Trusted Extensions
planning hardware, index iconPlanning System Hardware and Capacity for Trusted Extensions
planning network, index iconPlanning Your Trusted Network
preparing for
index iconPreparing an Oracle Solaris System and Adding Trusted Extensions
index iconResolving Security Issues Before Enabling Trusted Extensions
quick reference to administration, index iconQuick Reference to Trusted Extensions Administration
remote access to display, index iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
results before configuration, index iconResults of Enabling Trusted Extensions From an Administrator's Perspective
similarities with Oracle Solaris auditing, index iconTrusted Extensions and Auditing
similarities with Oracle Solaris OS, index iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
two-role configuration strategy, index iconForming an Install Team for Trusted Extensions
Trusted Extensions configuration
adding network databases to LDAP server, index iconPopulate the Oracle Directory Server Enterprise Edition
changing default DOI value, index iconHow to Configure a Different Domain of Interpretation
databases for LDAP, index iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
division of tasks, index iconInitial Setup Team Responsibilities
evaluated configuration, index iconUnderstanding Your Site's Security Policy
initial procedures, index iconConfiguring Trusted Extensions (Tasks)
initial setup team responsibilities, index iconInitial Setup Team Responsibilities
labeled zones, index iconCreating Labeled Zones
LDAP, index iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
reboot to activate labels, index iconLog In to Trusted Extensions
remote systems, index iconRemote Administration in Trusted Extensions (Tasks)
task maps, index iconConfiguration Roadmap for Trusted Extensions
troubleshooting, index iconTroubleshooting Your Trusted Extensions Configuration
Trusted Extensions network
adding zone-specific nscd daemon, index iconHow to Configure a Separate Name Service for Each Labeled Zone
enabling IPv6 for CIPSO packets, index iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
planning, index iconPlanning Your Trusted Network
removing zone-specific nscd daemon, index iconHow to Configure a Separate Name Service for Each Labeled Zone
Trusted Extensions requirements
Oracle Solaris installation, index iconInstall an Oracle Solaris System Securely
Oracle Solaris installed systems, index iconPrepare an Installed Oracle Solaris System for Trusted Extensions
root password, index iconPrepare an Installed Oracle Solaris System for Trusted Extensions
trusted grab, key combination, index iconHow to Regain Control of the Desktop's Current Focus
trusted network
0.0.0.0/0 wildcard address, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
0.0.0.0 tnrhdb entry, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
concepts, index iconTrusted Networking (Overview)
default labeling, index iconTrusted Extensions Accreditation Checks
example of routing, index iconGateways in Trusted Extensions
host types, index iconHost Type and Template Name in Security Templates
labels and MAC enforcement, index iconThe Trusted Network
using templates, index iconCreating Security Templates (Tasks)
Trusted Path, Device Manager, index iconDevice Manager GUI
trusted path attribute, when available, index iconRoles and Trusted Extensions
Trusted Path menu, Assume Role, index iconHow to Enter the Global Zone in Trusted Extensions
trusted programs
adding, index iconDeveloper Responsibilities When Creating Trusted Programs
defined, index iconEvaluating Software for Security
trusted stripe
moving panels to bottom of screen, index iconHow to Move Desktop Panels to the Bottom of the Screen
on multiheaded system, index iconMultiheaded Systems and the Trusted Extensions Desktop
warping pointer to, index iconHow to Regain Control of the Desktop's Current Focus
trustworthy programs, index iconEvaluating Software for Security
tsol_separator.ps file
configurable values, index icontsol_separator.ps Configuration File
customizing labeled printing, index iconLabeled Printer Output
tsoljdsselmgr application, index iconRules When Changing the Level of Security for Data
txzonemgr script, index iconHow to Display Ready or Running Zones
-c option, index iconHow to Create a Default Trusted Extensions System