Index
A
- access, See computer access
- access policy
- devices, Device Access Policies
- Discretionary Access Control (DAC)
- Trusted Extensions Software and the Oracle Solaris OS
- Differences Between Trusted Extensions and the Oracle Solaris OS
- Mandatory Access Control (MAC), Differences Between Trusted Extensions and the Oracle Solaris OS
- accessing
- Admin Editor action, How to Edit Administrative Files in Trusted Extensions
- administrative tools, Getting Started as a Trusted Extensions Administrator (Task Map)
- audit records by label, Audit Tasks of the System Administrator
- devices, Device Protection With Trusted Extensions Software
- global zone, How to Enter the Global Zone in Trusted Extensions
- home directories, Zones in Trusted Extensions
- printers, Labels, Printers, and Printing
- remote multilevel desktop, How to Use Xvnc to Remotely Access a Trusted Extensions System
- Solaris Management Console, How to Administer the Local System With the Solaris Management Console
- trusted CDE actions, How to Start CDE Administrative Actions in Trusted Extensions
- ZFS dataset mounted in lower-level zone from higher-level zone, How to Share a ZFS Dataset From a Labeled Zone
- account locking, preventing, How to Prevent Account Locking for Users
- accounts
- See roles
- See also users
- accreditation checks, Trusted Extensions Accreditation Checks
- accreditation ranges, label_encodings file, Label Encodings File
- actions
- See also individual actions by name
- adding new Trusted CDE actions, Adding Trusted CDE Actions
- Admin Editor, How to Edit Administrative Files in Trusted Extensions
- Device Allocation Manager
- Device Allocation Manager GUI
- Device Allocation Manager GUI
- list of trusted CDE, Trusted CDE Actions
- Name Service Switch, How to Debug the Trusted Extensions Network
- restricted by rights profiles, Trusted Processes in the Window System
- use differences between CDE and Trusted CDE, Adding Trusted CDE Actions
- add_allocatable command, Command Line Tools in Trusted Extensions
- Add Allocatable Device action, Trusted CDE Actions
- Admin Editor action, Trusted CDE Actions
- opening, How to Edit Administrative Files in Trusted Extensions
- ADMIN_HIGH label, Dominance Relationships Between Labels
- ADMIN_LOW label
- lowest label, Dominance Relationships Between Labels
- protecting administrative files, Password Protection
- administering
- account locking, How to Prevent Account Locking for Users
- assigning device authorizations, How to Assign Device Authorizations
- audio device to play music, How to Configure an Audio Player Program for Use in Trusted CDE
- auditing in Trusted Extensions, Audit Management by Role in Trusted Extensions
- changing label of information, How to Enable a User to Change the Security Level of Data
- convenient authorizations for users, How to Create a Rights Profile for Convenient Authorizations
- device allocation, How to Assign Device Authorizations
- device authorizations, How to Create New Device Authorizations
- devices
- Managing Devices for Trusted Extensions (Tasks)
- Managing Devices in Trusted Extensions (Task Map)
- file systems
- mounting, How to NFS Mount Files in a Labeled Zone
- overview, Sharing and Mounting Files in Trusted Extensions
- troubleshooting, How to Troubleshoot Mount Failures in Trusted Extensions
files
- backing up, How to Back Up Files in Trusted Extensions
- restoring, How to Restore Files in Trusted Extensions
from the global zone, How to Enter the Global Zone in Trusted Extensions
- labeled printing, Managing Labeled Printing (Tasks)
- LDAP, Trusted Extensions and LDAP (Overview)
- mail, Multilevel Mail in Trusted Extensions (Overview)
- multilevel ports, How to Compare Trusted Network Database Information With the Kernel Cache
- network in Trusted Extensions, Managing Networks in Trusted Extensions (Tasks)
- network of users, Managing Users and Rights With the Solaris Management Console (Task Map)
- PostScript printing, How to Enable Users to Print PostScript Files in Trusted Extensions
- printing in Trusted Extensions, Managing Printing in Trusted Extensions (Task Map)
- printing interoperability with Trusted Solaris 8, Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
- quick reference for administrators, Quick Reference to Trusted Extensions Administration
- remote host database, How to Assign a Security Template to a Host or a Group of Hosts
- remote host templates, How to Construct a Remote Host Template
- remotely, Remote Administration in Trusted Extensions (Tasks)
- remotely from command line, How to Log In Remotely From the Command Line in Trusted Extensions
- remotely with dtappsession, How to Remotely Administer Trusted Extensions With dtappsession
- remotely with Solaris Management Console
- How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
- How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
- routes with security attributes, How to Configure Routes With Security Attributes
- serial line for login, How to Configure a Serial Line for Logins
- sharing file systems, How to Share Directories From a Labeled Zone
- startup files for users, How to Configure Startup Files for Users in Trusted Extensions
- Sun Ray printing, How to Configure a Network Printer for Sun Ray Clients
- system files, How to Change Security Defaults in System Files
- third-party software, Software Management in Trusted Extensions (Tasks)
- trusted network databases, Configuring Trusted Network Databases (Task Map)
- trusted networking, Managing Networks in Trusted Extensions (Tasks)
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user privileges, How to Restrict a User's Set of Privileges
- users
- Decisions to Make Before Creating Users in Trusted Extensions
- Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
- zones, Managing Zones (Task Map)
- zones from Trusted JDS, Zone Administration Utilities in Trusted Extensions
- Administering Trusted Extensions Remotely (Task Map), Administering Trusted Extensions Remotely (Task Map)
- administrative actions
- See also actions
- accessing, How to Edit Administrative Files in Trusted Extensions
- in CDE, Trusted CDE Actions
- in Trusted_Extensions folder, How to Start CDE Administrative Actions in Trusted Extensions
- list of trusted CDE, Trusted CDE Actions
- starting remotely
- How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
- How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
- trusted, Trusted Processes in the Window System
- administrative labels, Dominance Relationships Between Labels
- administrative roles, See roles
- Administrative Roles tool, Trusted Extensions Tools in the Solaris Management Console
- administrative tools
- accessing, Getting Started as a Trusted Extensions Administrator (Task Map)
- commands, Command Line Tools in Trusted Extensions
- description, Trusted Extensions Administration Tools
- Device Allocation Manager, Device Allocation Manager
- in Trusted_Extensions folder, How to Start CDE Administrative Actions in Trusted Extensions
- label builder, Label Builder in Trusted Extensions
- Labeled Zone Manager, txzonemgr Script
- Solaris Management Console
- Solaris Management Console Tools
- How to Administer the Local System With the Solaris Management Console
- Trusted CDE actions, Trusted CDE Actions
- txzonemgr script, txzonemgr Script
- allocate command, Command Line Tools in Trusted Extensions
- Allocate Device authorization
- How to Create a Rights Profile for Convenient Authorizations
- Device Protection With Trusted Extensions Software
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- allocate error state, correcting, How to Revoke or Reclaim a Device in Trusted Extensions
- allocating, using Device Allocation Manager, Device Allocation Manager GUI
- applications
- evaluating for security, Security Administrator Responsibilities for Trusted Programs
- installing, Managing Software in Trusted Extensions (Tasks)
- trusted and trustworthy, Evaluating Software for Security
- assigning
- editor as the trusted editor, How to Assign the Editor of Your Choice as the Trusted Editor
- privileges to users, Security Attribute Assignment to Users in Trusted Extensions
- rights profiles, Security Attribute Assignment to Users in Trusted Extensions
- Assume Role menu item, How to Enter the Global Zone in Trusted Extensions
- assuming, roles, How to Enter the Global Zone in Trusted Extensions
- atohexlabel command
- Command Line Tools in Trusted Extensions
- How to Obtain the Hexadecimal Equivalent for a Label
- audio devices
- automatically starting an audio player, How to Configure an Audio Player Program for Use in Trusted CDE
- preventing remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions
- audit_class file, action for editing, Trusted CDE Actions
- Audit Classes action, Trusted CDE Actions
- audit classes for Trusted Extensions, list of new X audit classes, Trusted Extensions Audit Classes
- Audit Control action, Trusted CDE Actions
- audit_control file, action for editing, Trusted CDE Actions
- audit_event file, Trusted CDE Actions
- Audit Events action, Trusted CDE Actions
- audit events for Trusted Extensions, list of, Trusted Extensions Audit Events
- audit policy in Trusted Extensions, Trusted Extensions Audit Policy Options
- audit records in Trusted Extensions, policy, Trusted Extensions Audit Policy Options
- Audit Review profile, reviewing audit records, Audit Tasks of the System Administrator
- Audit Startup action, Trusted CDE Actions
- audit_startup command, action for editing, Trusted CDE Actions
- Audit Tasks of the System Administrator, Audit Tasks of the System Administrator
- audit tokens for Trusted Extensions
- label token, label Token
- list of, Trusted Extensions Audit Tokens
- xatom token, xatom Token
- xclient token, xclient Token
- xcolormap token, xcolormap Token
- xcursor token, xcursor Token
- xfont token, xfont Token
- xgc token, xgc Token
- xpixmap token, xpixmap Token
- xproperty token, xproperty Token
- xselect token, xselect Token
- xwindow token, xwindow Token
- auditconfig command, Command Line Tools in Trusted Extensions
- auditing in Trusted Extensions
- additional audit events, Trusted Extensions Audit Events
- additional audit policies, Trusted Extensions Audit Policy Options
- additional audit tokens, Trusted Extensions Audit Tokens
- additions to existing auditing commands, Extensions to Auditing Commands in Trusted Extensions
- differences from Oracle Solaris auditing, Trusted Extensions and Auditing
- reference, Trusted Extensions Auditing (Overview)
- roles for administering, Audit Management by Role in Trusted Extensions
- security administrator tasks, Audit Tasks of the Security Administrator
- system administrator tasks, Audit Tasks of the System Administrator
- tasks, Audit Tasks in Trusted Extensions
- X audit classes, Trusted Extensions Audit Classes
- auditreduce command, Command Line Tools in Trusted Extensions
- authorizations
- adding new device authorizations, How to Create New Device Authorizations
- Allocate Device
- Device Protection With Trusted Extensions Software
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- assigning, Security Attribute Assignment to Users in Trusted Extensions
- assigning device authorizations, How to Assign Device Authorizations
- authorizing a user or role to change label, How to Enable a User to Change the Security Level of Data
- Configure Device Attributes, How to Assign Device Authorizations
- convenient for users, How to Create a Rights Profile for Convenient Authorizations
- creating customized device authorizations, How to Create New Device Authorizations
- creating local and remote device authorizations, How to Create New Device Authorizations
- customizing for devices, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- granted, Trusted Extensions and Access Control
- Print Postscript, PostScript Printing of Security Information
- Print PostScript, How to Enable Users to Print PostScript Files in Trusted Extensions
- profiles that include device allocation authorizations, How to Assign Device Authorizations
- Revoke or Reclaim Device
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- solaris.print.nobanner, How to Suppress Banner and Trailer Pages for Specific Users
- solaris.print.ps, How to Enable Users to Print PostScript Files in Trusted Extensions
- authorizing
- device allocation, How to Assign Device Authorizations
- PostScript printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- automount command, Command Line Tools in Trusted Extensions