S
- scripts
- getmounts, How to Display the Labels of Mounted Files
- getzonelabels, How to Display Ready or Running Zones
- /usr/sbin/txzonemgr
- Administration Tools for Trusted Extensions
- Zone Administration Utilities in Trusted Extensions
- secure attention, key combination, How to Regain Control of the Desktop's Current Focus
- Security Administrator role
- administering network of users, Managing Users and Rights With the Solaris Management Console (Task Map)
- administering PostScript restriction, PostScript Printing of Security Information
- administering printer security, Labels, Printers, and Printing
- assigning authorizations to users, How to Create a Rights Profile for Convenient Authorizations
- audit tasks, Audit Tasks of the Security Administrator
- configuring a device, How to Configure a Device in Trusted Extensions
- configuring serial line for login, How to Configure a Serial Line for Logins
- creating Convenient Authorizations rights profile, How to Create a Rights Profile for Convenient Authorizations
- enabling unlabeled body pages from a public system, How to Modify policy.conf Defaults
- enforcing security, Enforcement of Device Security in Trusted Extensions
- modifying window configuration files, Front Panel Customization
- protecting nonallocatable devices, How to Protect Nonallocatable Devices in Trusted Extensions
- security administrators, See Security Administrator role
- security attributes, Routing Table Entries in Trusted Extensions
- modifying defaults for all users, How to Modify policy.conf Defaults
- modifying user defaults, How to Modify Default User Label Attributes
- setting for remote hosts, How to Construct a Remote Host Template
- using in routing, How to Configure Routes With Security Attributes
- security information, on printer output, Labeled Printer Output
- security label set, remote host templates, Network Security Attributes in Trusted Extensions
- security mechanisms
- extensible, Extension of Oracle Solaris Security Mechanisms by Trusted Extensions
- Oracle Solaris, Oracle Solaris Security Mechanisms for Software
- security policy
- auditing, Trusted Extensions Audit Policy Options
- training users, Users and Security Requirements
- users and devices, Enforcement of Device Security in Trusted Extensions
- security templates, See remote host templates
- Security Templates tool
- Trusted Extensions Tools in the Solaris Management Console
- Security Templates Tool
- assigning templates, How to Assign a Security Template to a Host or a Group of Hosts
- modifying tnrhdb
- Configuring Trusted Network Databases (Task Map)
- Configuring Trusted Network Databases (Task Map)
- using, How to Open the Trusted Networking Tools
- sel_config file, sel_config File
- action for editing, Trusted CDE Actions
- configuring selection transfer rules, sel_config File
- sel_mgr application, Rules When Changing the Level of Security for Data
- selecting, audit records by label, Audit Tasks of the System Administrator
- Selection Confirmer, changing defaults, sel_config File
- Selection Manager, configuring rules for selection confirmer, sel_config File
- Selection Manager application, Rules When Changing the Level of Security for Data
- serial line, configuring for logins, How to Configure a Serial Line for Logins
- service management facility (SMF), Trusted Extensions service, What's New in Trusted Extensions
- session range, Label Ranges
- sessions, failsafe, How to Log In to a Failsafe Session in Trusted Extensions
- Set Daily Message action, Trusted CDE Actions
- Set Default Routes action, Trusted CDE Actions
- Set DNS Servers action, Trusted CDE Actions
- setlabel command, Command Line Tools in Trusted Extensions
- Share Filesystems action, Trusted CDE Actions
- Share Logical Interface action, Trusted CDE Actions
- Share Physical Interface action, Trusted CDE Actions
- sharing, ZFS dataset from labeled zone, How to Share a ZFS Dataset From a Labeled Zone
- Shut Down Zone action, Trusted CDE Actions
- Shutdown authorization, How to Create a Rights Profile for Convenient Authorizations
- similarities
- between Trusted Extensions and Oracle Solaris auditing, Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS, Similarities Between Trusted Extensions and the Oracle Solaris OS
- single-label operation, Label Ranges
- single-label printing, configuring for a zone, How to Configure a Zone for Single-Label Printing
- smtnrhdb command, Command Line Tools in Trusted Extensions
- smtnrhtp command, Command Line Tools in Trusted Extensions
- smtnzonecfg command, Command Line Tools in Trusted Extensions
- snoop command
- Network Commands in Trusted Extensions
- How to Debug the Trusted Extensions Network
- software
- administering third-party, Software Management in Trusted Extensions (Tasks)
- importing, Adding Software to Trusted Extensions
- installing Java programs, How to Install a Java Archive File in Trusted Extensions
- Solaris Management Console
- administering trusted network, Configuring Trusted Network Databases (Task Map)
- administering users, Managing Users and Rights With the Solaris Management Console (Task Map)
- Computers and Networks tool, How to Add Hosts to the System's Known Network
- description of tools and toolboxes, Solaris Management Console Tools
- Security Templates tool
- Security Templates Tool
- How to Open the Trusted Networking Tools
- starting, How to Administer the Local System With the Solaris Management Console
- toolboxes, Solaris Management Console Tools
- Trusted Network Zones tool, Trusted Network Zones Tool
- solaris.print.nobanner authorization
- How to Modify policy.conf Defaults
- How to Suppress Banner and Trailer Pages for Specific Users
- solaris.print.ps authorization, How to Enable Users to Print PostScript Files in Trusted Extensions
- solaris.print.unlabeled authorization, How to Modify policy.conf Defaults
- Start Zone action, Trusted CDE Actions
- startup files, procedures for customizing, How to Configure Startup Files for Users in Trusted Extensions
- Stop-A, enabling, How to Change Security Defaults in System Files
- Sun Ray systems
- configuring network printer, How to Configure a Network Printer for Sun Ray Clients
- enabling initial contact between client and server, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- preventing users from seeing others' processes, How to Modify policy.conf Defaults
- tnrhdb address for client contact, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- System Administrator role
- adding print conversion filters, Additional Conversion Filters
- administering printers, Labels, Printers, and Printing
- audit tasks, Audit Tasks of the System Administrator
- enabling music to play automatically, How to Configure an Audio Player Program for Use in Trusted CDE
- preventing File Manager display, How to Prevent the File Manager From Displaying After Device Allocation
- reclaiming a device, How to Revoke or Reclaim a Device in Trusted Extensions
- reviewing audit records, Audit Tasks of the System Administrator
- system files
- editing
- How to Edit Administrative Files in Trusted Extensions
- How to Change Security Defaults in System Files
- Oracle Solaris /etc/default/print, How to Enable Users to Print PostScript Files in Trusted Extensions
- Oracle Solaris policy.conf, How to Enable Users to Print PostScript Files in Trusted Extensions
- Trusted Extensions sel_config, sel_config File
- Trusted Extensions tsol_separator.ps, How to Remove Page Labels From All Print Jobs