Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

S

scripts
/usr/bin/txzonemgrindex iconHow to Display Ready or Running Zones
/usr/sbin/txzonemgr
index iconZone Administration Utilities in Trusted Extensions
index iconTrusted Extensions Administrative Tools
getmountsindex iconHow to Display the Labels of Mounted Files
secure attention
key combinationindex iconHow to Regain Control of the Desktop's Current Focus
security
initial setup teamindex iconInitial Setup Team Responsibilities
publicationsindex iconAdditional Security References
site security policyindex iconSite Security Policy
Security Administrator role
administering printer securityindex iconLabels, Printers, and Printing
administering usersindex iconManaging Users and Rights
assigning authorizations to usersindex iconHow to Create a Rights Profile for Convenient Authorizations
configuring a deviceindex iconHow to Configure a Device by Using the Device Manager in Trusted Extensions
creatingindex iconHow to Create the Security Administrator Role in Trusted Extensions
creating Convenient Authorizations rights profileindex iconHow to Create a Rights Profile for Convenient Authorizations
enabling unlabeled body pages from a public systemindex iconAssigning Printing-Related Authorizations to All Users of a System
enforcing securityindex iconEnforcement of Device Security in Trusted Extensions
protecting nonallocatable devicesindex iconHow to Protect Nonallocatable Devices in Trusted Extensions
security administrators  Seeindex iconSecurity Administrator role
security attributesindex iconRouting Table Entries in Trusted Extensions
modifying defaults for all usersindex iconHow to Modify policy.conf Defaults
modifying user defaultsindex iconHow to Modify Default User Label Attributes
setting for remote hostsindex iconCreating Security Templates
using in routingindex iconHow to Add Default Routes
security information
on printoutsindex iconLabeled Printer Output
planning for Trusted Extensionsindex iconResolving Additional Issues Before Enabling??Trusted Extensions
security label set
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
security mechanisms
extensibleindex iconExtension of Oracle Solaris Security Features by Trusted Extensions
Oracle Solarisindex iconSecurity Mechanisms for Oracle Solaris Software
security policy
auditingindex iconTrusted Extensions Audit Policy Options
training usersindex iconUsers and Security Requirements
users and devicesindex iconEnforcement of Device Security in Trusted Extensions
security templates  Seeindex iconremote host templates
sel_config file
index iconsel_config File
index iconsel_config File
selecting
audit records by labelindex iconAudit Tasks in Trusted Extensions
Selection Manager
configuring rules for selection confirmerindex iconsel_config File
default configurationindex iconRules When Changing the Level of Security for Data
Selection Manager dialog box
descriptionindex iconUnique Trusted Extensions Security Features
Service Management Framework (SMF)
dpadmindex iconInstall the Oracle Directory Server Enterprise Edition
dsadmindex iconInstall the Oracle Directory Server Enterprise Edition
session rangeindex iconSession Range
sessions
failsafeindex iconHow to Log In to a Failsafe Session in Trusted Extensions
Setting Up Remote Administration in Trusted Extensions (Task Map)index iconConfiguring and Administering Remote Systems in Trusted Extensions
sharing
IP addressesindex iconHow to Assign Labels to Two Zone Workspaces
with Vinoindex iconUsing Vino to Share a Desktop in a Test Environment
ZFS dataset from labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
Shutdown authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
similarities
between Trusted Extensions and Oracle Solaris auditingindex iconAuditing in Trusted Extensions
between Trusted Extensions and Oracle Solaris OSindex iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
single-label
loginindex iconAccount Label Range
printing in a zoneindex iconHow to Configure a Zone as a Single-Level Print Server
site security policy
common violationsindex iconCommon Security Violations
personnel recommendationsindex iconPersonnel Security Recommendations
physical access recommendationsindex iconPhysical Security Recommendations
recommendationsindex iconComputer Security Recommendations
tasks involvedindex iconSite Security Policy
Trusted Extensions configuration decisionsindex iconSite Security Policy and Trusted Extensions
understandingindex iconUnderstanding Your Site's Security Policy
snoop command
index iconHow to Debug the Trusted Extensions Network
index iconNetwork Commands in Trusted Extensions
software
administering third-partyindex iconSoftware Management in Trusted Extensions
importingindex iconAdding Software to Trusted Extensions
solaris.print.admin
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.list
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.nobanner
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.nobanner authorizationindex iconAssigning Printing-Related Authorizations to All Users of a System
solaris.print.unlabeled
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.unlabeled authorizationindex iconAssigning Printing-Related Authorizations to All Users of a System
startup files
procedures for customizingindex iconHow to Configure Startup Files for Users in Trusted Extensions
Stop-A
enablingindex iconHow to Change Security Defaults in System Files
Sun Ray systems
0.0.0.0/32 address for client contactindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
enabling initial contact between client and serverindex iconConfiguring a Valid Initial Address for a Labeled Sun Ray Server
LDAP servers, andindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
preventing users from seeing others' processesindex iconModifying Every User's Basic Privilege Set
web site for documentationindex iconTask Map: Choosing a Trusted Extensions Configuration
System Administrator role
administering printersindex iconLabels, Printers, and Printing
creatingindex iconHow to Create a System Administrator Role
reclaiming a deviceindex iconHow to Revoke or Reclaim a Device in Trusted Extensions
reviewing audit recordsindex iconAudit Tasks in Trusted Extensions
system files
editingindex iconHow to Change Security Defaults in System Files
label_encodingsindex iconHow to Check and Install Your Label Encodings File
sel_configindex iconsel_config File
tsol_separator.psindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output