Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017
 
 

Index

A

access  Seeindex iconcomputer access
remote systemsindex iconRemote Administration in Trusted Extensions
access policy
devicesindex iconDevice Access Policies
Discretionary Access Control (DAC)
index iconDifferences Between Trusted Extensions and the Oracle Solaris OS
index iconTrusted Extensions and the Oracle Solaris OS
Mandatory Access Control (MAC)index iconDifferences Between Trusted Extensions and the Oracle Solaris OS
accessing
administrative toolsindex iconGetting Started as a Trusted Extensions Administrator on a Desktop System
audit records by labelindex iconAudit Tasks in Trusted Extensions
devicesindex iconDevice Protection With Trusted Extensions Software
global zoneindex iconHow to Enter the Global Zone in Trusted Extensions
home directoriesindex iconZones in Trusted Extensions
labeled zones by usersindex iconHow to Enable Users to Log In to a Labeled Zone
printersindex iconLabels, Printers, and Printing
remote multilevel desktopindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
ZFS dataset mounted in lower-level zone from higher-level zoneindex iconSharing and Mounting a ZFS Dataset From Labeled Zones
account locking
preventing for users who can assume rolesindex iconHow to Prevent Account Locking for Users
accounts
  See Alsoindex iconroles
  See Alsoindex iconusers
creatingindex iconCreating Roles and Users in Trusted Extensions
planningindex iconPlanning User Security in Trusted Extensions
accreditation checksindex iconTrusted Extensions Accreditation Checks
accreditation ranges
label_encodings fileindex iconLabel Encodings File
adding
IPsec protectionsindex iconHow to Apply IPsec Protections in a Multilevel Trusted Extensions Network
LDAP role with roleaddindex iconCreating the Security Administrator Role in LDAP
local role with roleaddindex iconHow to Create the Security Administrator Role in Trusted Extensions
local user with useraddindex iconUsing the useradd Command to Create a Local User
logical interfacesindex iconHow to Add an IP Instance to a Labeled Zone
multilevel datasetindex iconHow to Create and Share a Multilevel Dataset
network databases to LDAP serverindex iconPopulate the Oracle Directory Server Enterprise Edition
nscd daemon to every labeled zoneindex iconHow to Configure a Separate Name Service for Each Labeled Zone
remote host templatesindex iconCreating Security Templates
remote hostsindex iconHow to Connect a Trusted Extensions System to Other Trusted Extensions Systems
rolesindex iconCreating Roles and Users in Trusted Extensions
secondary zonesindex iconHow to Create a Secondary Labeled Zone
shared network interfacesindex iconHow to Share a Single IP Address With All Zones
Trusted Extensions packagesindex iconAdd Trusted Extensions Packages to an Oracle Solaris System
users who can assume rolesindex iconHow to Create Users Who Can Assume Roles in Trusted Extensions
VNIC interfacesindex iconHow to Add a Virtual Network Interface to a Labeled Zone
zone-specific nscd daemonindex iconHow to Configure a Separate Name Service for Each Labeled Zone
Additional Trusted Extensions Configuration Tasksindex iconAdditional Trusted Extensions Configuration Tasks
ADMIN_HIGH label
body page labels andindex iconHow to Configure a Zone as a Single-Level Print Server
devices andindex iconDevice Protection With Trusted Extensions Software
global zone processes and zonesindex iconGlobal Zone Processes and Labeled Zones
mlslabel andindex iconmlslabel Property and Mounting Single-Level File Systems
multilevel datasets andindex iconNo Privilege Overrides for MAC Read-Write Policy
NFS-mounted files in global zoneindex iconTrusted Extensions Policy for Single-Level Datasets
no localizationindex iconFor International Customers of Trusted Extensions
role clearanceindex iconHow to Create a System Administrator Role
roles andindex iconRole Creation in Trusted Extensions
top administrative labelindex iconAdministrative Labels
ADMIN_LOW label
limitations on unlabeled system mountsindex iconSharing and Mounting Files in the Global Zone
lowest labelindex iconAdministrative Labels
mounting files andindex iconSharing and Mounting Files in the Global Zone
protecting administrative filesindex iconPassword Protection
administering
account lockingindex iconHow to Prevent Account Locking for Users
assigning device authorizationsindex iconHow to Assign Device Authorizations
auditing in Trusted Extensionsindex iconAudit Management by Role in Trusted Extensions
changing label of informationindex iconHow to Enable a User to Change the Security Level of Data
convenient authorizations for usersindex iconHow to Create a Rights Profile for Convenient Authorizations
device allocationindex iconHow to Assign Device Authorizations
device authorizationsindex iconHow to Create New Device Authorizations
devices
index iconManaging Devices in Trusted Extensions
index iconManaging Devices for Trusted Extensions
file systems
mountingindex iconHow to NFS Mount Files in a Labeled Zone
overviewindex iconTrusted Extensions Policies for Mounted File Systems
troubleshootingindex iconHow to Troubleshoot Mount Failures in Trusted Extensions
files
backing up with labelsindex iconHow to Back Up Files in Trusted Extensions
restoring with labelsindex iconHow to Restore Files in Trusted Extensions
from the global zoneindex iconHow to Enter the Global Zone in Trusted Extensions
labeled IPsecindex iconConfiguring Labeled IPsec
labeled printingindex iconManaging Labeled Printing
LDAPindex iconAbout Trusted Extensions and LDAP
mailindex iconAbout Multilevel Mail in Trusted Extensions
multilevel datasetsindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
multilevel portsindex iconDisplaying Multilevel Ports on a System
printingindex iconManaging Printing in Trusted Extensions
quick reference for administratorsindex iconQuick Reference to Trusted Extensions Administration
remote host templatesindex iconCreating Security Templates
remotelyindex iconRemote Administration in Trusted Extensions
routes with security attributesindex iconHow to Add Default Routes
security templates
index iconHow to Add a Range of Hosts to a Security Template
index iconHow to Add a Host to a Security Template
sharing file systemsindex iconHow to Share File Systems From a Labeled Zone
startup files for usersindex iconHow to Configure Startup Files for Users in Trusted Extensions
system filesindex iconHow to Change Security Defaults in System Files
third-party softwareindex iconSoftware Management in Trusted Extensions
trusted networkindex iconManaging Networks in Trusted Extensions
unlabeled printingindex iconReducing Printing Restrictions in Trusted Extensions
user privilegesindex iconHow to Restrict a User's Set of Privileges
users
index iconManaging Users and Rights
index iconManaging Users, Rights, and Roles in Trusted Extensions
index iconDecisions to Make Before Creating Users in Trusted Extensions
zonesindex iconManaging Zones
zones by using txzonemgrindex iconZone Administration Utilities in Trusted Extensions
administrative labelsindex iconAdministrative Labels
administrative roles  Seeindex iconroles
administrative tools
accessingindex iconGetting Started as a Trusted Extensions Administrator on a Desktop System
commandsindex iconCommand Line Tools in Trusted Extensions
configuration filesindex iconConfiguration Files in Trusted Extensions
descriptionindex iconTrusted Extensions Administration Tools
Device Managerindex iconDevice Manager
label builderindex iconLabel Builder in Trusted Extensions
Labeled Zone Managerindex icontxzonemgr Script
Selection Managerindex iconSelection Manager in Trusted Extensions
txzonemgr scriptindex icontxzonemgr Script
Allocate Device authorization
index iconHow to Assign Device Authorizations
index iconDevice Protection With Trusted Extensions Software
index iconHow to Create a Rights Profile for Convenient Authorizations
allocate error state
correctingindex iconHow to Revoke or Reclaim a Device in Trusted Extensions
allocating
using Device Managerindex iconDevice Manager GUI
allocating devices
for copying dataindex iconHow to Copy Files to Portable Media in Trusted Extensions
application security labelindex iconLabels for IPsec-Protected Exchanges
applications
enabling initial network contact between client and serverindex iconMaking the Host Address 0.0.0.0/32 a Valid Initial Address
evaluating for securityindex iconSecurity Administrator Responsibilities for Trusted Programs
trusted and trustworthyindex iconEvaluating Software for Security
ARMOR roles
index iconCreating Roles and Users in Trusted Extensions Task Map
index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
assigning
privileges to usersindex iconSecurity Attribute Assignment to Users in Trusted Extensions
rights profilesindex iconSecurity Attribute Assignment to Users in Trusted Extensions
Assume Role menu itemindex iconHow to Enter the Global Zone in Trusted Extensions
assuming
rolesindex iconHow to Enter the Global Zone in Trusted Extensions
atohexlabel commandindex iconHow to Obtain the Hexadecimal Equivalent for a Label
audio devices
preventing remote allocationindex iconPreventing Remote Allocation of the Audio Device
Audit Review profile
reviewing audit recordsindex iconAudit Tasks in Trusted Extensions
audit tokens for Trusted Extensions
label tokenindex iconlabel Token
list ofindex iconTrusted Extensions Audit Tokens
xatom tokenindex iconxatom Token
xcolormap tokenindex iconxcolormap Token
xcursor tokenindex iconxcursor Token
xfont tokenindex iconxfont Token
xgc tokenindex iconxgc Token
xpixmap tokenindex iconxpixmap Token
xproperty tokenindex iconxproperty Token
xselect tokenindex iconxselect Token
xwindow tokenindex iconxwindow Token
auditing in Trusted Extensions
additional audit eventsindex iconTrusted Extensions Audit Events
additional audit policiesindex iconTrusted Extensions Audit Policy Options
additional audit tokensindex iconTrusted Extensions Audit Tokens
additions to existing auditing commandsindex iconExtensions to Auditing Commands in Trusted Extensions
differences from Oracle Solaris auditingindex iconAuditing in Trusted Extensions
planningindex iconPlanning for Auditing in Trusted Extensions
referenceindex iconTrusted Extensions and Auditing
roles for administeringindex iconAudit Management by Role in Trusted Extensions
tasksindex iconAudit Tasks in Trusted Extensions
X audit classesindex iconTrusted Extensions Audit Classes
authorizations
adding new device authorizationsindex iconHow to Create New Device Authorizations
Allocate Device
index iconHow to Assign Device Authorizations
index iconDevice Protection With Trusted Extensions Software
assigningindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning device authorizationsindex iconHow to Assign Device Authorizations
authorizing a user or role to change labelindex iconHow to Enable a User to Change the Security Level of Data
Configure Device Attributesindex iconHow to Assign Device Authorizations
convenient for usersindex iconHow to Create a Rights Profile for Convenient Authorizations
creating customized device authorizationsindex iconCreating Fine-Grained Device Authorizations
creating local and remote device authorizationsindex iconCreating and Assigning Trusted Path and Non-Trusted Path Device Authorizations
customizing for devicesindex iconHow to Add Site-Specific Authorizations to a Device in Trusted Extensions
grantedindex iconTrusted Extensions and Access Control
profiles that include device allocation authorizationsindex iconHow to Assign Device Authorizations
Revoke or Reclaim Device
index iconHow to Assign Device Authorizations
index iconHow to Assign Device Authorizations
authorizing
device allocationindex iconHow to Assign Device Authorizations
unlabeled printingindex iconReducing Printing Restrictions in Trusted Extensions

B

backing up
previous system before installationindex iconBacking Up the System Before Enabling Trusted Extensions
banner pages
description of labeledindex iconLabeled Banner and Trailer Pages
difference from trailer pageindex iconDifferences on a Trailer Page
removing labelsindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output
typicalindex iconTypical Banner Page of a Labeled Print Job
body pages
ADMIN_HIGH label onindex iconHow to Configure a Zone as a Single-Level Print Server
description of labeledindex iconLabeled Body Pages
unlabeledindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output

C

.copy_files file
descriptionindex icon.copy_files and .link_files Files
setting up for users
index iconCustomizing Startup Files for Users
index iconHow to Configure Startup Files for Users in Trusted Extensions
CD-ROM drives
accessingindex iconDevice Protection With Trusted Extensions Software
Change Password menu item
descriptionindex iconUnique Trusted Extensions Security Features
using to change root passwordindex iconHow to Change the Password for root on a Desktop System
Change Workspace Label menu item
descriptionindex iconUnique Trusted Extensions Security Features
changing
IDLETIME keywordindex iconChanging the System's Idle Settings
labels by authorized usersindex iconHow to Enable a User to Change the Security Level of Data
rules for label changesindex iconsel_config File
security level of dataindex iconHow to Enable a User to Change the Security Level of Data
system security defaultsindex iconHow to Change Security Defaults in System Files
user privilegesindex iconHow to Restrict a User's Set of Privileges
checking
label_encodings fileindex iconHow to Check and Install Your Label Encodings File
roles are workingindex iconHow to Verify That the Trusted Extensions Roles Work
checklists for initial setup teamindex iconChecklist for Configuring Trusted Extensions
chk_encodings commandindex iconChecking label_encodings Syntax on the Command Line
choosing  Seeindex iconselecting
classification label componentindex iconDominance Relationships Between Labels
clearances
label overviewindex iconLabels in Trusted Extensions Software
collecting information
for LDAP serviceindex iconCollect Information for the LDAP Server
colors
indicating label of workspaceindex iconWhat Labels Protect and Where Labels Appear
commands
executing with privilegeindex iconHow to Enter the Global Zone in Trusted Extensions
troubleshooting networkingindex iconHow to Debug the Trusted Extensions Network
commercial applications
evaluatingindex iconSecurity Administrator Responsibilities for Trusted Programs
Common Tasks in Trusted Extensions (Task Map)index iconPerforming Common Tasks in Trusted Extensions
compartment label componentindex iconDominance Relationships Between Labels
component definitions
label_encodings fileindex iconLabel Encodings File
computer access
administrator responsibilitiesindex iconInformation Protection
restrictingindex iconEffects of Label Range on a Device
configuration files
copyingindex iconHow to Copy Files to Portable Media in Trusted Extensions
loadingindex iconHow to Copy Files From Portable Media in Trusted Extensions
Configure Device Attributes authorizationindex iconHow to Assign Device Authorizations
configuring
access to remote Trusted Extensionsindex iconRemote Administration in Trusted Extensions
authorizations for devicesindex iconHow to Create New Device Authorizations
by assuming a limited role or as rootindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
devicesindex iconHow to Configure a Device by Using the Device Manager in Trusted Extensions
labeled printingindex iconConfiguring Labeled Printing
LDAP for Trusted Extensionsindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
LDAP proxy server for Trusted Extensions clientsindex iconCreating a Trusted Extensions Proxy for an Existing Oracle Directory Server Enterprise Edition
logical interfacesindex iconHow to Add an IP Instance to a Labeled Zone
network interfaces
index iconHow to Connect a Trusted Extensions System to Other Trusted Extensions Systems
index iconHow to Share a Single IP Address With All Zones
routes with security attributesindex iconHow to Add Default Routes
startup files for usersindex iconHow to Configure Startup Files for Users in Trusted Extensions
Trusted Extensionsindex iconConfiguring Trusted Extensions
Trusted Extensions labeled zonesindex iconCreating Labeled Zones
trusted networkindex iconManaging Networks in Trusted Extensions
VNICsindex iconHow to Add a Virtual Network Interface to a Labeled Zone
Configuring an LDAP Proxy Server on a Trusted Extensions System (Task Map)index iconConfiguring an LDAP Proxy Server on a Trusted Extensions System
Configuring Labeled IPsec (Task Map)index iconConfiguring Labeled IPsec
Configuring Labeled Printing (Task Map)index iconConfiguring Labeled Printing
Configuring LDAP on a Trusted Extensions Network (Task Map)index iconConfiguring LDAP on a Trusted Extensions Network
configuring Trusted Extensions
checklist for initial setup teamindex iconChecklist for Configuring Trusted Extensions
initial proceduresindex iconConfiguring Trusted Extensions
kernel zonesindex iconCreating Labeled Zones
labeled zonesindex iconCreating Labeled Zones
remote accessindex iconRemote Administration in Trusted Extensions
task mapsindex iconConfiguration Roadmap for Trusted Extensions
controlling  Seeindex iconrestricting
creating
accountsindex iconCreating Roles and Users in Trusted Extensions
accounts during or after configurationindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
authorizations for devicesindex iconHow to Create New Device Authorizations
home directories
index iconHome Directory Creation in Trusted Extensions
index iconCreating Centralized Home Directories in Trusted Extensions
home directory serverindex iconHow to Create the Home Directory Server in Trusted Extensions
kernel zonesindex iconCreating Labeled Zones
labeled zonesindex iconCreating Labeled Zones
LDAP clientindex iconMake the Global Zone an LDAP Client in Trusted Extensions
LDAP proxy server for Trusted Extensions clientsindex iconCreate an LDAP Proxy Server
LDAP role with roleaddindex iconCreating the Security Administrator Role in LDAP
local role with roleaddindex iconHow to Create the Security Administrator Role in Trusted Extensions
local user with useraddindex iconUsing the useradd Command to Create a Local User
rolesindex iconCreating Roles and Users in Trusted Extensions
users who can assume rolesindex iconHow to Create Users Who Can Assume Roles in Trusted Extensions
zonesindex iconCreating Labeled Zones
Creating Labeled Zonesindex iconCreating Labeled Zones
customizing
device authorizationsindex iconHow to Add Site-Specific Authorizations to a Device in Trusted Extensions
label_encodings fileindex iconLabel Encodings File
unlabeled printingindex iconReducing Printing Restrictions in Trusted Extensions
user accountsindex iconCustomizing the User Environment for Security
Customizing Device Authorizations in Trusted Extensions (Task Map)index iconCustomizing Device Authorizations in Trusted Extensions
Customizing User Environment for Security (Task Map)index iconCustomizing the User Environment for Security
cut and paste
and labelsindex iconRules When Changing the Level of Security for Data
cutting and pasting
configuring rules for label changesindex iconsel_config File

D

/dev/kmem kernel image file
security violationindex iconEvaluating Software for Security
DAC  Seeindex icondiscretionary access control (DAC)
data
relabeling efficientlyindex iconHow to Create and Share a Multilevel Dataset
databases
in LDAPindex iconUsing the LDAP Naming Service in Trusted Extensions
trusted networkindex iconNetwork Configuration Databases in Trusted Extensions
datasets  Seeindex iconZFS
deallocating
forcingindex iconHow to Revoke or Reclaim a Device in Trusted Extensions
deallocating devicesindex iconHow to Copy Files From Portable Media in Trusted Extensions
debugging  Seeindex icontroubleshooting
deciding
to configure by assuming a limited role or as rootindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
to use an Oracle-supplied encodings fileindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
decisions to make
based on site security policyindex iconSite Security Policy and Trusted Extensions
before enabling Trusted Extensionsindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
deleting
labeled zonesindex iconHow to Remove Trusted Extensions From the System
desktops
accessing multilevel remotelyindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
logging in to a failsafe sessionindex iconHow to Log In to a Failsafe Session in Trusted Extensions
moving panels to bottom of screenindex iconHow to Move Desktop Panels to the Bottom of the Screen
using Vino to shareindex iconUsing Vino to Share a Desktop in a Test Environment
workspace color changesindex iconHow to Enter the Global Zone in Trusted Extensions
developer responsibilitiesindex iconDeveloper Responsibilities When Creating Trusted Programs
device allocation
authorizingindex iconHow to Assign Device Authorizations
overviewindex iconDevice Protection With Trusted Extensions Software
profiles that include allocation authorizationsindex iconHow to Assign Device Authorizations
Device Manager
administrative toolindex iconTrusted Extensions Administrative Tools
descriptionindex iconDevice Manager GUI
use by administratorsindex iconHow to Configure a Device by Using the Device Manager in Trusted Extensions
device-clean scripts
adding to devicesindex iconHow to Add a Device_Clean Script in Trusted Extensions
requirementsindex iconDevice-Clean Scripts
devices
access policyindex iconDevice Access Policies
accessingindex iconDevice Manager GUI
adding customized authorizationsindex iconHow to Add Site-Specific Authorizations to a Device in Trusted Extensions
adding device_clean scriptindex iconHow to Add a Device_Clean Script in Trusted Extensions
administeringindex iconManaging Devices for Trusted Extensions
administering with Device Managerindex iconHow to Configure a Device by Using the Device Manager in Trusted Extensions
allocatingindex iconDevice Protection With Trusted Extensions Software
configuring devicesindex iconHow to Configure a Device by Using the Device Manager in Trusted Extensions
creating new authorizationsindex iconHow to Create New Device Authorizations
in Trusted Extensionsindex iconAbout Devices in Trusted Extensions
policy defaultsindex iconDevice Access Policies
preventing remote allocation of audioindex iconPreventing Remote Allocation of the Audio Device
protectingindex iconDevice Manager
protecting nonallocatableindex iconHow to Protect Nonallocatable Devices in Trusted Extensions
reclaimingindex iconHow to Revoke or Reclaim a Device in Trusted Extensions
setting label range for nonallocatableindex iconEffects of Label Range on a Device
setting policyindex iconDevice Access Policies
troubleshootingindex iconHow to Revoke or Reclaim a Device in Trusted Extensions
usingindex iconUsing Devices in Trusted Extensions Task Map
differences
administrative interfaces in Trusted Extensionsindex iconAdministrative Interfaces in Trusted Extensions
between Trusted Extensions and Oracle Solaris auditingindex iconAuditing in Trusted Extensions
between Trusted Extensions and Oracle Solaris OSindex iconDifferences Between Trusted Extensions and the Oracle Solaris OS
defaults in Trusted Extensionsindex iconTighter Security Defaults in Trusted Extensions
extending Oracle Solaris interfacesindex iconOracle Solaris Interfaces Extended by Trusted Extensions
limited options in Trusted Extensionsindex iconLimited Options in Trusted Extensions
directories
accessing lower-levelindex iconZones in Trusted Extensions
authorizing a user or role to change label ofindex iconHow to Enable a User to Change the Security Level of Data
for naming service setupindex iconPopulate the Oracle Directory Server Enterprise Edition
mountingindex iconHow to Share File Systems From a Labeled Zone
sharingindex iconHow to Share File Systems From a Labeled Zone
disabling
Trusted Extensionsindex iconHow to Remove Trusted Extensions From the System
discretionary access control (DAC)index iconTrusted Extensions and Access Control
displaying
labels of file systems in labeled zoneindex iconDisplaying the Labels of File Systems in the restricted Zone
status of every zoneindex iconHow to Display Ready or Running Zones
DOI
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
domain of interpretation (DOI)
modifyingindex iconHow to Configure a Different Domain of Interpretation
dominance of labelsindex iconDominance Relationships Between Labels
Downgrade DragNDrop or CutPaste Info authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
Downgrade File Label authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
downgrading labels
configuring rules for selection confirmerindex iconsel_config File
dpadm serviceindex iconInstall the Oracle Directory Server Enterprise Edition
DragNDrop or CutPaste without viewing contents authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
dsadm serviceindex iconInstall the Oracle Directory Server Enterprise Edition

E

/etc/default/kbd file
how to editindex iconHow to Change Security Defaults in System Files
/etc/default/login file
how to editindex iconHow to Change Security Defaults in System Files
/etc/default/passwd file
how to editindex iconHow to Change Security Defaults in System Files
/etc/hosts fileindex iconHow to Add Hosts to the System's Known Network
/etc/security/policy.conf file
defaultsindex iconpolicy.conf File Defaults in Trusted Extensions
how to editindex iconHow to Change Security Defaults in System Files
modifyingindex iconHow to Modify policy.conf Defaults
/etc/security/tsol/label_encodings fileindex iconLabel Encodings File
/etc/system file
modifying for IPv6 CIPSO networkindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
editing system filesindex iconHow to Change Security Defaults in System Files
enabling
DOI different from 1index iconHow to Configure a Different Domain of Interpretation
dpadm serviceindex iconInstall the Oracle Directory Server Enterprise Edition
dsadm serviceindex iconInstall the Oracle Directory Server Enterprise Edition
IPv6 CIPSO networkindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
keyboard shutdownindex iconHow to Change Security Defaults in System Files
labeld serviceindex iconInstalling and Enabling Trusted Extensions
login to labeled zoneindex iconHow to Enable Users to Log In to a Labeled Zone
Trusted Extensions featureindex iconInstalling and Enabling Trusted Extensions
enabling Trusted Extensions
/usr/sbin/labeladmindex iconTrusted Extensions Administrative Tools
encodings file  Seeindex iconlabel_encodings file
evaluating programs for securityindex iconEvaluating Software for Security
exporting  Seeindex iconsharing

F

failsafe session
logging inindex iconHow to Log In to a Failsafe Session in Trusted Extensions
fallback mechanism
in security templatesindex iconTrusted Network Fallback Mechanism
file systems
mounting in global and labeled zonesindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
NFS mountsindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
sharingindex iconTrusted Extensions Policies for Mounted File Systems
sharing in global and labeled zonesindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
files
.copy_files
index iconHow to Configure Startup Files for Users in Trusted Extensions
index icon.copy_files and .link_files Files
.link_files
index iconHow to Configure Startup Files for Users in Trusted Extensions
index icon.copy_files and .link_files Files
/etc/default/kbdindex iconHow to Change Security Defaults in System Files
/etc/default/loginindex iconHow to Change Security Defaults in System Files
/etc/default/passwdindex iconHow to Change Security Defaults in System Files
/etc/security/policy.conf
index iconHow to Modify policy.conf Defaults
index iconpolicy.conf File Defaults in Trusted Extensions
/etc/security/tsol/label_encodings fileindex iconLabel Encodings File
/usr/bin/tsoljdsselmgrindex iconRules When Changing the Level of Security for Data
/usr/lib/cups/filter/tsol_separator.psindex iconLabeled Printer Output
/usr/sbin/txzonemgr
index iconZone Administration Utilities in Trusted Extensions
index iconTrusted Extensions Administrative Tools
/usr/share/gnome/sel_configindex iconsel_config File
accessing from dominating labelsindex iconHow to Display the Labels of Mounted Files
authorizing a user or role to change label ofindex iconHow to Enable a User to Change the Security Level of Data
backing up with labelsindex iconHow to Back Up Files in Trusted Extensions
copying from removable mediaindex iconHow to Copy Files From Portable Media in Trusted Extensions
getmountsindex iconHow to Display the Labels of Mounted Files
loopback mountingindex iconHow to Loopback Mount a File That Is Usually Not Visible in a Labeled Zone
policy.confindex iconHow to Change Security Defaults in System Files
preventing access from dominating labelsindex iconHow to Disable the Mounting of Lower-Level Files
relabeling privilegesindex iconHow to Enable Files to Be Relabeled From a Labeled Zone
restoring with labelsindex iconHow to Restore Files in Trusted Extensions
startupindex iconHow to Configure Startup Files for Users in Trusted Extensions
files and file systems
mountingindex iconHow to Share File Systems From a Labeled Zone
namingindex iconHow to Share File Systems From a Labeled Zone
sharingindex iconHow to Share File Systems From a Labeled Zone
finding
label equivalent in hexadecimalindex iconHow to Obtain the Hexadecimal Equivalent for a Label
label equivalent in text formatindex iconHow to Obtain a Readable Label From Its Hexadecimal Form

G

gateways
accreditation checksindex iconGateway Accreditation Checks
example ofindex iconGateways in Trusted Extensions
gdm
accessing multilevel remotelyindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
getmounts scriptindex iconHow to Display the Labels of Mounted Files
Getting Started as a Trusted Extensions Administrator (Task Map)index iconGetting Started as a Trusted Extensions Administrator on a Desktop System
global zone
difference from labeled zonesindex iconZones in Trusted Extensions
enteringindex iconHow to Enter the Global Zone in Trusted Extensions
exitingindex iconHow to Exit the Global Zone in Trusted Extensions
groups
deletion precautionsindex iconGroup Administration Practices
security requirementsindex iconGroup Administration Practices

H

Handling Devices in Trusted Extensions (Task Map)index iconHandling Devices in Trusted Extensions
hardware planningindex iconPlanning System Hardware and Capacity for Trusted Extensions
hextoalabel commandindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
home directories
accessingindex iconZones in Trusted Extensions
creating
index iconHome Directory Creation in Trusted Extensions
index iconCreating Centralized Home Directories in Trusted Extensions
creating server forindex iconHow to Create the Home Directory Server in Trusted Extensions
logging in and getting
index iconHow to Enable Users to Access Their Remote Home Directories by Configuring the Automounter on Each Server
index iconHow to Enable Users to Access Their Remote Home Directories at Every Label by Logging In to Each NFS Server
host types
networking
index iconHost Type and Template Name in Security Templates
index iconTrusted Extensions Data Packets
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
table of templates and protocolsindex iconHost Type and Template Name in Security Templates
hosts
adding to /etc/hosts fileindex iconHow to Add Hosts to the System's Known Network
adding to security template
index iconHow to Add a Range of Hosts to a Security Template
index iconHow to Add a Host to a Security Template
assigning a templateindex iconAdding Hosts to Security Templates
networking conceptsindex iconTrusted Network Communications
hot key
regaining control of desktop focusindex iconHow to Regain Control of the Desktop's Current Focus

I

IDLECMD keyword
changing defaultindex iconChanging the System's Idle Settings
IDLETIME keyword
changing defaultindex iconChanging the System's Idle Settings
IKE
labels in tunnel modeindex iconLabels and Accreditation in Tunnel Mode IPsec
immutable zones
Trusted Extensions andindex iconCreating Labeled Zones
importing
softwareindex iconAdding Software to Trusted Extensions
initial setup team
checklist for configuring Trusted Extensionsindex iconChecklist for Configuring Trusted Extensions
inner labelindex iconLabels for IPsec-Protected Exchanges
installing
label_encodings file
index iconHow to Check and Install Your Label Encodings File
index iconEnable Trusted Extensions
Oracle Directory Server Enterprise Editionindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
Oracle Solaris OS for Trusted Extensionsindex iconAdding the Trusted Extensions Feature to Oracle Solaris
interfaces
adding to security template
index iconHow to Add a Range of Hosts to a Security Template
index iconHow to Add a Host to a Security Template
verifying they are upindex iconHow to Verify That a System's Interfaces Are Up
internationalizing  Seeindex iconlocalizing
IP addresses
0.0.0.0 host addressindex iconTrusted Extensions Host Address and Fallback Mechanism Entries
fallback mechanism in trusted networkingindex iconTrusted Network Fallback Mechanism
ipadm commandindex iconNetwork Commands in Trusted Extensions
IPsec
label extensionsindex iconLabel Extensions for IPsec Security Associations
labels in tunnel modeindex iconLabels and Accreditation in Tunnel Mode IPsec
labels on trusted exchangesindex iconLabels for IPsec-Protected Exchanges
protections with label extensionsindex iconConfidentiality and Integrity Protections With Label Extensions
with Trusted Extensions labelsindex iconAdministration of Labeled IPsec
ipseckey commandindex iconNetwork Commands in Trusted Extensions
IPv6
entry in /etc/system fileindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
troubleshootingindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions

K

kernel zones
Trusted Extensions andindex iconCreating Labeled Zones
key combinations
testing if grab is trustedindex iconHow to Regain Control of the Desktop's Current Focus
keyboard shutdown
enablingindex iconHow to Change Security Defaults in System Files
kmem kernel image fileindex iconEvaluating Software for Security

L

.link_files file
descriptionindex icon.copy_files and .link_files Files
setting up for usersindex iconHow to Configure Startup Files for Users in Trusted Extensions
label extensions
IKE negotiationsindex iconLabel Extensions for IKE
IPsec SAsindex iconLabel Extensions for IPsec Security Associations
label ranges
restricting remote accessindex iconRemote Administration in Trusted Extensions
setting on frame buffersindex iconEffects of Label Range on a Device
setting on printersindex iconEffects of Label Range on a Device
label audit tokenindex iconlabel Token
label_encodings file
checkingindex iconHow to Check and Install Your Label Encodings File
contentsindex iconLabel Encodings File
installing
index iconHow to Check and Install Your Label Encodings File
index iconEnable Trusted Extensions
localizingindex iconFor International Customers of Trusted Extensions
modifying
index iconHow to Check and Install Your Label Encodings File
index iconEnable Trusted Extensions
reference for labeled printingindex iconLabeled Printer Output
source of accreditation rangesindex iconLabel Encodings File
labeladm commandindex iconInstalling and Enabling Trusted Extensions
enabling Trusted Extensionsindex iconInstalling and Enabling Trusted Extensions
installing encodings file
index iconEnable Trusted Extensions
index iconEnable Trusted Extensions
removing Trusted Extensionsindex iconHow to Remove Trusted Extensions From the System
labeld service
disablingindex iconHow to Remove Trusted Extensions From the System
enablingindex iconInstalling and Enabling Trusted Extensions
labeled IPsec  Seeindex iconIPsec
labeled multicast packetsindex iconTrusted Extensions Multicast Packets
labeled printing
banner pagesindex iconLabeled Banner and Trailer Pages
body pagesindex iconLabeled Body Pages
removing labelindex iconHow to Create a Rights Profile for Convenient Authorizations
without banner pageindex iconHow to Create a Rights Profile for Convenient Authorizations
Labeled Zone Manager  Seeindex icontxzonemgr script
labeled zones  Seeindex iconzones
labeling
turning on labelsindex iconLog In to Trusted Extensions
zonesindex iconHow to Create Labeled Zones Interactively
Labeling Hosts and Networks (Tasks)index iconLabeling Hosts and Networks
labels  See Alsoindex iconlabel ranges
accreditation in tunnel modeindex iconLabels and Accreditation in Tunnel Mode IPsec
authorizing a user or role to change label of dataindex iconHow to Enable a User to Change the Security Level of Data
Change Workspace Label menu itemindex iconUnique Trusted Extensions Security Features
classification componentindex iconDominance Relationships Between Labels
compartment componentindex iconDominance Relationships Between Labels
configuring rules for label changesindex iconsel_config File
default in remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
describedindex iconTrusted Extensions and Access Control
determining text equivalentsindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
displaying in hexadecimalindex iconHow to Obtain the Hexadecimal Equivalent for a Label
displaying labels of file systems in labeled zoneindex iconDisplaying the Labels of File Systems in the restricted Zone
dominanceindex iconDominance Relationships Between Labels
downgrading and upgradingindex iconsel_config File
extensions for IKE SAsindex iconLabel Extensions for IKE
extensions for IPsec SAsindex iconLabel Extensions for IPsec Security Associations
of processesindex iconWhat Labels Protect and Where Labels Appear
of user processesindex iconSession Range
on IPsec exchangesindex iconLabels for IPsec-Protected Exchanges
on printoutsindex iconLabeled Printer Output
overviewindex iconLabels in Trusted Extensions Software
planningindex iconDevising a Label Strategy
printing without page labelsindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output
relationshipsindex iconDominance Relationships Between Labels
repairing in internal databasesindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
Selection Manager dialog boxindex iconUnique Trusted Extensions Security Features
specifying for zonesindex iconHow to Create Labeled Zones Interactively
troubleshootingindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
TrustedExtensionsPolicy fileindex iconUnique Trusted Extensions Security Features
well-formedindex iconLabel Ranges
laptops
planningindex iconPlanning for Multilevel Services
LDAP
displaying entriesindex iconQuick Reference for the LDAP Naming Service in Trusted Extensions
managing the naming serviceindex iconQuick Reference for the LDAP Naming Service in Trusted Extensions
naming service for Trusted Extensionsindex iconUsing the LDAP Naming Service in Trusted Extensions
planningindex iconPlanning for the LDAP Naming Service in Trusted Extensions
starting proxy serverindex iconQuick Reference for the LDAP Naming Service in Trusted Extensions
starting serverindex iconQuick Reference for the LDAP Naming Service in Trusted Extensions
stopping proxy serverindex iconQuick Reference for the LDAP Naming Service in Trusted Extensions
stopping serverindex iconQuick Reference for the LDAP Naming Service in Trusted Extensions
troubleshootingindex iconHow to Debug a Client's Connection to the LDAP Server
Trusted Extensions databasesindex iconUsing the LDAP Naming Service in Trusted Extensions
LDAP configuration
creating clientindex iconMake the Global Zone an LDAP Client in Trusted Extensions
for Trusted Extensionsindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
NFS servers, andindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
Sun Ray servers, andindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
LDAP server
collecting information forindex iconCollect Information for the LDAP Server
configuring multilevel portindex iconConfigure a Multilevel Port for the Oracle Directory Server Enterprise Edition
configuring naming serviceindex iconInstall the Oracle Directory Server Enterprise Edition
configuring proxy for Trusted Extensions clientsindex iconCreating a Trusted Extensions Proxy for an Existing Oracle Directory Server Enterprise Edition
creating proxy for Trusted Extensions clientsindex iconCreate an LDAP Proxy Server
installing in Trusted Extensionsindex iconInstall the Oracle Directory Server Enterprise Edition
protecting log filesindex iconConfigure the Logs for the Oracle Directory Server Enterprise Edition
limiting
defined hosts on the networkindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
localizing
configuring labeled printoutsindex icontsol_separator.ps Configuration File
LOFS
mounting datasets in Trusted Extensionsindex iconMount Possibilities in Trusted Extensions
log files
protecting LDAP Server logsindex iconConfigure the Logs for the Oracle Directory Server Enterprise Edition
logging in
to a home directory server
index iconHow to Enable Users to Access Their Remote Home Directories by Configuring the Automounter on Each Server
index iconHow to Enable Users to Access Their Remote Home Directories at Every Label by Logging In to Each NFS Server
using ssh commandindex iconHow to Log In and Administer a Remote Trusted Extensions System
login
by rolesindex iconRoles in Trusted Extensions
remoteindex iconEnable Remote Administration of a Remote Trusted Extensions System
logout
requiringindex iconChanging the System's Idle Settings

M

MAC  Seeindex iconmandatory access control (MAC)
mail
administeringindex iconAbout Multilevel Mail in Trusted Extensions
implementation in Trusted Extensionsindex iconTrusted Extensions Mail Features
multilevelindex iconMultilevel Mail Service
man pages
quick reference for Trusted Extensions administratorsindex iconList of Trusted Extensions Man Pages
managing  Seeindex iconadministering
Managing Devices in Trusted Extensions (Task Map)index iconManaging Devices in Trusted Extensions
Managing Printing in Trusted Extensions (Task Map)index iconManaging Printing in Trusted Extensions
Managing Users and Rights (Task Map)index iconManaging Users and Rights
Managing Zones (Task Map)index iconManaging Zones
mandatory access control (MAC)
enforcing on the networkindex iconAbout the Trusted Network
in Trusted Extensionsindex iconTrusted Extensions and Access Control
maximum labels
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
media
copying files from removableindex iconHow to Copy Files From Portable Media in Trusted Extensions
minimum labels
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
MLPs  Seeindex iconmultilevel ports (MLPs)
mlslabel property
ADMIN_HIGH label andindex iconmlslabel Property and Mounting Single-Level File Systems
modifying
label_encodings fileindex iconHow to Check and Install Your Label Encodings File
mounting
file systemsindex iconHow to Share File Systems From a Labeled Zone
files by loopback mountingindex iconHow to Loopback Mount a File That Is Usually Not Visible in a Labeled Zone
overviewindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
troubleshootingindex iconHow to Troubleshoot Mount Failures in Trusted Extensions
ZFS dataset on labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
mounting datasets in Trusted Extensionsindex iconMount Possibilities in Trusted Extensions
multicast packetsindex iconTrusted Extensions Multicast Packets
multiheaded system
trusted stripeindex iconMultiheaded Systems and the Trusted Extensions Desktop
multilevel datasets
creatingindex iconHow to Create and Share a Multilevel Dataset
overviewindex iconMultilevel Datasets for Relabeling Files
multilevel mounts
NFS protocol versionsindex iconTrusted Extensions Software and NFS Protocol Versions
multilevel ports (MLPs)
administeringindex iconDisplaying Multilevel Ports on a System
example of NFSv3 MLPindex iconConfiguring a Private Multilevel Port for NFSv3 Over udp
example of web proxy MLPindex iconHow to Create a Multilevel Port for a Zone
multilevel printing
accessing by print clientindex iconHow to Enable a Trusted Extensions Client to Access a Printer
configuring
index iconHow to Configure a Network Printer
index iconHow to Configure a Multilevel Print Server and Its Printers
multilevel server
planningindex iconPlanning for Multilevel Services

N

name service cache daemon  Seeindex iconnscd daemon
names
specifying for zonesindex iconHow to Create Labeled Zones Interactively
names of file systemsindex iconHow to Share File Systems From a Labeled Zone
naming
zonesindex iconHow to Create Labeled Zones Interactively
naming services
databases unique to Trusted Extensionsindex iconUsing the LDAP Naming Service in Trusted Extensions
LDAPindex iconAbout Trusted Extensions and LDAP
managing LDAPindex iconQuick Reference for the LDAP Naming Service in Trusted Extensions
net_mac_aware privilegeindex iconHow to Disable the Mounting of Lower-Level Files
netstat command
index iconHow to Debug the Trusted Extensions Network
index iconNetwork Commands in Trusted Extensions
network
  Seeindex icontrusted network
  Seeindex iconTrusted Extensions network
network databases
descriptionindex iconNetwork Configuration Databases in Trusted Extensions
in LDAPindex iconUsing the LDAP Naming Service in Trusted Extensions
network packetsindex iconTrusted Extensions Data Packets
networking conceptsindex iconTrusted Network Communications
NFS
mounting datasets in Trusted Extensionsindex iconMount Possibilities in Trusted Extensions
NFS mounts
accessing lower-level directoriesindex iconNFS Server and Client Configuration in Trusted Extensions
in global and labeled zonesindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
NFS servers
LDAP servers, andindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
nonallocatable devices
protectingindex iconHow to Protect Nonallocatable Devices in Trusted Extensions
setting label rangeindex iconEffects of Label Range on a Device
nscd daemon
adding to every labeled zoneindex iconHow to Configure a Separate Name Service for Each Labeled Zone

O

Oracle Directory Server Enterprise Edition  Seeindex iconLDAP server
Oracle Solaris OS
differences from Trusted Extensionsindex iconDifferences Between Trusted Extensions and the Oracle Solaris OS
differences from Trusted Extensions auditingindex iconAuditing in Trusted Extensions
similarities with Trusted Extensionsindex iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
similarities with Trusted Extensions auditingindex iconAuditing in Trusted Extensions

P

packages
Trusted Extensions featureindex iconAdd Trusted Extensions Packages to an Oracle Solaris System
panels
moving to bottom of screenindex iconHow to Move Desktop Panels to the Bottom of the Screen
passwords
assigningindex iconSecurity Attribute Assignment to Users in Trusted Extensions
Change Password menu item
index iconHow to Change the Password for root on a Desktop System
index iconUnique Trusted Extensions Security Features
changing for rootindex iconHow to Change the Password for root on a Desktop System
changing in labeled zoneindex iconHow to Enforce a New Local User Password in a Labeled Zone
changing user passwordsindex iconUnique Trusted Extensions Security Features
providing when changing labels
index iconUnique Trusted Extensions Security Features
index iconUnique Trusted Extensions Security Features
index iconUnique Trusted Extensions Security Features
storageindex iconPassword Protection
testing if password prompt is trustedindex iconTesting If the Password Prompt Can Be Trusted
planning  See Alsoindex iconTrusted Extensions use
account creationindex iconPlanning User Security in Trusted Extensions
administration strategyindex iconPlanning Who Will Configure Trusted Extensions
auditingindex iconPlanning for Auditing in Trusted Extensions
hardwareindex iconPlanning System Hardware and Capacity for Trusted Extensions
labelsindex iconDevising a Label Strategy
laptop configurationindex iconPlanning for Multilevel Services
LDAP naming serviceindex iconPlanning for the LDAP Naming Service in Trusted Extensions
networkindex iconPlanning Your Trusted Network
Trusted Extensionsindex iconPlanning for Security in Trusted Extensions
Trusted Extensions configuration strategyindex iconForming an Install Team for Trusted Extensions
zonesindex iconPlanning Your Labeled Zones in Trusted Extensions
policy.conf file
changing defaultsindex iconHow to Change Security Defaults in System Files
changing Trusted Extensions keywordsindex iconChanging the System's Idle Settings
defaultsindex iconpolicy.conf File Defaults in Trusted Extensions
how to editindex iconHow to Modify policy.conf Defaults
preventing  Seeindex iconprotecting
Print without Banner authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
Print without Label authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
printed output  Seeindex iconprinting
printer output  Seeindex iconprinting
printers
setting label rangeindex iconEffects of Label Range on a Device
printing
and label_encodings fileindex iconLabel Encodings File
authorizationsindex iconTrusted Extensions Print Interfaces (Reference)
authorizations for unlabeled output from a public systemindex iconAssigning Printing-Related Authorizations to All Users of a System
configuring for multilevel labeled output
index iconHow to Configure a Network Printer
index iconHow to Configure a Multilevel Print Server and Its Printers
configuring for print clientindex iconHow to Enable a Trusted Extensions Client to Access a Printer
configuring labeled zoneindex iconHow to Configure a Zone as a Single-Level Print Server
configuring labels and textindex icontsol_separator.ps Configuration File
configuring public print jobsindex iconSending Public Print Jobs to an Unlabeled Printer
in local languageindex icontsol_separator.ps Configuration File
internationalizing labeled outputindex icontsol_separator.ps Configuration File
labeling an Oracle Solaris print serverindex iconHow to Assign a Label to an Unlabeled Print Server
localizing labeled outputindex icontsol_separator.ps Configuration File
managingindex iconLabels, Printers, and Printing
PostScriptindex iconPostScript Printing of Security Information
preventing labels on outputindex iconHow to Remove Banner and Trailer Pages
public jobs from an Oracle Solaris print serverindex iconSending Public Print Jobs to an Unlabeled Printer
using an Oracle Solaris print serverindex iconHow to Assign a Label to an Unlabeled Print Server
without labeled banners and trailersindex iconHow to Create a Rights Profile for Convenient Authorizations
without page labels
index iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output
index iconHow to Create a Rights Profile for Convenient Authorizations
printouts  Seeindex iconprinting
privileges
changing defaults for usersindex iconSecurity Attribute Assignment to Users in Trusted Extensions
non-obvious reasons for requiringindex iconEvaluating Software for Security
removing proc_info from basic setindex iconModifying Every User's Basic Privilege Set
restricting users'index iconHow to Restrict a User's Set of Privileges
when executing commandsindex iconHow to Enter the Global Zone in Trusted Extensions
proc_info privilege
removing from basic setindex iconModifying Every User's Basic Privilege Set
procedures  Seeindex icontasks and task maps
processes
labels ofindex iconWhat Labels Protect and Where Labels Appear
labels of user processesindex iconSession Range
preventing users from seeing others' processesindex iconModifying Every User's Basic Privilege Set
profiles  Seeindex iconrights profiles
programs  Seeindex iconapplications
protecting
devices
index iconDevice Protection With Trusted Extensions Software
index iconDevice Manager
devices from remote allocationindex iconPreventing Remote Allocation of the Audio Device
file systems by using non-proprietary namesindex iconHow to Share File Systems From a Labeled Zone
files at lower labels from being accessedindex iconHow to Disable the Mounting of Lower-Level Files
information with labelsindex iconWhat Labels Protect and Where Labels Appear
labeled hosts from access by arbitrary hostsindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
nonallocatable devicesindex iconHow to Protect Nonallocatable Devices in Trusted Extensions
proxy server
starting and stopping LDAPindex iconQuick Reference for the LDAP Naming Service in Trusted Extensions
publications
security and UNIXindex iconAdditional Security References

R

real UID of root
required for applicationsindex iconEvaluating Software for Security
rebooting
activating labelsindex iconLog In to Trusted Extensions
enabling login to labeled zoneindex iconHow to Enable Users to Log In to a Labeled Zone
Reducing Printing Restrictions in Trusted Extensions (Task Map)index iconReducing Printing Restrictions in Trusted Extensions
regaining control of desktop focusindex iconHow to Regain Control of the Desktop's Current Focus
regular users  Seeindex iconusers
relabeling data
eliminating IOindex iconHow to Create and Share a Multilevel Dataset
relabeling informationindex iconHow to Enable a User to Change the Security Level of Data
remote administration
defaultsindex iconRemote Administration in Trusted Extensions
methodsindex iconMethods for Administering Remote Systems in Trusted Extensions
remote host templates
0.0.0.0/0 wildcard assignmentindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
adding systems to
index iconHow to Add a Range of Hosts to a Security Template
index iconHow to Add a Host to a Security Template
assigningindex iconAdding Hosts to Security Templates
creatingindex iconCreating Security Templates
entry for Sun Ray serversindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
remote hosts
using fallback mechanism in tnrhdbindex iconTrusted Network Fallback Mechanism
Remote Login authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
remote multilevel desktop
accessingindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
remote systems
configuring for role assumptionindex iconEnable Remote Administration of a Remote Trusted Extensions System
removing
labels on printoutsindex iconHow to Remove Banner and Trailer Pages
zone-specific nscd daemonindex iconRemoving a Name Service Cache From Each Labeled Zone
removing Trusted Extensions  Seeindex icondisabling
repairing
labels in internal databasesindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
restoring control of desktop focusindex iconHow to Regain Control of the Desktop's Current Focus
restricting
access to computer based on labelindex iconEffects of Label Range on a Device
access to devicesindex iconDevice Protection With Trusted Extensions Software
access to global zoneindex iconRole Assumption in Trusted Extensions
access to lower-level filesindex iconHow to Disable the Mounting of Lower-Level Files
access to printers with labels
index iconRestricting Access to Printers and Print Job Information in Trusted Extensions
index iconDifferences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11
mounts of lower-level filesindex iconHow to Disable the Mounting of Lower-Level Files
printer access with labels
index iconRestricting Access to Printers and Print Job Information in Trusted Extensions
index iconDifferences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11
remote accessindex iconRemote Administration in Trusted Extensions
Revoke or Reclaim Device authorization
index iconHow to Assign Device Authorizations
index iconHow to Assign Device Authorizations
rights  Seeindex iconrights profiles
rights profiles
assigningindex iconSecurity Attribute Assignment to Users in Trusted Extensions
Convenient Authorizationsindex iconHow to Create a Rights Profile for Convenient Authorizations
with Allocate Device authorizationindex iconHow to Assign Device Authorizations
with device allocation authorizationsindex iconHow to Assign Device Authorizations
with new device authorizationsindex iconCreating and Assigning Trusted Path and Non-Trusted Path Device Authorizations
roadmaps
Task Map: Choosing a Trusted Extensions Configurationindex iconTask Map: Choosing a Trusted Extensions Configuration
Task Map: Configuring Trusted Extensions to Your Site's Requirementsindex iconTask Map: Configuring Trusted Extensions to Meet Your Site's Requirements
Task Map: Configuring Trusted Extensions With the Provided Defaultsindex iconTask Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Preparing For and Enabling Trusted Extensionsindex iconTask Map: Preparing for and Enabling Trusted Extensions
role workspace
global zoneindex iconRoles in Trusted Extensions
roleadd commandindex iconHow to Create the Security Administrator Role in Trusted Extensions
roles
adding LDAP role with roleaddindex iconCreating the Security Administrator Role in LDAP
adding local role with roleaddindex iconHow to Create the Security Administrator Role in Trusted Extensions
administering auditingindex iconRole Responsibilities for Audit Administration
assigning rightsindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assuming
index iconHow to Enter the Global Zone in Trusted Extensions
index iconRoles in Trusted Extensions
creatingindex iconRole Creation in Trusted Extensions
creating Security Administratorindex iconHow to Create the Security Administrator Role in Trusted Extensions
deciding if ARMORindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
determining when to createindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
leaving role workspaceindex iconHow to Exit the Global Zone in Trusted Extensions
trusted application accessindex iconAdministration Tools for Trusted Extensions
verifying they workindex iconHow to Verify That the Trusted Extensions Roles Work
workspacesindex iconRoles in Trusted Extensions
root role
adding device_clean scriptindex iconHow to Add a Device_Clean Script in Trusted Extensions
root UID
required for applicationsindex iconEvaluating Software for Security
route commandindex iconNetwork Commands in Trusted Extensions
routingindex iconAbout Routing in Trusted Extensions
accreditation checksindex iconTrusted Extensions Accreditation Checks
commands in Trusted Extensionsindex iconRouting Commands in Trusted Extensions
conceptsindex iconAdministration of Routing in Trusted Extensions
example ofindex iconGateways in Trusted Extensions
tables
index iconChoosing Routers in Trusted Extensions
index iconRouting Table Entries in Trusted Extensions
using route commandindex iconHow to Add Default Routes

S

scripts
/usr/bin/txzonemgrindex iconHow to Display Ready or Running Zones
/usr/sbin/txzonemgr
index iconZone Administration Utilities in Trusted Extensions
index iconTrusted Extensions Administrative Tools
getmountsindex iconHow to Display the Labels of Mounted Files
secure attention
key combinationindex iconHow to Regain Control of the Desktop's Current Focus
security
initial setup teamindex iconInitial Setup Team Responsibilities
publicationsindex iconAdditional Security References
site security policyindex iconSite Security Policy
Security Administrator role
administering printer securityindex iconLabels, Printers, and Printing
administering usersindex iconManaging Users and Rights
assigning authorizations to usersindex iconHow to Create a Rights Profile for Convenient Authorizations
configuring a deviceindex iconHow to Configure a Device by Using the Device Manager in Trusted Extensions
creatingindex iconHow to Create the Security Administrator Role in Trusted Extensions
creating Convenient Authorizations rights profileindex iconHow to Create a Rights Profile for Convenient Authorizations
enabling unlabeled body pages from a public systemindex iconAssigning Printing-Related Authorizations to All Users of a System
enforcing securityindex iconEnforcement of Device Security in Trusted Extensions
protecting nonallocatable devicesindex iconHow to Protect Nonallocatable Devices in Trusted Extensions
security administrators  Seeindex iconSecurity Administrator role
security attributesindex iconRouting Table Entries in Trusted Extensions
modifying defaults for all usersindex iconHow to Modify policy.conf Defaults
modifying user defaultsindex iconHow to Modify Default User Label Attributes
setting for remote hostsindex iconCreating Security Templates
using in routingindex iconHow to Add Default Routes
security information
on printoutsindex iconLabeled Printer Output
planning for Trusted Extensionsindex iconResolving Additional Issues Before Enabling Trusted Extensions
security label set
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
security mechanisms
extensibleindex iconExtension of Oracle Solaris Security Features by Trusted Extensions
Oracle Solarisindex iconSecurity Mechanisms for Oracle Solaris Software
security policy
auditingindex iconTrusted Extensions Audit Policy Options
training usersindex iconUsers and Security Requirements
users and devicesindex iconEnforcement of Device Security in Trusted Extensions
security templates  Seeindex iconremote host templates
sel_config file
index iconsel_config File
index iconsel_config File
selecting
audit records by labelindex iconAudit Tasks in Trusted Extensions
Selection Manager
configuring rules for selection confirmerindex iconsel_config File
default configurationindex iconRules When Changing the Level of Security for Data
Selection Manager dialog box
descriptionindex iconUnique Trusted Extensions Security Features
Service Management Framework (SMF)
dpadmindex iconInstall the Oracle Directory Server Enterprise Edition
dsadmindex iconInstall the Oracle Directory Server Enterprise Edition
session rangeindex iconSession Range
sessions
failsafeindex iconHow to Log In to a Failsafe Session in Trusted Extensions
Setting Up Remote Administration in Trusted Extensions (Task Map)index iconConfiguring and Administering Remote Systems in Trusted Extensions
sharing
IP addressesindex iconHow to Assign Labels to Two Zone Workspaces
with Vinoindex iconUsing Vino to Share a Desktop in a Test Environment
ZFS dataset from labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
Shutdown authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
similarities
between Trusted Extensions and Oracle Solaris auditingindex iconAuditing in Trusted Extensions
between Trusted Extensions and Oracle Solaris OSindex iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
single-label
loginindex iconAccount Label Range
printing in a zoneindex iconHow to Configure a Zone as a Single-Level Print Server
site security policy
common violationsindex iconCommon Security Violations
personnel recommendationsindex iconPersonnel Security Recommendations
physical access recommendationsindex iconPhysical Security Recommendations
recommendationsindex iconComputer Security Recommendations
tasks involvedindex iconSite Security Policy
Trusted Extensions configuration decisionsindex iconSite Security Policy and Trusted Extensions
understandingindex iconUnderstanding Your Site's Security Policy
snoop command
index iconHow to Debug the Trusted Extensions Network
index iconNetwork Commands in Trusted Extensions
software
administering third-partyindex iconSoftware Management in Trusted Extensions
importingindex iconAdding Software to Trusted Extensions
solaris.print.admin
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.list
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.nobanner
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.nobanner authorizationindex iconAssigning Printing-Related Authorizations to All Users of a System
solaris.print.unlabeled
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.unlabeled authorizationindex iconAssigning Printing-Related Authorizations to All Users of a System
startup files
procedures for customizingindex iconHow to Configure Startup Files for Users in Trusted Extensions
Stop-A
enablingindex iconHow to Change Security Defaults in System Files
Sun Ray systems
0.0.0.0/32 address for client contactindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
enabling initial contact between client and serverindex iconConfiguring a Valid Initial Address for a Labeled Sun Ray Server
LDAP servers, andindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
preventing users from seeing others' processesindex iconModifying Every User's Basic Privilege Set
web site for documentationindex iconTask Map: Choosing a Trusted Extensions Configuration
System Administrator role
administering printersindex iconLabels, Printers, and Printing
creatingindex iconHow to Create a System Administrator Role
reclaiming a deviceindex iconHow to Revoke or Reclaim a Device in Trusted Extensions
reviewing audit recordsindex iconAudit Tasks in Trusted Extensions
system files
editingindex iconHow to Change Security Defaults in System Files
label_encodingsindex iconHow to Check and Install Your Label Encodings File
sel_configindex iconsel_config File
tsol_separator.psindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output

T

tasks and task maps
Additional Trusted Extensions Configuration Tasksindex iconAdditional Trusted Extensions Configuration Tasks
Common Tasks in Trusted Extensions Task Map)index iconPerforming Common Tasks in Trusted Extensions
Configuring LDAP on a Trusted Extensions Network (Task Map)index iconConfiguring LDAP on a Trusted Extensions Network
Configuring an LDAP Proxy Server on a Trusted Extensions System (Task Map)index iconConfiguring an LDAP Proxy Server on a Trusted Extensions System
Configuring Labeled IPsec (Task Map)index iconConfiguring Labeled IPsec
Configuring Labeled Printing (Task Map)index iconConfiguring Labeled Printing
Creating Labeled Zonesindex iconCreating Labeled Zones
Customizing Device Authorizations in Trusted Extensions (Task Map)index iconCustomizing Device Authorizations in Trusted Extensions
Customizing User Environment for Security (Task Map)index iconCustomizing the User Environment for Security
Getting Started as a Trusted Extensions Administrator Task Mapindex iconGetting Started as a Trusted Extensions Administrator on a Desktop System
Handling Devices in Trusted Extensions (Task Map)index iconHandling Devices in Trusted Extensions
Labeling Hosts and Networks (Tasks)index iconLabeling Hosts and Networks
Managing Devices in Trusted Extensions (Task Map)index iconManaging Devices in Trusted Extensions
Managing Printing in Trusted Extensions (Task Map)index iconManaging Printing in Trusted Extensions
Managing Users and Rightsindex iconManaging Users and Rights
Managing Zones (Task Map)index iconManaging Zones
Reducing Printing Restrictions in Trusted Extensions (Task Map)index iconReducing Printing Restrictions in Trusted Extensions
Setting Up Remote Administration in Trusted Extensions (Task Map)index iconConfiguring and Administering Remote Systems in Trusted Extensions
Task Map: Choosing a Trusted Extensions Configurationindex iconTask Map: Choosing a Trusted Extensions Configuration
Task Map: Configuring Trusted Extensions to Your Site's Requirementsindex iconTask Map: Configuring Trusted Extensions to Meet Your Site's Requirements
Task Map: Configuring Trusted Extensions With the Provided Defaultsindex iconTask Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Preparing For and Enabling Trusted Extensionsindex iconTask Map: Preparing for and Enabling Trusted Extensions
Troubleshooting the Trusted Network (Task Map)index iconTroubleshooting the Trusted Network
Using Devices in Trusted Extensions (Task Map)index iconUsing Devices in Trusted Extensions Task Map
Viewing Existing Security Templates (Tasks)index iconViewing Existing Security Templates
templates  Seeindex iconremote host templates
text label equivalents
determiningindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
tncfg command
creating a multilevel portindex iconHow to Create a Multilevel Port for a Zone
descriptionindex iconNetwork Commands in Trusted Extensions
modifying DOI valueindex iconHow to Configure a Different Domain of Interpretation
tnchkdb command
descriptionindex iconNetwork Commands in Trusted Extensions
tnctl command
descriptionindex iconNetwork Commands in Trusted Extensions
tnd command
descriptionindex iconNetwork Commands in Trusted Extensions
tninfo command
descriptionindex iconNetwork Commands in Trusted Extensions
usingindex iconHow to Debug a Client's Connection to the LDAP Server
tools  Seeindex iconadministrative tools
trailer pages  Seeindex iconbanner pages
translation  Seeindex iconlocalizing
troubleshooting
failed loginindex iconHow to Log In to a Failsafe Session in Trusted Extensions
IPv6 configurationindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
LDAPindex iconHow to Debug a Client's Connection to the LDAP Server
mounted file systemsindex iconHow to Troubleshoot Mount Failures in Trusted Extensions
networkindex iconTroubleshooting the Trusted Network
reclaiming a deviceindex iconHow to Revoke or Reclaim a Device in Trusted Extensions
repairing labels in internal databasesindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
Trusted Extensions configurationindex iconTroubleshooting Your Trusted Extensions Configuration
trusted networkindex iconHow to Debug the Trusted Extensions Network
verifying interface is upindex iconHow to Verify That a System's Interfaces Are Up
viewing ZFS dataset mounted in lower-level zoneindex iconSharing and Mounting a ZFS Dataset From Labeled Zones
Troubleshooting the Trusted Network (Task Map)index iconTroubleshooting the Trusted Network
trusted applications
in a role workspaceindex iconAdministration Tools for Trusted Extensions
Trusted Extensions  See Alsoindex iconTrusted Extensions planning
addingindex iconAdd Trusted Extensions Packages to an Oracle Solaris System
adding to Oracle Solarisindex iconInstalling and Enabling Trusted Extensions
decisions to make before enablingindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
differences from Oracle Solaris administrator's perspectiveindex iconResults of Enabling Trusted Extensions From an Administrator's Perspective
differences from Oracle Solaris auditingindex iconAuditing in Trusted Extensions
differences from Oracle Solaris OSindex iconDifferences Between Trusted Extensions and the Oracle Solaris OS
disablingindex iconHow to Remove Trusted Extensions From the System
enablingindex iconInstalling and Enabling Trusted Extensions
IPsec protectionsindex iconLabels for IPsec-Protected Exchanges
man pages quick referenceindex iconList of Trusted Extensions Man Pages
memory requirementsindex iconPlanning System Hardware and Capacity for Trusted Extensions
networkingindex iconTrusted Networking
planning configuration strategyindex iconForming an Install Team for Trusted Extensions
planning forindex iconPlanning for Security in Trusted Extensions
planning hardwareindex iconPlanning System Hardware and Capacity for Trusted Extensions
planning networkindex iconPlanning Your Trusted Network
preparing forindex iconResolving Security Issues Before Installing Trusted Extensions
quick reference to administrationindex iconQuick Reference to Trusted Extensions Administration
remote access to displayindex iconUsing Vino to Share a Desktop in a Test Environment
results before configurationindex iconResults of Enabling Trusted Extensions From an Administrator's Perspective
similarities with Oracle Solaris auditingindex iconAuditing in Trusted Extensions
similarities with Oracle Solaris OSindex iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
two-role configuration strategyindex iconForming an Install Team for Trusted Extensions
Trusted Extensions configuration
adding network databases to LDAP serverindex iconPopulate the Oracle Directory Server Enterprise Edition
changing default DOI valueindex iconHow to Configure a Different Domain of Interpretation
databases for LDAPindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
division of tasksindex iconInitial Setup Team Responsibilities
evaluated configurationindex iconUnderstanding Your Site's Security Policy
initial proceduresindex iconConfiguring Trusted Extensions
initial setup team responsibilitiesindex iconInitial Setup Team Responsibilities
labeled zonesindex iconCreating Labeled Zones
LDAPindex iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
reboot to activate labelsindex iconLog In to Trusted Extensions
remote systemsindex iconRemote Administration in Trusted Extensions
task mapsindex iconConfiguration Roadmap for Trusted Extensions
troubleshootingindex iconTroubleshooting Your Trusted Extensions Configuration
Trusted Extensions menu
Assume Roleindex iconHow to Enter the Global Zone in Trusted Extensions
Trusted Extensions network
adding zone-specific nscd daemonindex iconHow to Configure a Separate Name Service for Each Labeled Zone
enabling IPv6 for CIPSO packetsindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
planningindex iconPlanning Your Trusted Network
removing zone-specific nscd daemonindex iconRemoving a Name Service Cache From Each Labeled Zone
trusted grab
key combinationindex iconHow to Regain Control of the Desktop's Current Focus
trusted network
0.0.0.0/0 wildcard addressindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
0.0.0.0 tnrhdb entryindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
conceptsindex iconTrusted Networking
default labelingindex iconTrusted Extensions Accreditation Checks
example of routingindex iconGateways in Trusted Extensions
host typesindex iconHost Type and Template Name in Security Templates
labels and MAC enforcementindex iconAbout the Trusted Network
using templatesindex iconCreating Security Templates
Trusted Path
Device Managerindex iconDevice Manager GUI
trusted path attribute
when availableindex iconRoles and Trusted Extensions
trusted programs
addingindex iconDeveloper Responsibilities When Creating Trusted Programs
definedindex iconEvaluating Software for Security
trusted stripe
moving panels to bottom of screenindex iconHow to Move Desktop Panels to the Bottom of the Screen
on multiheaded systemindex iconMultiheaded Systems and the Trusted Extensions Desktop
warping pointer toindex iconForcing the Pointer to the Trusted Stripe
TrustedExtensionsPolicy file
descriptionindex iconUnique Trusted Extensions Security Features
trustworthy programsindex iconEvaluating Software for Security
tsol_separator.ps file
configurable valuesindex icontsol_separator.ps Configuration File
customizing labeled printingindex iconLabeled Printer Output
tsoljdsselmgr applicationindex iconRules When Changing the Level of Security for Data
txzonemgr scriptindex iconHow to Display Ready or Running Zones
–c optionindex iconHow to Create a Default Trusted Extensions System

U

/usr/bin/tsoljdsselmgr applicationindex iconRules When Changing the Level of Security for Data
/usr/lib/cups/filter/tsol_separator.ps fileindex iconLabeled Printer Output
/usr/local/scripts/getmounts scriptindex iconHow to Display the Labels of Mounted Files
/usr/sbin/txzonemgr script
index iconHow to Display Ready or Running Zones
index iconZone Administration Utilities in Trusted Extensions
index iconTrusted Extensions Administrative Tools
index iconHow to Create a Default Trusted Extensions System
/usr/share/gnome/sel_config fileindex iconsel_config File
unlabeled printing
configuringindex iconReducing Printing Restrictions in Trusted Extensions
updatehome commandindex icon.copy_files and .link_files Files
Upgrade DragNDrop or CutPaste Info authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
Upgrade File Label authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
upgrading labels
configuring rules for selection confirmerindex iconsel_config File
useradd commandindex iconUsing the useradd Command to Create a Local User
users
accessing devices
index iconDevice Protection With Trusted Extensions Software
index iconDevice Protection With Trusted Extensions Software
accessing printersindex iconLabels, Printers, and Printing
adding local user with useraddindex iconUsing the useradd Command to Create a Local User
assigning authorizations toindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning labelsindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning passwordsindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning rightsindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning roles toindex iconSecurity Attribute Assignment to Users in Trusted Extensions
authorizations forindex iconHow to Create a Rights Profile for Convenient Authorizations
Change Password menu itemindex iconUnique Trusted Extensions Security Features
Change Workspace Label menu itemindex iconUnique Trusted Extensions Security Features
changing default privilegesindex iconSecurity Attribute Assignment to Users in Trusted Extensions
creatingindex iconAdministrator Responsibilities for Users
creating initial usersindex iconHow to Create Users Who Can Assume Roles in Trusted Extensions
customizing environmentindex iconCustomizing the User Environment for Security
deletion precautionsindex iconUser Deletion Practices
labels of processesindex iconSession Range
logging in to a failsafe sessionindex iconHow to Log In to a Failsafe Session in Trusted Extensions
modifying security defaultsindex iconHow to Modify Default User Label Attributes
modifying security defaults for all usersindex iconHow to Modify policy.conf Defaults
planning forindex iconDecisions to Make Before Creating Users in Trusted Extensions
preventing account lockingindex iconHow to Prevent Account Locking for Users
preventing from seeing others' processesindex iconModifying Every User's Basic Privilege Set
printingindex iconLabels, Printers, and Printing
removing some privilegesindex iconHow to Restrict a User's Set of Privileges
restoring control of desktop focusindex iconHow to Regain Control of the Desktop's Current Focus
security precautionsindex iconGroup Administration Practices
security training
index iconEnforcement of Device Security in Trusted Extensions
index iconGroup Administration Practices
index iconSecurity Requirements Enforcement
Selection Manager dialog boxindex iconUnique Trusted Extensions Security Features
session rangeindex iconSession Range
setting up skeleton directoriesindex iconHow to Configure Startup Files for Users in Trusted Extensions
startup filesindex iconHow to Configure Startup Files for Users in Trusted Extensions
TrustedExtensionsPolicy fileindex iconUnique Trusted Extensions Security Features
using .copy_files fileindex iconHow to Configure Startup Files for Users in Trusted Extensions
using .link_files fileindex iconHow to Configure Startup Files for Users in Trusted Extensions
using devicesindex iconUsing Devices in Trusted Extensions Task Map
Using Devices in Trusted Extensions (Task Map)index iconUsing Devices in Trusted Extensions Task Map
utadm command
default Sun Ray server configurationindex iconConfiguring a Valid Initial Address for a Labeled Sun Ray Server

V

verifying
interface is upindex iconHow to Verify That a System's Interfaces Are Up
label_encodings fileindex iconHow to Check and Install Your Label Encodings File
roles are workingindex iconHow to Verify That the Trusted Extensions Roles Work
viewing  Seeindex iconaccessing
Vino
sharing desktopsindex iconUsing Vino to Share a Desktop in a Test Environment
virtual network computing (VNC)  Seeindex iconXvnc systems running Trusted Extensions

W

well-formed labelsindex iconLabel Ranges
wildcard address  Seeindex iconfallback mechanism
wire labelindex iconLabels for IPsec-Protected Exchanges
workspaces
color changesindex iconHow to Enter the Global Zone in Trusted Extensions
colors indicating label ofindex iconWhat Labels Protect and Where Labels Appear
global zoneindex iconRoles in Trusted Extensions

X

X audit classesindex iconTrusted Extensions Audit Classes
xatom audit tokenindex iconxatom Token
xcolormap audit tokenindex iconxcolormap Token
xcursor audit tokenindex iconxcursor Token
xfont audit tokenindex iconxfont Token
xgc audit tokenindex iconxgc Token
xpixmap audit tokenindex iconxpixmap Token
xproperty audit tokenindex iconxproperty Token
xselect audit tokenindex iconxselect Token
Xvnc
accessing multilevel remotelyindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
Xvnc systems running Trusted Extensions
remote access to
index iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
index iconMethods for Administering Remote Systems in Trusted Extensions
xwindow audit tokenindex iconxwindow Token

Z

zenity scriptindex iconHow to Create a Default Trusted Extensions System
ZFS
adding dataset to labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
fast zone creation methodindex iconZone Creation in Trusted Extensions
mounting dataset read-write on labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
mounting datasets in Trusted Extensionsindex iconMount Possibilities in Trusted Extensions
multilevel datasets
index iconMount Possibilities in Trusted Extensions
index iconHow to Create and Share a Multilevel Dataset
viewing mounted dataset read-only from higher-level zoneindex iconSharing and Mounting a ZFS Dataset From Labeled Zones
zones
adding nscd daemon to each labeled zoneindex iconHow to Configure a Separate Name Service for Each Labeled Zone
administeringindex iconManaging Zones
creating MLPindex iconHow to Create a Multilevel Port for a Zone
creating MLP for NFSv3index iconConfiguring a Private Multilevel Port for NFSv3 Over udp
creating secondaryindex iconHow to Create a Secondary Labeled Zone
deciding creation methodindex iconPlanning Your Labeled Zones in Trusted Extensions
deletingindex iconHow to Remove Trusted Extensions From the System
displaying labels of file systemsindex iconDisplaying the Labels of File Systems in the restricted Zone
displaying statusindex iconHow to Display Ready or Running Zones
enabling login toindex iconHow to Enable Users to Log In to a Labeled Zone
for isolating labeled servicesindex iconHow to Create a Secondary Labeled Zone
globalindex iconZones in Trusted Extensions
global zone processes andindex iconGlobal Zone Processes and Labeled Zones
immutable and Trusted Extensionsindex iconCreating Labeled Zones
in Trusted Extensionsindex iconManaging Zones in Trusted Extensions
kernel and Trusted Extensionsindex iconCreating Labeled Zones
managingindex iconManaging Zones in Trusted Extensions
net_mac_aware privilegeindex iconHow to NFS Mount Files in a Labeled Zone
primaryindex iconPrimary and Secondary Labeled Zones
removing nscd daemon from labeled zonesindex iconRemoving a Name Service Cache From Each Labeled Zone
secondaryindex iconPrimary and Secondary Labeled Zones
specifying labelsindex iconHow to Create Labeled Zones Interactively
specifying namesindex iconHow to Create Labeled Zones Interactively
txzonemgr scriptindex iconHow to Create a Default Trusted Extensions System