Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017
 
 

Using This Documentation

  • Overview – Describes how to enable, configure, and maintain the Trusted Extensions feature of Oracle Solaris on one or more systems. Trusted Extensions software adds labels that implement mandatory access control (MAC) to protect system subjects (processes) and objects (data), including network endpoints and the desktop. Trusted Extensions software provides interfaces to handle label configuration, label assignment, and label policy.

  • Audience – System administrators of labeled systems and networks.

  • Required knowledge – Security labels and site security requirements.

Product Documentation Library

Documentation and resources for this product and related products are available at http://www.oracle.com/pls/topic/lookup?ctx=E53394-01.

Feedback

Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.