Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017
 
 
Part II

Administration of Trusted Extensions

The chapters in this part describe how to administer Trusted Extensions.

Trusted Extensions Administration Concepts introduces the Trusted Extensions feature.

Trusted Extensions Administration Tools describes the administrative programs that are specific to Trusted Extensions.

About Security Requirements on a Trusted Extensions System describes the fixed and configurable security requirements in Trusted Extensions.

Common Tasks in Trusted Extensions introduces Trusted Extensions administration.

About Users, Rights, and Roles in Trusted Extensions introduces role-based access control (RBAC) in Trusted Extensions.

Managing Users, Rights, and Roles in Trusted Extensions provides instructions on managing regular users of Trusted Extensions.

Remote Administration in Trusted Extensions provides instructions on remotely administering Trusted Extensions.

Managing Zones in Trusted Extensions provides instructions on managing labeled zones.

Managing and Mounting Files in Trusted Extensions provides instructions on managing mounting, backing up the system, and other file-related tasks in Trusted Extensions.

Trusted Networking provides an overview of the network databases and routing in Trusted Extensions.

Managing Networks in Trusted Extensions provides instructions on managing the network databases and routing in Trusted Extensions.

About Trusted Extensions and LDAP describes mail-specific issues in Trusted Extensions.

About Multilevel Mail in Trusted Extensions describes mail-specific issues in Trusted Extensions.

Managing Labeled Printing provides instructions on handling printing in Trusted Extensions.

About Devices in Trusted Extensions describes the extensions Trusted Extensions provides to device protection in Oracle Solaris.

Managing Devices for Trusted Extensions provides instructions on managing devices by using the Device Manager.

Trusted Extensions and Auditing provides Trusted Extensions-specific information about auditing.

Software Management in Trusted Extensions describes how to administer applications on a Trusted Extensions system.

Chapter 6

Trusted Extensions Administration Concepts

This chapter introduces you to administering a system that is configured with the Trusted Extensions feature.