Transition to the Solaris Trusted Extensions Release
The Solaris Trusted Extensions Release
Overview of Changes From Trusted Solaris Software
Summary of Removed Trusted Solaris Features
Differences Between Trusted Solaris 8 Software and Solaris Trusted Extensions
Audit Events and Classes in Trusted Extensions
Device Management in Trusted Extensions
Files and File System Mounting in Trusted Extensions
Label APIs in Trusted Extensions
LDAP Naming Service in Trusted Extensions
Named Pipes in Trusted Extensions
Networking in Trusted Extensions
Packaging in Trusted Extensions
Printing in Trusted Extensions
Solaris Management Console in Trusted Extensions
Window System and CDE in Trusted Extensions
Privileges in Trusted Extensions
Trusted Extensions User Commands
Trusted Extensions System Administration Commands
Trusted Extensions System Calls
Trusted Extensions Library Functions
Trusted Extensions Databases and Files
Trusted Extensions Devices and Drivers
Differences Between Solaris 10 8/07 Software and Solaris Trusted Extensions
Installation and Configuration of Trusted Extensions
Desktops in Trusted Extensions
Security Attributes on CDE Actions in Trusted Extensions Software
Administration Tools in Trusted Extensions
Trusted Extensions Software and Removable Media
Additional Rights and Authorizations in Trusted Extensions
A. Interface Changes in the Solaris Trusted Extensions Release
The new interfaces in the Solaris Trusted Extensions release are listed in the following table by man page section number. The table includes some Solaris interfaces that perform critical functions for Trusted Extensions.
Only interfaces whose names have changed are included in the table. However, interfaces whose names have not changed might have different options or different functionality in this release. For a complete list, see Interface Changes in the Solaris Trusted Extensions Release.
Table 2 New Man Pages in Solaris Trusted Extensions Software
|