JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

P

packages, accessing the media, How to Add a Software Package in Trusted Extensions
passwords
assigning, Security Attribute Assignment to Users in Trusted Extensions
Change Password menu item
Trusted Extensions Security Features
How to Change the Password for root
changing for root, How to Change the Password for root
changing user passwords, Trusted Extensions Security Features
storage, Password Protection
testing if password prompt is trusted, How to Regain Control of the Desktop's Current Focus
plabel command, Command Line Tools in Trusted Extensions
policy.conf file
changing defaults, How to Change Security Defaults in System Files
changing Trusted Extensions keywords, How to Modify policy.conf Defaults
defaults, policy.conf File Defaults in Trusted Extensions
how to edit, How to Modify policy.conf Defaults
PostScript
enabling to print, How to Enable Users to Print PostScript Files in Trusted Extensions
printing restrictions in Trusted Extensions, PostScript Printing of Security Information
preventing, See protecting
Print Postscript authorization
How to Create a Rights Profile for Convenient Authorizations
PostScript Printing of Security Information
How to Enable Users to Print PostScript Files in Trusted Extensions
Print without Banner authorization
How to Create a Rights Profile for Convenient Authorizations
How to Suppress Banner and Trailer Pages for Specific Users
Print without Label authorization, How to Create a Rights Profile for Convenient Authorizations
printer output, See printing
printers, setting label range, Effects of Label Range on a Device
printing
adding conversion filters, Additional Conversion Filters
and label_encodings file, Label Encodings File
authorizations for unlabeled output from a public system, How to Modify policy.conf Defaults
configuring for multilevel labeled output, How to Configure a Multilevel Print Server and Its Printers
configuring for print client, How to Enable a Trusted Extensions Client to Access a Printer
configuring for Sun Ray clients, How to Configure a Network Printer for Sun Ray Clients
configuring labeled zone, How to Configure a Zone for Single-Label Printing
configuring labels and text, Labeled Banner and Trailer Pages
configuring public print jobs, How to Assign a Label to an Unlabeled Print Server
in local language, Labeled Banner and Trailer Pages
internationalizing labeled output, Labeled Banner and Trailer Pages
interoperability with Trusted Solaris 8, Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
labeling an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
localizing labeled output, Labeled Banner and Trailer Pages
managing, Labels, Printers, and Printing
model scripts, Printer Model Scripts
PostScript files, How to Enable Users to Print PostScript Files in Trusted Extensions
PostScript restrictions in Trusted Extensions, PostScript Printing of Security Information
preventing labels on output, How to Remove Labels From Printed Output
public jobs from an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
removing PostScript restriction, How to Create a Rights Profile for Convenient Authorizations
restricting label range, How to Configure a Restricted Label Range for a Printer
using an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
without labeled banners and trailers
How to Create a Rights Profile for Convenient Authorizations
How to Suppress Banner and Trailer Pages for Specific Users
without page labels
How to Create a Rights Profile for Convenient Authorizations
How to Remove Page Labels From All Print Jobs
privileges
changing defaults for users, Security Attribute Assignment to Users in Trusted Extensions
non-obvious reasons for requiring, Evaluating Software for Security
removing proc_info from basic set, How to Modify policy.conf Defaults
restricting users', How to Restrict a User's Set of Privileges
when executing commands, How to Enter the Global Zone in Trusted Extensions
proc_info privilege, removing from basic set, How to Modify policy.conf Defaults
procedures, See tasks and task maps
processes
labels of, What Labels Protect and Where Labels Appear
labels of user processes, Label Ranges
preventing users from seeing others' processes, How to Modify policy.conf Defaults
profiles, See rights profiles
programs, See applications
protecting
devices
Device Allocation Manager
Device Protection With Trusted Extensions Software
devices from remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions
file systems by using non-proprietary names, How to Share Directories From a Labeled Zone
files at lower labels from being accessed, How to Disable the Mounting of Lower-Level Files
from access by arbitrary hosts, How to Limit the Hosts That Can Be Contacted on the Trusted Network
information with labels, What Labels Protect and Where Labels Appear
labeled hosts from contact by arbitrary unlabeled hosts, How to Limit the Hosts That Can Be Contacted on the Trusted Network
nonallocatable devices, How to Protect Nonallocatable Devices in Trusted Extensions