JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

S

scripts
getmounts, How to Display the Labels of Mounted Files
getzonelabels, How to Display Ready or Running Zones
/usr/sbin/txzonemgr
Administration Tools for Trusted Extensions
Zone Administration Utilities in Trusted Extensions
secure attention, key combination, How to Regain Control of the Desktop's Current Focus
Security Administrator role
administering network of users, Managing Users and Rights With the Solaris Management Console (Task Map)
administering PostScript restriction, PostScript Printing of Security Information
administering printer security, Labels, Printers, and Printing
assigning authorizations to users, How to Create a Rights Profile for Convenient Authorizations
audit tasks, Audit Tasks of the Security Administrator
configuring a device, How to Configure a Device in Trusted Extensions
configuring serial line for login, How to Configure a Serial Line for Logins
creating Convenient Authorizations rights profile, How to Create a Rights Profile for Convenient Authorizations
enabling unlabeled body pages from a public system, How to Modify policy.conf Defaults
enforcing security, Enforcement of Device Security in Trusted Extensions
modifying window configuration files, Front Panel Customization
protecting nonallocatable devices, How to Protect Nonallocatable Devices in Trusted Extensions
security administrators, See Security Administrator role
security attributes, Routing Table Entries in Trusted Extensions
modifying defaults for all users, How to Modify policy.conf Defaults
modifying user defaults, How to Modify Default User Label Attributes
setting for remote hosts, How to Construct a Remote Host Template
using in routing, How to Configure Routes With Security Attributes
security information, on printer output, Labeled Printer Output
security label set, remote host templates, Network Security Attributes in Trusted Extensions
security mechanisms
extensible, Extension of Oracle Solaris Security Mechanisms by Trusted Extensions
Oracle Solaris, Oracle Solaris Security Mechanisms for Software
security policy
auditing, Trusted Extensions Audit Policy Options
training users, Users and Security Requirements
users and devices, Enforcement of Device Security in Trusted Extensions
security templates, See remote host templates
Security Templates tool
Trusted Extensions Tools in the Solaris Management Console
Security Templates Tool
assigning templates, How to Assign a Security Template to a Host or a Group of Hosts
modifying tnrhdb
Configuring Trusted Network Databases (Task Map)
Configuring Trusted Network Databases (Task Map)
using, How to Open the Trusted Networking Tools
sel_config file, sel_config File
action for editing, Trusted CDE Actions
configuring selection transfer rules, sel_config File
sel_mgr application, Rules When Changing the Level of Security for Data
selecting, audit records by label, Audit Tasks of the System Administrator
Selection Confirmer, changing defaults, sel_config File
Selection Manager
changing timeout, How to Lengthen the Timeout When Relabeling Information
configuring rules for selection confirmer, sel_config File
Selection Manager application, Rules When Changing the Level of Security for Data
serial line, configuring for logins, How to Configure a Serial Line for Logins
service management facility (SMF), Trusted Extensions service, What's New in Trusted Extensions
session range, Label Ranges
sessions, failsafe, How to Log In to a Failsafe Session in Trusted Extensions
Set Daily Message action, Trusted CDE Actions
Set Default Routes action, Trusted CDE Actions
Set DNS Servers action, Trusted CDE Actions
setlabel command, Command Line Tools in Trusted Extensions
Share Filesystems action, Trusted CDE Actions
Share Logical Interface action, Trusted CDE Actions
Share Physical Interface action, Trusted CDE Actions
sharing, ZFS dataset from labeled zone, How to Share a ZFS Dataset From a Labeled Zone
Shut Down Zone action, Trusted CDE Actions
Shutdown authorization, How to Create a Rights Profile for Convenient Authorizations
similarities
between Trusted Extensions and Oracle Solaris auditing, Trusted Extensions and Auditing
between Trusted Extensions and Oracle Solaris OS, Similarities Between Trusted Extensions and the Oracle Solaris OS
single-label operation, Label Ranges
single-label printing, configuring for a zone, How to Configure a Zone for Single-Label Printing
smtnrhdb command, Command Line Tools in Trusted Extensions
smtnrhtp command, Command Line Tools in Trusted Extensions
smtnzonecfg command, Command Line Tools in Trusted Extensions
snoop command
Network Commands in Trusted Extensions
How to Debug the Trusted Extensions Network
software
administering third-party, Software Management in Trusted Extensions (Tasks)
importing, Adding Software to Trusted Extensions
installing Java programs, How to Install a Java Archive File in Trusted Extensions
Solaris Management Console
administering trusted network, Configuring Trusted Network Databases (Task Map)
administering users, Managing Users and Rights With the Solaris Management Console (Task Map)
Computers and Networks tool, How to Add Hosts to the System's Known Network
description of tools and toolboxes, Solaris Management Console Tools
Security Templates tool
Security Templates Tool
How to Open the Trusted Networking Tools
starting, How to Administer the Local System With the Solaris Management Console
toolboxes, Solaris Management Console Tools
Trusted Network Zones tool, Trusted Network Zones Tool
solaris.print.nobanner authorization
How to Modify policy.conf Defaults
How to Suppress Banner and Trailer Pages for Specific Users
solaris.print.ps authorization, How to Enable Users to Print PostScript Files in Trusted Extensions
solaris.print.unlabeled authorization, How to Modify policy.conf Defaults
StarOffice, lengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Information
Start Zone action, Trusted CDE Actions
startup files, procedures for customizing, How to Configure Startup Files for Users in Trusted Extensions
Stop-A, enabling, How to Change Security Defaults in System Files
Sun Ray systems
configuring network printer, How to Configure a Network Printer for Sun Ray Clients
enabling initial contact between client and server, How to Limit the Hosts That Can Be Contacted on the Trusted Network
preventing users from seeing others' processes, How to Modify policy.conf Defaults
tnrhdb address for client contact, How to Limit the Hosts That Can Be Contacted on the Trusted Network
System Administrator role
adding device_clean script, How to Add a Device_Clean Script in Trusted Extensions
adding print conversion filters, Additional Conversion Filters
administering printers, Labels, Printers, and Printing
audit tasks, Audit Tasks of the System Administrator
enabling music to play automatically, How to Configure an Audio Player Program for Use in Trusted CDE
preventing File Manager display, How to Prevent the File Manager From Displaying After Device Allocation
reclaiming a device, How to Revoke or Reclaim a Device in Trusted Extensions
reviewing audit records, Audit Tasks of the System Administrator
system files
editing
How to Edit Administrative Files in Trusted Extensions
How to Change Security Defaults in System Files
Oracle Solaris /etc/default/print, How to Enable Users to Print PostScript Files in Trusted Extensions
Oracle Solaris policy.conf, How to Enable Users to Print PostScript Files in Trusted Extensions
Trusted Extensions sel_config, sel_config File
Trusted Extensions tsol_separator.ps, How to Remove Page Labels From All Print Jobs