JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

T

tape devices, accessing, Device Protection With Trusted Extensions Software
tar command, Command Line Tools in Trusted Extensions
tasks and task maps
Administering Trusted Extensions Remotely (Task Map), Administering Trusted Extensions Remotely (Task Map)
Audit Tasks of the Security Administrator, Audit Tasks of the Security Administrator
Audit Tasks of the System Administrator, Audit Tasks of the System Administrator
Backing Up, Sharing, and Mounting Labeled Files (Task Map), Backing Up, Sharing, and Mounting Labeled Files (Task Map)
Common Tasks in Trusted Extensions (Task Map), Common Tasks in Trusted Extensions (Task Map)
Configuring Labeled Printing (Task Map), Configuring Labeled Printing (Task Map)
Configuring Routes and Checking Network Information in Trusted Extensions (Task Map), Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
Configuring Trusted Network Databases (Task Map), Configuring Trusted Network Databases (Task Map)
Customizing Device Authorizations in Trusted Extensions (Task Map), Customizing Device Authorizations in Trusted Extensions (Task Map)
Customizing User Environment for Security (Task Map), Customizing the User Environment for Security (Task Map)
Getting Started as a Trusted Extensions Administrator (Task Map), Getting Started as a Trusted Extensions Administrator (Task Map)
Handling Devices in Trusted Extensions (Task Map), Handling Devices in Trusted Extensions (Task Map)
Handling Other Tasks in the Solaris Management Console (Task Map), Handling Other Tasks in the Solaris Management Console (Task Map)
Managing Devices in Trusted Extensions (Task Map), Managing Devices in Trusted Extensions (Task Map)
Managing Printing in Trusted Extensions (Task Map), Managing Printing in Trusted Extensions (Task Map)
Managing Software in Trusted Extensions (Tasks), Managing Software in Trusted Extensions (Tasks)
Managing Trusted Networking (Task Map), Managing the Trusted Network (Task Map)
Managing Users and Rights With the Solaris Management Console, Managing Users and Rights With the Solaris Management Console (Task Map)
Managing Zones (Task Map), Managing Zones (Task Map)
Reducing Printing Restrictions in Trusted Extensions (Task Map), Reducing Printing Restrictions in Trusted Extensions (Task Map)
Troubleshooting the Trusted Network (Task Map), Troubleshooting the Trusted Network (Task Map)
Using Devices in Trusted Extensions (Tasks Map), Using Devices in Trusted Extensions (Task Map)
text label equivalents, determining, How to Obtain a Readable Label From Its Hexadecimal Form
Thunderbird, lengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Information
tnchkdb command
action for checking, Trusted CDE Actions
description, Network Commands in Trusted Extensions
summary, Command Line Tools in Trusted Extensions
tnctl command
description, Network Commands in Trusted Extensions
summary, Command Line Tools in Trusted Extensions
updating kernel cache, How to Synchronize the Kernel Cache With Trusted Network Databases
using, How to Synchronize the Kernel Cache With Trusted Network Databases
tnd command
description, Network Commands in Trusted Extensions
summary, Command Line Tools in Trusted Extensions
tninfo command
description, Network Commands in Trusted Extensions
summary, Command Line Tools in Trusted Extensions
using
How to Debug the Trusted Extensions Network
How to Debug a Client Connection to the LDAP Server
tnrhdb database
0.0.0.0 host address
Trusted Network Fallback Mechanism
How to Limit the Hosts That Can Be Contacted on the Trusted Network
0.0.0.0 wildcard address, How to Limit the Hosts That Can Be Contacted on the Trusted Network
action for checking, Trusted CDE Actions
adding to, How to Assign a Security Template to a Host or a Group of Hosts
configuring, Configuring Trusted Network Databases (Task Map)
entry for Sun Ray servers, How to Limit the Hosts That Can Be Contacted on the Trusted Network
fallback mechanism
Trusted Network Fallback Mechanism
Configuring Trusted Network Databases (Task Map)
tool for administering, Security Templates Tool
wildcard address, Configuring Trusted Network Databases (Task Map)
tnrhtp database
action for checking, Trusted CDE Actions
adding to, How to Construct a Remote Host Template
tool for administering, Security Templates Tool
toolboxes, defined, Solaris Management Console Tools
tools, See administrative tools
Tools subpanel, Device Allocation Manager, Device Allocation Manager GUI
trailer pages, See banner pages
translation, See localizing
troubleshooting
failed login, How to Log In to a Failsafe Session in Trusted Extensions
LDAP, How to Debug a Client Connection to the LDAP Server
mounted file systems, How to Troubleshoot Mount Failures in Trusted Extensions
network, Troubleshooting the Trusted Network (Task Map)
reclaiming a device, How to Revoke or Reclaim a Device in Trusted Extensions
repairing labels in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
trusted network, How to Debug the Trusted Extensions Network
verifying interface is up, How to Verify That a Host's Interfaces Are Up
viewing ZFS dataset mounted in lower-level zone, How to Share a ZFS Dataset From a Labeled Zone
Troubleshooting the Trusted Network (Task Map), Troubleshooting the Trusted Network (Task Map)
trusted actions, in CDE, Trusted CDE Actions
trusted applications, in a role workspace, Administration Tools for Trusted Extensions
trusted_edit trusted editor, How to Edit Administrative Files in Trusted Extensions
trusted editor
assigning your favorite editor, How to Assign the Editor of Your Choice as the Trusted Editor
starting, How to Edit Administrative Files in Trusted Extensions
Trusted Extensions
differences from Oracle Solaris auditing, Trusted Extensions and Auditing
differences from Oracle Solaris OS, Differences Between Trusted Extensions and the Oracle Solaris OS
man pages quick reference, List of Trusted Extensions Man Pages
quick reference to administration, Quick Reference to Trusted Extensions Administration
similarities with Oracle Solaris auditing, Trusted Extensions and Auditing
similarities with Oracle Solaris OS, Similarities Between Trusted Extensions and the Oracle Solaris OS
Trusted Extensions DOI, enabling DOI different from 1, What's New in Trusted Extensions
Trusted_Extensions folder
location, Administration Tools for Trusted Extensions
using actions in, How to Start CDE Administrative Actions in Trusted Extensions
using Admin Editor from, How to Edit Administrative Files in Trusted Extensions
trusted grab, key combination, How to Regain Control of the Desktop's Current Focus
trusted network
0.0.0.0 tnrhdb entry, How to Limit the Hosts That Can Be Contacted on the Trusted Network
action for setting default routes, Trusted CDE Actions
administering with Solaris Management Console, Configuring Trusted Network Databases (Task Map)
checking syntax of files, How to Check the Syntax of Trusted Network Databases
concepts, Trusted Networking (Overview)
default labeling, Trusted Extensions Accreditation Checks
editing local files, Configuring Trusted Network Databases (Task Map)
example of routing, Gateways in Trusted Extensions
host types, Host Type and Template Name in Security Templates
labels and MAC enforcement, The Trusted Network
using templates, Configuring Trusted Network Databases (Task Map)
Trusted Network tools
description, Trusted Extensions Tools in the Solaris Management Console
using, How to Open the Trusted Networking Tools
Trusted Network Zones tool
configuring a multilevel port, How to Configure a Multilevel Port for NFSv3 Over udp
configuring a multilevel print server, How to Configure a Multilevel Print Server and Its Printers
creating a multilevel port, How to Create a Multilevel Port for a Zone
description
Trusted Extensions Tools in the Solaris Management Console
Trusted Network Zones Tool
trusted path attribute, when available, Roles and Trusted Extensions
Trusted Path menu, Assume Role, How to Enter the Global Zone in Trusted Extensions
trusted processes
in the window system, Trusted Processes in the Window System
starting actions, Trusted Processes in the Window System
trusted programs
adding, Developer Responsibilities When Creating Trusted Programs
defined, Evaluating Software for Security
trusted stripe
on multiheaded system, Multiheaded Systems and the Trusted Extensions Desktop
warping pointer to, How to Regain Control of the Desktop's Current Focus
trustworthy programs, Evaluating Software for Security
tsol_separator.ps file
configurable values, Labeled Banner and Trailer Pages
customizing labeled printing, Labeled Printer Output