JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

U

unlabeled printing, configuring, Reducing Printing Restrictions in Trusted Extensions (Task Map)
updatehome command
Command Line Tools in Trusted Extensions
.copy_files and .link_files Files
Upgrade DragNDrop or CutPaste Info authorization, How to Create a Rights Profile for Convenient Authorizations
Upgrade File Label authorization, How to Create a Rights Profile for Convenient Authorizations
upgrading labels, configuring rules for selection confirmer, sel_config File
User Accounts tool, Trusted Extensions Tools in the Solaris Management Console
users
accessing devices
Device Protection With Trusted Extensions Software
Device Protection With Trusted Extensions Software
accessing printers, Labels, Printers, and Printing
assigning authorizations to, Security Attribute Assignment to Users in Trusted Extensions
assigning labels, Security Attribute Assignment to Users in Trusted Extensions
assigning passwords, Security Attribute Assignment to Users in Trusted Extensions
assigning rights, Security Attribute Assignment to Users in Trusted Extensions
assigning roles to, Security Attribute Assignment to Users in Trusted Extensions
authorizations for, How to Create a Rights Profile for Convenient Authorizations
Change Password menu item, Trusted Extensions Security Features
changing default privileges, Security Attribute Assignment to Users in Trusted Extensions
creating, Administrator Responsibilities for Users
customizing environment, Customizing the User Environment for Security (Task Map)
deletion precautions, User Deletion Practices
labels of processes, Label Ranges
lengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Information
logging in remotely to the global zone, How to Enable Specific Users to Log In Remotely to the Global Zone in Trusted Extensions
logging in to a failsafe session, How to Log In to a Failsafe Session in Trusted Extensions
modifying security defaults, How to Modify Default User Label Attributes
modifying security defaults for all users, How to Modify policy.conf Defaults
planning for, Decisions to Make Before Creating Users in Trusted Extensions
preventing account locking, How to Prevent Account Locking for Users
preventing from seeing others' processes, How to Modify policy.conf Defaults
printing, Labels, Printers, and Printing
removing some privileges, How to Restrict a User's Set of Privileges
restoring control of desktop focus, How to Regain Control of the Desktop's Current Focus
security precautions, Group Administration
security training
Security Requirements Enforcement
Group Administration
Enforcement of Device Security in Trusted Extensions
session range, Label Ranges
setting up skeleton directories, How to Configure Startup Files for Users in Trusted Extensions
startup files, How to Configure Startup Files for Users in Trusted Extensions
using .copy_files file, How to Configure Startup Files for Users in Trusted Extensions
using .link_files file, How to Configure Startup Files for Users in Trusted Extensions
using devices, Using Devices in Trusted Extensions (Task Map)
Using Devices in Trusted Extensions (Task Map), Using Devices in Trusted Extensions (Task Map)
/usr/dt/bin/sel_mgr application, Rules When Changing the Level of Security for Data
/usr/dt/bin/trusted_edit trusted editor, How to Edit Administrative Files in Trusted Extensions
/usr/dt/config/sel_config file, sel_config File
/usr/lib/lp/postscript/tsol_separator.ps file, labeling printer output, Labeled Printer Output
/usr/local/scripts/getmounts script, How to Display the Labels of Mounted Files
/usr/local/scripts/getzonelabels script, How to Display Ready or Running Zones
/usr/sbin/txzonemgr script
Administration Tools for Trusted Extensions
Zone Administration Utilities in Trusted Extensions
/usr/share/gnome/sel_config file, sel_config File
utadm command, default Sun Ray server configuration, How to Limit the Hosts That Can Be Contacted on the Trusted Network