1. Trusted Extensions Administration Concepts
2. Trusted Extensions Administration Tools
Administration Tools for Trusted Extensions
Solaris Management Console Tools
Trusted Extensions Tools in the Solaris Management Console
Client-Server Communication With the Solaris Management Console
Solaris Management Console Documentation
Label Builder in Trusted Extensions
Remote Administration in Trusted Extensions
3. Getting Started as a Trusted Extensions Administrator (Tasks)
4. Security Requirements on a Trusted Extensions System (Overview)
5. Administering Security Requirements in Trusted Extensions (Tasks)
6. Users, Rights, and Roles in Trusted Extensions (Overview)
7. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
8. Remote Administration in Trusted Extensions (Tasks)
9. Trusted Extensions and LDAP (Overview)
10. Managing Zones in Trusted Extensions (Tasks)
11. Managing and Mounting Files in Trusted Extensions (Tasks)
12. Trusted Networking (Overview)
13. Managing Networks in Trusted Extensions (Tasks)
14. Multilevel Mail in Trusted Extensions (Overview)
15. Managing Labeled Printing (Tasks)
16. Devices in Trusted Extensions (Overview)
17. Managing Devices for Trusted Extensions (Tasks)
18. Trusted Extensions Auditing (Overview)
19. Software Management in Trusted Extensions (Tasks)
A. Quick Reference to Trusted Extensions Administration
Commands that are unique to Trusted Extensions are contained in the Trusted Extensions Reference Manual. The Oracle Solaris commands that Trusted Extensions modifies are contained in the Oracle Solaris Reference Manual. The man command finds all the commands.
The following table lists commands that are unique to Trusted Extensions. The commands are listed in man page format.
Table 2-4 User and Administrative Trusted Extensions Commands
|
The following table lists Oracle Solaris commands that are modified or extended by Trusted Extensions. The commands are listed in man page format.
Table 2-5 User and Administrative Commands That Trusted Extensions Modifies
|