| | | |
R |
|
| real UID of root, required for applications ( ) |
|
| rebooting |
| | activating labels ( ) |
| | enabling login to labeled zone ( ) |
|
| Reducing Printing Restrictions in Trusted Extensions (Task Map) ( ) |
|
| regaining control of desktop focus ( ) |
|
| registering, LDAP credentials with the Solaris Management Console ( ) |
|
| regular users, See users |
|
| relabeling information ( ) |
|
| remote administration |
| | defaults ( ) |
| | methods ( ) |
|
| remote host templates |
| | assigning ( ) |
| | assigning to hosts ( ) |
| | creating ( ) |
| | tool for administering ( ) |
|
| remote hosts, using fallback mechanism in tnrhdb ( ) |
|
| Remote Login authorization ( ) |
|
| remote logins, enabling for roles ( ) |
|
| remote multilevel desktop, accessing ( ) |
|
| removable media, mounting ( ) |
|
| remove_allocatable command ( ) |
|
| removing |
| | labels on printer output ( ) |
| | zone-specific nscd daemon ( ) |
|
| removing Trusted Extensions, See disabling |
|
| repairing, labels in internal databases ( ) |
|
| requirements for Trusted Extensions |
| | Solaris installation options ( ) |
| | Solaris installed systems ( ) |
|
| resolv.conf file, loading during configuration ( ) |
|
| restoring control of desktop focus ( ) |
|
| restricting |
| | access to computer based on label ( ) |
| | access to devices ( ) |
| | access to global zone ( ) |
| | access to lower-level files ( ) |
| | access to printers with labels ( ) |
| | mounts of lower-level files ( ) |
| | printer access with labels ( ) |
| | printer label range ( ) |
| | remote access ( ) |
|
| Revoke or Reclaim Device authorization ( ) ( ) |
|
| rights, See rights profiles |
|
| rights profiles |
| | assigning ( ) |
| | Convenient Authorizations ( ) |
| | customizing for separation of duty ( ) |
| | with Allocate Device authorization ( ) |
| | with device allocation authorizations ( ) |
| | with new device authorizations ( ) |
|
| Rights tool ( ) |
|
| roadmaps |
| | Task Map: Configuring Trusted Extensions ( ) |
| | Task Map: Preparing a Solaris System for Trusted Extensions ( ) |
| | Task Map: Preparing For and Enabling Trusted Extensions ( ) |
|
| role workspace, global zone ( ) |
|
| roleadd command ( ) |
|
| roles |
| | adding local role with roleadd ( ) |
| | administering auditing ( ) |
| | administering remotely ( ) ( ) |
| | assigning rights ( ) |
| | assuming ( ) ( ) |
| | creating ( ) |
| | creating Security Administrator ( ) |
| | determining when to create ( ) |
| | leaving role workspace ( ) |
| | logging in remotely ( ) |
| | remote login ( ) |
| | role assumption from unlabeled host ( ) |
| | separation of duty ( ) ( ) |
| | trusted application access ( ) |
| | verifying they work ( ) |
| | workspaces ( ) |
|
| root passwords, required in Trusted Extensions ( ) |
|
| root UID, required for applications ( ) |
|
| route command ( ) ( ) |
|
| routing ( ) |
| | accreditation checks ( ) |
| | commands in Trusted Extensions ( ) |
| | concepts ( ) |
| | example of ( ) |
| | specifying default routes for labeled zones ( ) |
| | static with security attributes ( ) |
| | tables ( ) ( ) |
| | using route command ( ) |