Solaris Trusted Extensions is a configuration of the Solaris OS. This appendix provides a short description of the Solaris man pages that include Trusted Extensions information.
The following man pages describe Trusted Extensions software on a Solaris system. These man pages are relevant only on a system that is configured with Trusted Extensions.
Synopsis
Adds entries to allocation databases
Converts a human-readable label to its internal text equivalent
Compares binary labels
Determines the bound of two labels
Checks the label encodings file syntax
Gets the file's label
Gets the label range of a device
Displays the label of files
Gets the label of a file
Gets the zone pathname
Gets the label of a process
Gets the label range of a user
Gets zone ID from zone label
Gets zone label from zone ID
Gets zone label from zone name
Displays the root path of the zone that corresponds to the specified label
Gets zone root pathname from zone root ID
Gets zone root pathname from zone label
Gets zone root pathname from zone name
Converts an internal text label to its human-readable equivalent
Translates a binary label and clips the label to the specified width
Describes the label encodings file
Converts labels to human-readable strings
Describes Solaris Trusted Extensions label attributes
Is the Solaris Trusted Extensions network library
Is the Solaris Trusted Extensions library
Allocates and frees resources for a new label
Checks account limitations that are due to labels
Gets the label of a process
Removes entries from allocation databases
Is the selection rules for copy, cut, paste, and drag-and-drop operations
Moves a file to a zone with the corresponding sensitivity label
Manages entries in the Trusted Extensions networking database
Manages entries in the template database for Trusted Extensions networking
Manages entries in the configuration database for Trusted Extensions networking in non-global zones
Parses human-readable strings to a label
Configures Trusted Extensions network parameters
Is the trusted network daemon
Displays kernel-level Trusted Extensions network information and statistics
Introduces Trusted Extensions
Is the configuration file for Trusted Extensions X Server Extension
Gets the host type from Trusted Extensions network information
Updates the home directory copy and link files for the current label
Gets the label attributes of an X client
Gets the label attributes of a window property
Gets the label of a window property
Gets the UID of a window property
Gets all label attributes of a window or a pixmap
Gets the label of a window, a pixmap, or a colormap
Gets the UID of a window or a pixmap
Gets the height of the screen stripe
Gets the ownership of the workstation
Determines if a window is created by a trusted client
Make this window a Trusted Path window
Sets polyinstantiation information
Sets the label of a window property
Sets the UID of a window property
Sets the label of a window or a pixmap
Sets the UID of a window, a pixmap, or a colormap
Sets the session high sensitivity label to the window server
Sets the session low sensitivity label to the window server
Sets the height of the screen stripe
Sets the ownership of the workstation
Solaris Trusted Extensions adds information to the following Solaris man pages.
Trusted Extensions Modification
Adds options to support allocating a device in a zone and cleaning the device in a windowed environment
Adds the window policy for labeled information
Adds X server audit classes
Adds audit events
Adds a label selector
Adds label authorizations
Adds the capability to mount, and therefore view, lower-level home directories
Adds label restrictions to a user's ability to cancel a print job
Adds options to support deallocating a device in a zone, cleaning the device in a windowed environment, and specifying the type of device to deallocate
Is invoked by default in Trusted Extensions
Recognizes the NET_MAC_AWARE and NET_MAC_AWARE_INHERIT process flags
Gets the mandatory access control status, SO_MAC_EXEMPT, of the socket
Gets the mandatory access control status, SO_MAC_EXEMPT, of the socket
Adds the all-zones interface
Adds a debug flag for labeled IKE processes
Adds the label_aware global parameter and three Phase 1 transform keywords, single_label, multi_label, and wire_label
Supports the negotiation of labeled security associations through multilevel UDP ports 500 and 4500 in the global zone
Adds three extensions: label, outer-label, and implicit-label
Determines whether the system is configured with Trusted Extensions
Adds Trusted Extensions network databases
Adds attributes, such as labels, that are associated with a device
Adds the -nolabels option
Adds label restrictions to the administrator's ability to administer printing
Adds label restrictions to the administrator's ability to move a print job
Adds label restrictions to the display of print queue information
Adds label restrictions to the caller's ability to remove print requests
Adds label restrictions to the administrator's ability to stop and restart the print service
Adds label restrictions to the display of the print service status
Adds the -R option to display extended security attributes
Adds labels to IPsec security associations (SAs)
Adds Trusted Extensions privileges, such as PRIV_FILE_DOWNGRADE_SL
Adds rights profiles, such as Object Label Management
Adds the -secattr option to add extended security attributes to a route
Sets the NET_MAC_AWARE per-process flag
Sets the SO_MAC_EXEMPT option
Sets the mandatory access control, SO_MAC_EXEMPT, on the socket
Adds options to support a role's label
Adds options to support a user's label and other security attributes, such as permitted idle time
Supports the SO_MAC_EXEMPT option for unlabeled peers
Adds including labels in tar files and extracting files according to label
Adds attribute types that are used in labeled tar files
Adds getting the label value on a user credential
Adds user security attributes that are specific to Trusted Extensions