The Solaris Trusted Extensions User's Guide is a guide to working in the SolarisTM Operating System (Solaris OS) with Solaris Trusted Extensions installed.
This book is for all users of Trusted Extensions. As a prerequisite, you must be familiar with the Solaris OS and one of the following desktops:
Common Desktop Environment (CDE)
The open source GNOME desktop
Sun JavaTM Desktop System
You must also be familiar with the security policy of your organization.
The Solaris Trusted Extensions documentation set consists of the following books.
Book Title |
Topics |
Audience |
---|---|---|
Obsolete. Provides an overview of the differences between Trusted Solaris 8 software, Solaris Express Developer Edition 9/07 software, and Solaris Trusted Extensions software. For this release, the What's New document for the Solaris OS provides an overview of Trusted Extensions changes. |
All |
|
Solaris Trusted Extensions Reference Manual |
Obsolete. Provides Solaris Trusted Extensions man pages for releases prior to the Solaris Express Developer Edition 9/07 release. For this release, Trusted Extensions man pages are included with the Solaris man pages. |
All |
Describes the basic features of Solaris Trusted Extensions. This book contains a glossary. |
End users, administrators, developers |
|
Obsolete. Describes how to plan for, install, and configure Solaris Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions. |
Administrators, developers |
|
For this release, Part I describes how to prepare for, enable, and initially configure Trusted Extensions. Part I replaces Solaris Trusted Extensions Installation and Configuration. Part II describes how to administer a Trusted Extensions system. This book contains a glossary. |
Administrators, developers |
|
Describes how to develop applications with Solaris Trusted Extensions. |
Developers, administrators |
|
Provides information about how to specify label components in the label encodings file. |
Administrators |
|
Describes the syntax used in the label encodings file. The syntax enforces the various rules for well-formed labels for a system. |
Administrators |
Chapter 1, Introduction to Solaris Trusted Extensions Software describes the basic concepts that are implemented on a Solaris system that is configured with Trusted Extensions.
Chapter 2, Logging In to Trusted Extensions (Tasks) presents procedures for accessing a system and for leaving a system that is configured with Trusted Extensions.
Chapter 3, Working in Trusted Extensions (Tasks) describes how to use Trusted Extensions to perform your job.
Chapter 4, Elements of Trusted Extensions (Reference) explains the key elements in a system that is configured with Trusted Extensions.
Glossary describes security terms that are used in Trusted Extensions.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |