Solaris Trusted Extensions User's Guide

Preface

The Solaris Trusted Extensions User's Guide is a guide to working in the SolarisTM Operating System (Solaris OS) with Solaris Trusted Extensions installed.

Who Should Use This Book

This book is for all users of Trusted Extensions. As a prerequisite, you must be familiar with the Solaris OS and one of the following desktops:

You must also be familiar with the security policy of your organization.

How the Solaris Trusted Extensions Books Are Organized

The Solaris Trusted Extensions documentation set consists of the following books.

Book Title 

Topics 

Audience 

Solaris Trusted Extensions Transition Guide

Obsolete. Provides an overview of the differences between Trusted Solaris 8 software, Solaris Express Developer Edition 9/07 software, and Solaris Trusted Extensions software. 

For this release, the What's New document for the Solaris OS provides an overview of Trusted Extensions changes.

All 

Solaris Trusted Extensions Reference Manual

Obsolete. Provides Solaris Trusted Extensions man pages for releases prior to the Solaris Express Developer Edition 9/07 release. 

For this release, Trusted Extensions man pages are included with the Solaris man pages. 

All 

Solaris Trusted Extensions User’s Guide

Describes the basic features of Solaris Trusted Extensions. This book contains a glossary. 

End users, administrators, developers 

Solaris Trusted Extensions Installation and Configuration

Obsolete. Describes how to plan for, install, and configure Solaris Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions. 

Administrators, developers 

Solaris Trusted Extensions Administrator’s Procedures

For this release, Part I describes how to prepare for, enable, and initially configure Trusted Extensions. Part I replaces Solaris Trusted Extensions Installation and Configuration.

Part II describes how to administer a Trusted Extensions system. This book contains a glossary. 

Administrators, developers 

Solaris Trusted Extensions Developer’s Guide

Describes how to develop applications with Solaris Trusted Extensions. 

Developers, administrators 

Solaris Trusted Extensions Label Administration

Provides information about how to specify label components in the label encodings file. 

Administrators 

Compartmented Mode Workstation Labeling: Encodings Format

Describes the syntax used in the label encodings file. The syntax enforces the various rules for well-formed labels for a system. 

Administrators 

How This Guide Is Organized

Chapter 1, Introduction to Solaris Trusted Extensions Software describes the basic concepts that are implemented on a Solaris system that is configured with Trusted Extensions.

Chapter 2, Logging In to Trusted Extensions (Tasks) presents procedures for accessing a system and for leaving a system that is configured with Trusted Extensions.

Chapter 3, Working in Trusted Extensions (Tasks) describes how to use Trusted Extensions to perform your job.

Chapter 4, Elements of Trusted Extensions (Reference) explains the key elements in a system that is configured with Trusted Extensions.

Glossary describes security terms that are used in Trusted Extensions.

Documentation, Support, and Training

The Sun web site provides information about the following additional resources:

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P–1 Typographic Conventions

Typeface 

Meaning 

Example 

AaBbCc123

The names of commands, files, and directories, and onscreen computer output 

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

What you type, contrasted with onscreen computer output 

machine_name% su

Password:

aabbcc123

Placeholder: replace with a real name or value 

The command to remove a file is rm filename.

AaBbCc123

Book titles, new terms, and terms to be emphasized 

Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P–2 Shell Prompts

Shell 

Prompt 

C shell 

machine_name%

C shell for superuser 

machine_name#

Bourne shell and Korn shell 

$

Bourne shell and Korn shell for superuser 

#