Documentation Home
> Trusted Solaris User's Guide
Trusted Solaris User's Guide
Book Information
Preface
Chapter 1 Introduction to Trusted Solaris
What is Trusted Solaris?
How Trusted Solaris Protects against Intruders
Limiting Access to the Trusted Computing Base
Making Theft of Passwords More Difficult
Protecting Information on the System through Access Control
Providing Auditing
Preventing Spoofing Programs
Protecting Local Peripheral Devices against Unauthorized Users
How Trusted Solaris Enforces Access Control Policy
Discretionary Access Control
Mandatory Access Control
Clearances
Sensitivity Labels
The Part Sensitivity Labels Play in Transactions
User Responsibilities for Protecting Data
How Trusted Solaris Keeps Labeled Information Separate
Letting Users Select Single- or Multilevel Sessions
Providing Labeled Workspaces
Storing Files in Separate Directories by Sensitivity Labels
Enforcing MAC for Email Transactions
Clearing Objects Prior to Reuse
How Trusted Solaris Enables Secure Administration
Authorizations and Privileges
Accessing Applications and Authorizations
Predefined Roles
To Learn More about Trusted Solaris
Also in this Manual
How to Use Procedures in this Manual
Other Useful Manuals
Chapter 2 Accessing and Leaving the Trusted Solaris Environment
The Login Process
Identification
To Identify Yourself to the System
Authentication
To Authenticate Yourself
Message Checking and Session Type Selection
Single-level Versus Multilevel Sessions
Session Selection Example
To Check Messages and Select Session Type
Setting the Session Level
To Select a Clearance for a Multilevel Session
To Select a Sensitivity Label for a Single-level Session
Related Access Procedures
Leaving the Trusted Solaris Environment
To Lock and Unlock Your Screen
To Log Out of the Trusted Solaris Environment
To Shut Down Your System (for authorized users only)
Enabling Logins When Logins Are Disabled
To Enable Logins After a Reboot
Fixing a Bad Desktop Profile
To Perform a Failsafe Login
Chapter 3 Tour of the Trusted Solaris Environment
Tour: Logging In
Tour: Setting the Session Type
Tour: Using the Label Builder to Set a Session Clearance
Tour: Exploring the Basic Trusted Solaris Environment
Tour: Launching an Application
Tour: Looking at Files with the File Manager
Tour: Changing to a Workspace at a Different Sensitivity Label
Tour: Working in a Workspace at a Different Sensitivity Label
Tour: Occupying Workspaces with Applications at Different Sensitivity Labels
Tour: Moving Data Between Windows with Different Sensitivity Labels
Tour: Moving Files Between File Managers with Different Sensitivity Labels
Chapter 4 Elements of the Trusted Solaris Environment
Basic Trusted Solaris Environment
Label Displays in the Trusted Solaris Environment
Trusted Stripe
Trusted Path Symbol
Window SL Field
Front Panel
Workspace Switch Area
Clock
Calendar
File Manager
Folders Subpanel
Text Editor
Personal Applications Subpanel
Mailer
Printer
Trusted Desktop Subpanel
Application Manager
Trash Can
Trusted Path Menu
Add Workspace
Delete
Rename
Change Workspace SL
To Change a Workspace Sensitivity Label
Role Assumption Selections
Change Password
To Change Passwords by Direct Entry
To Change Passwords by Choosing from a List
To Choose a Password from a List at the Command Line
Allocate Device
To Allocate a Device
Query Window Label
Shut Down (for authorized users only)
Help
Other Trusted Solaris Environment Features
Lock
Exit
Occupy Workspace Commands
Chapter 5 Managing Files and Directories
Setting Permissions and Access Control Lists
Basic Permissions
Access Control Lists
Viewing or Changing Permissions and ACL Entries
To Display the Properties Dialog Box for a File or Folder
To View the Basic Information of a File or Folder
To View or Change a File or Folder's Basic Permissions
To View a File or Folder's ACL Entries
To Add an ACL Entry
To Change an ACL Entry
To Delete an ACL Entry
Manipulating File Labels
Viewing and Changing Labels with the File Manager
To Determine a File's Label
To Change a File's Sensitivity Label (Move Operation)
To Create a Copy of a File at a Different Sensitivity Label (Copy Operation)
To Link a File to a Different Sensitivity Label (Link Operation)
Copying and Linking Files to Different Sensitivity Labels by Default
Appendix A Supplementary Documentation
Using Man Pages
Man Page Paths
Specifying Man Pages by Section Number
Accessing Online Documentation and Help
Glossary
© 2010, Oracle Corporation and/or its affiliates