The Trusted Solaris Administration Overview is an introduction to administering the Trusted SolarisTM environment. As prerequisites, you should be familiar with basic system administration in the UNIX® environment, understand security policy concepts, and should read the Trusted Solaris User's Guide.
The Trusted Solaris documentation set supplements the Solaris 8 4/01 documentation set. You should obtain a copy of both sets for a complete understanding of Trusted Solaris software. The following describes the Trusted Solaris documentation set:
Trusted Solaris Documentation Roadmap describes all volumes in the documentation set.
Trusted Solaris 8 4/01 Release Notes presents last-minute information about the Trusted Solaris release, including any known problems.
Trusted Solaris Installation and Configuration describes the process of planning for, installing, and configuring a Trusted Solaris system.
Trusted Solaris User's Guide describes basic features of the Trusted Solaris environment from the end user's point of view. The book includes a glossary.
Trusted Solaris Administrator's Procedures provides detailed information for administering the Trusted Solaris environment.
Trusted Solaris Audit Administration describes the auditing system for system and security administrators.
Trusted Solaris Label Administration provides information on specifying label components in the label encodings file.
Trusted Solaris Reference Manual is a printed version of the man pages available in the Trusted Solaris environment.
Compartmented Mode Workstation Labeling: Encodings Format describes the syntax used in the label encodings file for enforcing the various rules concerning well-formed labels for a system.
Trusted Solaris 8 4/01 Transition Guide provides an overview of the differences between the Trusted Solaris 7 and Trusted Solaris 8 releases, and between the Trusted Solaris 8 and Trusted Solaris 8 4/01 releases.
Chapter 1, Introduction to Administration provides an overview of basic concepts needed to administer the Trusted Solaris environment.
Chapter 2, Quick Tour of the Admin Tools presents an overview of the tools available in the Trusted Solaris environment, how they are accessed, and the databases on which they operate.
Chapter 3, Administering Trusted Networking provides an overview of how networking is implemented in the Trusted Solaris environment and discusses the tools for administering networking.
Chapter 4, Administering Auditing describes the basics of performing auditing in the Trusted Solaris environment.
Fatbrain.com, the Internet's most comprehensive professional bookstore, stocks select product documentation from Sun Microsystems, Inc.
For a list of documents and how to order them, visit the Sun Documentation Center on Fatbrain.com at http://www1.fatbrain.com/documentation/sun.
The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
The following table describes the type changes and symbols used in this book.
Table P-1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories; on-screen computer output |
Edit your .login file. Use ls -a to list all files. system% You have mail.
|
AaBbCc123 |
What you type, contrasted with on-screen computer output |
system$ su - janez
Password:: |
AaBbCc123 |
Command-line placeholder or variable name. Replace with a real name or value |
To delete a file, type rm filename. The errno variable is set. |
AaBbCc123 |
Book titles, new words or terms, or words to be emphasized |
Read Chapter 6 in User's Guide. These are called class options. You must be the owner. |
Code samples are in code font and may display the following: |
||
% |
C shell prompt |
system% |
$ |
Profile shell prompt |
system$ |