Trusted Solaris Administration Overview

Introduction to Trusted Solaris Administration

Administration in the Trusted Solaris operating environment uses many of the same tools available in the Solaris operating environment and offers security-enhanced tools as well. The difference between the environments lies in how administration tools are accessed and how this access is restricted.

Accessing Tools in a Role Workspace

To use the Trusted Solaris administration tools, you must be in a role account with the assigned rights profiles that contain the desired trusted applications.The following procedure describes how to access a role workspace.

To Access a Role Workspace
  1. Log in as a normal user.

  2. Assume a role using the Trusted Path menu. If a role workspace already exists, click the role workspace button in the Front Panel.

  3. Supply the role password.

    Note that the default label for a role workspace is the role's minimum label, usually ADMIN_LOW. If desired, you can switch labels by choosing Change Workspace Label from the Trusted Path menu while the pointer is over the role workspace button.

To leave a role workspace temporarily, click any other workspace button. To destroy the workspace, choose Delete from the Trusted Path menu while the pointer is over the role workspace button.

Within the role workspace, you can access four types of trusted applications:

Remote Administration

You can perform remote administration in the Trusted Solaris operating environment using the Solaris Management Console. You can also log into a remote host from another Trusted Solaris host in the system. Depending on your site's security policy, you can make adjustments to log in from a non-Trusted Solaris system, although this will make your system somewhat less secure. See "Administering Remote Systems" under "Administering Systems in an Administrative Role" in Trusted Solaris Administrator's Procedures.

Solaris Management Console Tools

The Solaris Management Console (SMC) provides access to families of GUI-based administration tools. These tools enable you to edit items in various configuration databases.

SMC Toolboxes

The SMC tools are stored in sets referred to as toolboxes. For the security-related tools in the Trusted Solaris environment, you need to open the Trusted Solaris Management Console toolbox. Within the Trusted Solaris toolbox, you can access tools according to scope, that is, the name service for the administration files accessed by the tools: local host, NIS, or NIS+.

Organization of the Solaris Management Console

The SMC is shown in the following figure, with the Trusted Solaris toolbox loaded and the Users tool open.

Figure 2-1 Typical Trusted Solaris SMC

Graphic

SMC Documentation

The main source of documentation for using the SMC and its tools is the online help system. There are two forms of online help: context-sensitive help and expanded help topics. The context-sensitive help is tied to the currently selected feature and is displayed in the information pane. The expanded help topics are available from the Help menu or by clicking cross reference links in the context-sensitive help. The help topics appear in a separate viewer.

Trusted CDE Actions

This section presents the CDE actions available to roles and describes how to use or change the restricted editor used in these actions.

To Access Trusted CDE Actions
  1. Right-click the background to bring up the Workspace Menu.

  2. Press Applications, then click Application Manager.

  3. In the Application Manager, double-click the System_Admin icon.

    The CDE action icons display in the Application Manager window.

  4. Invoke the desired action by double-clicking its icon.

    A window or dialog box for the appropriate action appears.

The trusted CDE actions are listed in the following table.

Table 2-1 Administrative Actions, Purposes, and Default Roles
 Action Name Purpose of Action Default Rights Profile

Add Allocatable Device

Creates devices by putting entries in device_allocate(4), and device_maps(4). See add_allocatable(1M).

Device Security 

Admin Editor

Edits any specified file 

Object Access Management 

Audit Classes

Edits audit_class(4)

Audit Control 

Audit Control

Edits audit_control(4)

Audit Control 

Audit Events

Edits audit_event(4)

Audit Control 

Audit Startup

Edits the audit_startup.sh script. See audit_startup(1M).

Audit Control 

Check Encodings

Runs chk_encodings(1M) on specified encodings file

Object Label Management 

Check TN Files

Runs tnchkdb(1M) on local tnidb(4), tnrhdb(4), and tnrhtp(4) files

Network Security 

Check TN NIS+ Tables

Runs tnchkdb(1M) on tnrhdb(4), and tnrhtp(4) NIS+ trusted network maps

 Network Management

Configure Selection Confirmation

Edits /usr/dt/config/sel_config. See sel_config(4).

Object Label Management 

Create NIS Client

Runs ypinit(1M), using both the specified hostname for the NIS master and the specified domain name

Name Server Security 

Create NIS+ Client

Runs nisclient(1M), using both the specified hostname for the NIS+ master and the specified domain name

Name Server Security 

Create NIS Server

Runs ypinit(1M) using the specified domain name

Name Server Security 

Create NIS+ Server

Runs nisserver(1M) using the specified domain name

Name Server Security 

Edit Encodings

Edits specified label_encodings(4) file and runs chk_encodings(1M)

Object Label Management 

Name Service Switch

Edits nsswitch.conf(4)

Network Management 

Populate NIS Tables

Runs nispopulate(1M) from the specified directory

Name Service Security 

Set Daily Message

Edits /etc/motd

Network Management 

Set Default Routes

Edits /etc/defaultrouter. See route(1M).

Network Management 

Set DNS Servers

Edits resolv.conf(4)

Network Management 

Set Mail Options

Edits /etc/mail/sendmail.cf. See sendmail(1M).

Mail Management 

Set Mount Attributes

Edits vfstab_adjunct(4)

File System Security 

Set Mount Points

Edits vfstab(4)

File System Management 

Set TSOL Gateways

Edits tsolgateways(4)

Network Management 

Shared Filesystem

Edits dfstab(4). Does not run share(1M).

File System Management 

View Table Attributes

Runs niscat(1) with the -o option on the specified NIS+ trusted network database to display the table's attributes.

Name Service Management 

View Table Contents

Runs niscat(1) on the specified NIS+ trusted network database to display the table's contents.

Name Service Management 

Admin Editor

The Admin Editor action, which can also be accessed from the command adminvi(1M), is a modified version of the vi(1) command. It restricts the user from executing shell commands and from writing to (saving to) any file other than the original file being edited. The Admin Editor action, which is assigned to the security administrator role by default, should be used in most cases instead of adminvi on the command line to edit or create administrative files. This is due to the fact that the Admin Editor is a wrapper for adminvi that incorporates auditing and allows an editor preference. You can assign the adminvi command to any users with the profile shell as their default if you need to provide them a text editor with the restrictions of adminvi.

Changing the Default Admin Editor

The Admin Editor is launched through the /usr/dt/bin/trusted_edit shell script, which brings up the editor specified in the EDITOR environment variable for the role account, restricts saves, and audits any changes made at the time the file is saved. The variable is set to adminvi(1M) by default, but the security administrator role can redefine the EDITOR variable to /usr/dt/bin/dtpad. When adminvi is specified, /bin/adminvi is invoked as root to edit the file. The adminvi command prevents the saving of the file with any other name. If dtpad(1) is specified, the New, Save, and Open options in the File menu are disabled when the action runs so that the file cannot be renamed.