The Oracle Solaris Trusted Extensions User's Guide is a guide to working in the Solaris Operating System (Solaris OS) with Solaris Trusted Extensions installed.
This guide is for all users of Trusted Extensions. As a prerequisite, you must be familiar with the Solaris OS and one of the following desktops:
Common Desktop Environment (CDE)
The open source GNOME desktop
Sun Java Desktop System
You must also be familiar with the security policy of your organization.
The following table lists the topics that are covered in the Solaris Trusted Extensions guides and the audience for each guide.
Title of Guide |
Topics |
Audience |
---|---|---|
Obsolete. Provides an overview of the differences between Trusted Solaris 8 software, Solaris 10 software, and Solaris Trusted Extensions software. For this release, the What's New document for the Solaris OS provides an overview of Trusted Extensions changes. |
All |
|
Solaris Trusted Extensions Reference Manual |
Obsolete. Provides Solaris Trusted Extensions man pages for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions. For this release, Trusted Extensions man pages are included with the Solaris man pages. |
All |
Describes the basic features of Solaris Trusted Extensions. This book contains a glossary. |
End users, administrators, developers |
|
Obsolete. Describes how to plan for, install, and configure Solaris Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions. |
Administrators, developers |
|
Starting with the Solaris 10 5/08 release, describes how to enable and initially configure Solaris Trusted Extensions. Replaces Solaris Trusted Extensions Installation and Configuration for the Solaris 10 11/06 and Solaris 10 8/07 Releases. |
Administrators, developers |
|
Oracle Solaris Trusted Extensions Administrator’s Procedures |
Shows how to perform specific administration tasks. |
Administrators, developers |
Describes how to develop applications with Solaris Trusted Extensions. |
Developers, administrators |
|
Provides information about how to specify label components in the label encodings file. |
Administrators |
|
Describes the syntax used in the label encodings file. The syntax enforces the various rules for well-formed labels for a system. |
Administrators |
Chapter 1, Introduction to Solaris Trusted Extensions Software describes the basic concepts that are implemented on a Solaris system that is configured with Trusted Extensions.
Chapter 2, Logging In to Trusted Extensions (Tasks) presents procedures for accessing a system and for leaving a system that is configured with Trusted Extensions.
Chapter 3, Working in Trusted Extensions (Tasks) describes how to use Trusted Extensions to perform your job.
Chapter 4, Elements of Trusted Extensions (Reference) explains the key elements in a system that is configured with Trusted Extensions.
Glossary describes security terms that are used in Trusted Extensions.
See the following web sites for additional resources:
Training – Click the Sun link in the left navigation bar.
Oracle welcomes your comments and suggestions on the quality and usefulness of its documentation. If you find any errors or have any other suggestions for improvement, go to http://docs.sun.com and click Feedback. Indicate the title and part number of the documentation along with the chapter, section, and page number, if available. Please let us know if you want a reply.
Oracle Technology Network offers a range of resources related to Oracle software:
Discuss technical problems and solutions on the Discussion Forums.
Get hands-on step-by-step tutorials with Oracle By Example.
Download Sample Code.
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
Bash shell, Korn shell, and Bourne shell |
$ |
Bash shell, Korn shell, and Bourne shell for superuser |
# |
C shell |
machine_name% |
C shell for superuser |
machine_name# |