Oracle Solaris Trusted Extensions Administrator's Procedures
    
R
 
 real UID of root, required for applications ( Index Term Link )
 
 Reducing Printing Restrictions in Trusted Extensions (Task Map) ( Index Term Link )
 
 regaining control of desktop focus ( Index Term Link )
 
 regular users, See users
 
 relabeling information ( Index Term Link )
 
 remote administration
  defaults ( Index Term Link )
  methods ( Index Term Link )
 
 remote host templates
  assigning ( Index Term Link )
  assigning to hosts ( Index Term Link )
  creating ( Index Term Link )
  tool for administering ( Index Term Link )
 
 remote hosts, using fallback mechanism in tnrhdb ( Index Term Link )
 
 Remote Login authorization ( Index Term Link )
 
 remote multilevel desktop, accessing ( Index Term Link )
 
 removable media, mounting ( Index Term Link )
 
 remove_allocatable command ( Index Term Link )
 
 removing, labels on printer output ( Index Term Link )
 
 repairing, labels in internal databases ( Index Term Link )
 
 resolv.conf file, action for editing ( Index Term Link )
 
 Restart Zone action ( Index Term Link )
 
 restoring control of desktop focus ( Index Term Link )
 
 restricting
  access to computer based on label ( Index Term Link )
  access to devices ( Index Term Link )
  access to global zone ( Index Term Link )
  access to lower-level files ( Index Term Link )
  access to printers with labels ( Index Term Link )
  actions by rights profiles ( Index Term Link )
  mounts of lower-level files ( Index Term Link )
  printer access with labels ( Index Term Link )
  printer label range ( Index Term Link )
  remote access ( Index Term Link )
 
 Revoke or Reclaim Device authorization ( Index Term Link ) ( Index Term Link )
 
 rights, See rights profiles
 
 rights profiles
  assigning ( Index Term Link )
  controlling the use of actions ( Index Term Link )
  Convenient Authorizations ( Index Term Link )
  with Allocate Device authorization ( Index Term Link )
  with device allocation authorizations ( Index Term Link )
  with new device authorizations ( Index Term Link )
 
 Rights tool ( Index Term Link )
 
 rmmount.conf file ( Index Term Link ) ( Index Term Link )
 
 role workspace, global zone ( Index Term Link )
 
 roles
  administering auditing ( Index Term Link )
  administering remotely ( Index Term Link ) ( Index Term Link )
  assigning rights ( Index Term Link )
  assuming ( Index Term Link ) ( Index Term Link )
  creating ( Index Term Link )
  leaving role workspace ( Index Term Link )
  remote login ( Index Term Link )
  role assumption from unlabeled host ( Index Term Link )
  trusted application access ( Index Term Link )
  workspaces ( Index Term Link )
 
 root UID, required for applications ( Index Term Link )
 
 route command ( Index Term Link ) ( Index Term Link )
 
 routing ( Index Term Link )
  accreditation checks ( Index Term Link )
  commands in Trusted Extensions ( Index Term Link )
  concepts ( Index Term Link )
  example of ( Index Term Link )
  static with security attributes ( Index Term Link )
  tables ( Index Term Link ) ( Index Term Link )
  using route command ( Index Term Link )