The Oracle Solaris Trusted Extensions Administrator's Procedures guide provides procedures for configuring Trusted Extensions on the Solaris Operating System. This guide also provides procedures for managing users, zones, devices, and hosts that are labeled with Trusted Extensions software.
This SolarisTM release supports systems that use the SPARC® and x86 families of processor architectures. The supported systems appear in the Solaris OS: Hardware Compatibility Lists. This document cites any implementation differences between the platform types.
In this document these x86 related terms mean the following:
“x86” refers to the larger family of 64-bit and 32-bit x86 compatible products.
“x64” relates specifically to 64-bit x86 compatible CPUs.
“32-bit x86” points out specific 32-bit information about x86 based systems.
For supported systems, see the Solaris OS: Hardware Compatibility Lists.
This guide is for knowledgeable system administrators and security administrators who are configuring and administering Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.
Administrators should be familiar with Solaris administration. In addition, administrators should understand the following:
The security features of Trusted Extensions and your site security policy
Basic concepts and procedures for using a host that is configured with Trusted Extensions, as described in the Oracle Solaris Trusted Extensions User’s Guide
How administrative tasks are divided among roles at your site
The following table lists the topics that are covered in the Solaris Trusted Extensions guides and the audience for each guide.
Title of Guide |
Topics |
Audience |
---|---|---|
Obsolete. Provides an overview of the differences between Trusted Solaris 8 software, Solaris 10 software, and Solaris Trusted Extensions software. For this release, the What's New document for the Solaris OS provides an overview of Trusted Extensions changes. |
All |
|
Solaris Trusted Extensions Reference Manual |
Obsolete. Provides Solaris Trusted Extensions man pages for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions. For this release, Trusted Extensions man pages are included with the Solaris man pages. To locate specific man pages, see Appendix B, List of Trusted Extensions Man Pages. |
All |
Describes the basic features of Solaris Trusted Extensions. This book contains a glossary. |
End users, administrators, developers |
|
Obsolete. Describes how to plan for, install, and configure Solaris Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions. |
Administrators, developers |
|
Starting with the Solaris 10 5/08 release, describes how to enable and initially configure Solaris Trusted Extensions. Replaces Solaris Trusted Extensions Installation and Configuration. |
Administrators, developers |
|
Oracle Solaris Trusted Extensions Administrator’s Procedures |
Shows how to perform specific administration tasks. |
Administrators, developers |
Describes how to develop applications with Solaris Trusted Extensions. |
Developers, administrators |
|
Provides information about how to specify label components in the label encodings file. |
Administrators |
|
Describes the syntax used in the label encodings file. The syntax enforces the various rules for well-formed labels for a system. |
Administrators |
The following guides contain information that is useful when you prepare for and run Trusted Extensions software.
Book Title |
Topics |
---|---|
User accounts and groups, server and client support, shutting down and booting a system, managing services, and managing software (packages and patches) |
|
Terminals and modems, system resources (disk quotas, accounting, and crontabs), system processes, and troubleshooting Solaris software problems |
|
Removable media, disks and devices, file systems, and backing up and restoring data |
|
TCP/IP network administration, IPv4 and IPv6 address administration, DHCP, IPsec, IKE, Solaris IP filter, Mobile IP, IP network multipathing (IPMP), and IPQoS |
|
System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP) |
DNS, NIS, and LDAP naming and directory services, including transitioning from NIS to LDAP and transitioning from NIS+ to LDAP |
Web cache servers, time-related services, network file systems (NFS and Autofs), mail, SLP, and PPP |
|
Auditing, device management, file security, BART, Kerberos services, PAM, Solaris Cryptographic Framework, privileges, RBAC, SASL, and Solaris Secure Shell |
|
System Administration Guide: Oracle Solaris Containers-Resource Management and Oracle Solaris Zones |
Resource management topics projects and tasks, extended accounting, resource controls, fair share scheduler (FSS), physical memory control using the resource capping daemon (rcapd), and resource pools; virtualization using Solaris Zones software partitioning technology and lx branded zones |
ZFS storage pool and file system creation and management, snapshots, clones, backups, using access control lists (ACLs) to protect ZFS files, using ZFS on a Solaris system with zones installed, emulated volumes, and troubleshooting and data recovery |
|
Solaris printing topics and tasks, using services, tools, protocols, and technologies to set up and administer printing services and printers |
Your site security policy document – Describes the security policy and security procedures at your site
Solaris Common Desktop Environment: Advanced User's and System Administrator's Guide – Describes the Common Desktop Environment (CDE)
The administrator guide for your currently installed operating system – Describes how to back up system files
Third-party URLs are referenced in this document and provide additional, related information.
Oracle is not responsible for the availability of third-party web sites that are mentioned in this document. Oracle does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Oracle will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
See the following web sites for additional resources:
Training – Click the Sun link in the left navigation bar.
Oracle welcomes your comments and suggestions on the quality and usefulness of its documentation. If you find any errors or have any other suggestions for improvement, go to http://docs.sun.com and click Feedback. Indicate the title and part number of the documentation along with the chapter, section, and page number, if available. Please let us know if you want a reply.
Oracle Technology Network offers a range of resources related to Oracle software:
Discuss technical problems and solutions on the Discussion Forums.
Get hands-on step-by-step tutorials with Oracle By Example.
Download Sample Code.
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
Bash shell, Korn shell, and Bourne shell |
$ |
Bash shell, Korn shell, and Bourne shell for superuser |
# |
C shell |
machine_name% |
C shell for superuser |
machine_name# |