| Skip Navigation Links | |
| Exit Print View | |
|
Oracle Solaris Trusted Extensions Configuration and Administration Oracle Solaris 11 Express 11/10 |
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Reference)
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Additional Security References
B. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
C. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Oracle Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
D. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Oracle Solaris Man Pages That Are Modified by Trusted Extensions
Device Access Policies
Differences Between Trusted Extensions and the Oracle Solaris OS
Getting Started as a Trusted Extensions Administrator (Task Map)
Audit Tasks of the System Administrator
Device Protection With Trusted Extensions Software
How to Enter the Global Zone in Trusted Extensions
Zones in Trusted Extensions
Labels, Printers, and Printing
How to Use Xvnc to Remotely Access a Trusted Extensions System
How to Share a ZFS Dataset From a Labeled Zone
Labeled Zone Is Unable to Access the X Server
How to Prevent Account Locking for Users
Creating Roles and Users in Trusted Extensions
Planning User Security in Trusted Extensions
Trusted Extensions Accreditation Checks
Label Encodings File
Command Line Tools in Trusted Extensions
Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
Create the Security Administrator Role in Trusted Extensions
Create Users Who Can Assume Roles in Trusted Extensions
Populate the Sun Java System Directory Server
Configure a Name Service Cache in Each Labeled Zone
Creating Roles and Users in Trusted Extensions
Configure the Network Interfaces in Trusted Extensions
Add Trusted Extensions Packages to an Oracle Solaris System
Enable Trusted Extensions
Create Users Who Can Assume Roles in Trusted Extensions
Add a Network Interface to Route an Existing Labeled Zone
Configure a Name Service Cache in Each Labeled Zone
Additional Trusted Extensions Configuration Tasks
Dominance Relationships Between Labels
Dominance Relationships Between Labels
Password Protection
How to Prevent Account Locking for Users
How to Assign Device Authorizations
Audit Management by Role in Trusted Extensions
How to Enable a User to Change the Security Level of Data
How to Create a Rights Profile for Convenient Authorizations
How to Assign Device Authorizations
How to Create New Device Authorizations
How to NFS Mount Files in a Labeled Zone
Sharing and Mounting Files in Trusted Extensions
How to Troubleshoot Mount Failures in Trusted Extensions
How to Back Up Files in Trusted Extensions
How to Restore Files in Trusted Extensions
How to Enter the Global Zone in Trusted Extensions
Managing Labeled Printing (Tasks)
Trusted Extensions and LDAP (Overview)
Multilevel Mail in Trusted Extensions (Overview)
How to Compare Trusted Network Database Information With the Kernel Cache
Managing Networks in Trusted Extensions (Tasks)
How to Enable Users to Print PostScript Files in Trusted Extensions
Managing Printing in Trusted Extensions (Task Map)
Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
Quick Reference to Trusted Extensions Administration
How to Assign a Security Template to a Host or a Group of Hosts
How to Construct a Remote Host Template
Remote Administration in Trusted Extensions (Tasks)
Enable Remote Login by a Role in Trusted Extensions
How to Log In Remotely From the Command Line in Trusted Extensions
How to Configure Routes With Security Attributes
How to Share Directories From a Labeled Zone
How to Configure Startup Files for Users in Trusted Extensions
How to Change Security Defaults in System Files
Software Management in Trusted Extensions (Reference)
How to Lengthen the Timeout When Relabeling Information
Configuring Trusted Network Databases (Task Map)
Managing Networks in Trusted Extensions (Tasks)
Reducing Printing Restrictions in Trusted Extensions (Task Map)
How to Restrict a User's Set of Privileges
Managing Zones (Task Map)
Zone Administration Utilities in Trusted Extensions
Administering Trusted Extensions Remotely (Task Map)
Dominance Relationships Between Labels
Getting Started as a Trusted Extensions Administrator (Task Map)
Command Line Tools in Trusted Extensions
Configuration Files in Trusted Extensions
Trusted Extensions Administration Tools
Device Manager
Label Builder in Trusted Extensions
txzonemgr Script
txzonemgr Script
Command Line Tools in Trusted Extensions
How to Revoke or Reclaim a Device in Trusted Extensions
Device Manager GUI
How to Copy Files to Portable Media in Trusted Extensions
Security Administrator Responsibilities for Trusted Programs
Evaluating Software for Security
Security Attribute Assignment to Users in Trusted Extensions
Security Attribute Assignment to Users in Trusted Extensions
How to Enter the Global Zone in Trusted Extensions
How to Enter the Global Zone in Trusted Extensions
How to Protect Nonallocatable Devices in Trusted Extensions
Trusted Extensions Audit Classes
Trusted Extensions Audit Events
Trusted Extensions Audit Policy Options
Trusted Extensions Audit Policy Options
Audit Tasks of the System Administrator
Audit Tasks of the System Administrator
label Token
Trusted Extensions Audit Tokens
xatom Token
xclient Token
xcolormap Token
xcursor Token
xfont Token
xgc Token
xpixmap Token
xproperty Token
xselect Token
xwindow Token
Command Line Tools in Trusted Extensions
Planning for Auditing in Trusted Extensions
Trusted Extensions Audit Events
Trusted Extensions Audit Policy Options
Trusted Extensions Audit Tokens
Extensions to Auditing Commands in Trusted Extensions
Trusted Extensions and Auditing
Trusted Extensions Auditing (Overview)
Audit Management by Role in Trusted Extensions
Audit Tasks of the Security Administrator
Audit Tasks of the System Administrator
Audit Tasks in Trusted Extensions
Trusted Extensions Audit Classes
Command Line Tools in Trusted Extensions
How to Create New Device Authorizations
Security Attribute Assignment to Users in Trusted Extensions
How to Assign Device Authorizations
How to Enable a User to Change the Security Level of Data
How to Assign Device Authorizations
How to Create a Rights Profile for Convenient Authorizations
How to Create New Device Authorizations
How to Create New Device Authorizations
How to Add Site-Specific Authorizations to a Device in Trusted Extensions
Trusted Extensions and Access Control
PostScript Printing of Security Information
How to Enable Users to Print PostScript Files in Trusted Extensions
How to Assign Device Authorizations
How to Suppress Banner and Trailer Pages for Specific Users
How to Enable Users to Print PostScript Files in Trusted Extensions
How to Assign Device Authorizations
Reducing Printing Restrictions in Trusted Extensions (Task Map)
Reducing Printing Restrictions in Trusted Extensions (Task Map)
Command Line Tools in Trusted Extensions