JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration and Administration     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

7.  Trusted Extensions Administration Concepts

8.  Trusted Extensions Administration Tools

9.  Getting Started as a Trusted Extensions Administrator (Tasks)

10.  Security Requirements on a Trusted Extensions System (Overview)

11.  Administering Security Requirements in Trusted Extensions (Tasks)

12.  Users, Rights, and Roles in Trusted Extensions (Overview)

13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

14.  Remote Administration in Trusted Extensions (Tasks)

15.  Trusted Extensions and LDAP (Overview)

16.  Managing Zones in Trusted Extensions (Tasks)

17.  Managing and Mounting Files in Trusted Extensions (Tasks)

18.  Trusted Networking (Overview)

19.  Managing Networks in Trusted Extensions (Tasks)

20.  Multilevel Mail in Trusted Extensions (Overview)

21.  Managing Labeled Printing (Tasks)

22.  Devices in Trusted Extensions (Overview)

23.  Managing Devices for Trusted Extensions (Tasks)

24.  Trusted Extensions Auditing (Overview)

25.  Software Management in Trusted Extensions (Reference)

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

P

packages, Trusted Extensions software, Add Trusted Extensions Packages to an Oracle Solaris System
panels, displaying on Trusted Extensions desktop, Desktop Panels Do Not Display
passwords
assigning, Security Attribute Assignment to Users in Trusted Extensions
Change Password menu item
Trusted Extensions Security Features
How to Change the Password for root
changing for root, How to Change the Password for root
changing user passwords, Trusted Extensions Security Features
providing when changing labels, Trusted Extensions Security Features
storage, Password Protection
testing if password prompt is trusted, How to Regain Control of the Desktop's Current Focus
plabel command, Command Line Tools in Trusted Extensions
planning
See also Trusted Extensions use
account creation, Planning User Security in Trusted Extensions
administration strategy, Devising an Administration Strategy for Trusted Extensions
auditing, Planning for Auditing in Trusted Extensions
data migration, Backing Up the System Before Enabling Trusted Extensions
hardware, Planning System Hardware and Capacity for Trusted Extensions
labels, Devising a Label Strategy
laptop configuration, Planning for Multilevel Access
LDAP naming service, Planning for the LDAP Naming Service in Trusted Extensions
network, Planning Your Trusted Network
NFS server, Planning for Multilevel Access
printing, Planning for Multilevel Access
Trusted Extensions, Planning for Security in Trusted Extensions
Trusted Extensions configuration strategy, Devising a Configuration Strategy for Trusted Extensions
zones, Planning for Zones in Trusted Extensions
policy.conf file
changing defaults, How to Change Security Defaults in System Files
changing Trusted Extensions keywords, How to Modify policy.conf Defaults
defaults, policy.conf File Defaults in Trusted Extensions
how to edit, How to Modify policy.conf Defaults
PostScript
enabling to print, How to Enable Users to Print PostScript Files in Trusted Extensions
printing restrictions in Trusted Extensions, PostScript Printing of Security Information
preventing, See protecting
Print Postscript authorization
How to Create a Rights Profile for Convenient Authorizations
PostScript Printing of Security Information
How to Enable Users to Print PostScript Files in Trusted Extensions
Print without Banner authorization
How to Create a Rights Profile for Convenient Authorizations
How to Suppress Banner and Trailer Pages for Specific Users
Print without Label authorization, How to Create a Rights Profile for Convenient Authorizations
printer output, See printing
printers, setting label range, Effects of Label Range on a Device
printing
adding conversion filters, Additional Conversion Filters
and label_encodings file, Label Encodings File
authorizations for unlabeled output from a public system, How to Modify policy.conf Defaults
configuring for multilevel labeled output, How to Configure a Multilevel Print Server and Its Printers
configuring for print client, How to Enable a Trusted Extensions Client to Access a Printer
configuring labeled zone, How to Configure a Zone for Single-Label Printing
configuring labels and text, Labeled Banner and Trailer Pages
configuring public print jobs, How to Assign a Label to an Unlabeled Print Server
in local language, Labeled Banner and Trailer Pages
internationalizing labeled output, Labeled Banner and Trailer Pages
interoperability with Trusted Solaris 8, Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
labeling an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
localizing labeled output, Labeled Banner and Trailer Pages
managing, Labels, Printers, and Printing
model scripts, Printer Model Scripts
planning, Planning for Multilevel Access
PostScript files, How to Enable Users to Print PostScript Files in Trusted Extensions
PostScript restrictions in Trusted Extensions, PostScript Printing of Security Information
preventing labels on output, How to Remove Labels From Printed Output
public jobs from an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
removing PostScript restriction, How to Create a Rights Profile for Convenient Authorizations
restricting label range, How to Configure a Restricted Label Range for a Printer
using an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
without labeled banners and trailers
How to Create a Rights Profile for Convenient Authorizations
How to Suppress Banner and Trailer Pages for Specific Users
without page labels
How to Create a Rights Profile for Convenient Authorizations
How to Remove Page Labels From All Print Jobs
privileges
changing defaults for users, Security Attribute Assignment to Users in Trusted Extensions
non-obvious reasons for requiring, Evaluating Software for Security
removing proc_info from basic set, How to Modify policy.conf Defaults
restricting users', How to Restrict a User's Set of Privileges
when executing commands, How to Enter the Global Zone in Trusted Extensions
proc_info privilege, removing from basic set, How to Modify policy.conf Defaults
procedures, See tasks and task maps
processes
labels of, What Labels Protect and Where Labels Appear
labels of user processes, Label Ranges
preventing users from seeing others' processes, How to Modify policy.conf Defaults
profiles, See rights profiles
programs, See applications
protecting
devices
Device Manager
Device Protection With Trusted Extensions Software
devices from remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions
file systems by using non-proprietary names, How to Share Directories From a Labeled Zone
files at lower labels from being accessed, How to Disable the Mounting of Lower-Level Files
from access by arbitrary hosts, How to Limit the Hosts That Can Be Contacted on the Trusted Network
information with labels, What Labels Protect and Where Labels Appear
labeled hosts from contact by arbitrary unlabeled hosts, How to Limit the Hosts That Can Be Contacted on the Trusted Network
nonallocatable devices, How to Protect Nonallocatable Devices in Trusted Extensions
publications, security and UNIX, Additional Security References