P
- packages, Trusted Extensions software,
Add Trusted Extensions Packages to an Oracle Solaris System
- panels, displaying on Trusted Extensions desktop,
Desktop Panels Do Not Display
- passwords
- assigning,
Security Attribute Assignment to Users in Trusted Extensions
- Change Password menu item
Trusted Extensions Security Features
How to Change the Password for root
- changing for root,
How to Change the Password for root
- changing user passwords,
Trusted Extensions Security Features
- providing when changing labels,
Trusted Extensions Security Features
- storage,
Password Protection
- testing if password prompt is trusted,
How to Regain Control of the Desktop's Current Focus
- plabel command,
Command Line Tools in Trusted Extensions
- planning
- See also Trusted Extensions use
- account creation,
Planning User Security in Trusted Extensions
- administration strategy,
Devising an Administration Strategy for Trusted Extensions
- auditing,
Planning for Auditing in Trusted Extensions
- data migration,
Backing Up the System Before Enabling Trusted Extensions
- hardware,
Planning System Hardware and Capacity for Trusted Extensions
- labels,
Devising a Label Strategy
- laptop configuration,
Planning for Multilevel Access
- LDAP naming service,
Planning for the LDAP Naming Service in Trusted Extensions
- network,
Planning Your Trusted Network
- NFS server,
Planning for Multilevel Access
- printing,
Planning for Multilevel Access
- Trusted Extensions,
Planning for Security in Trusted Extensions
- Trusted Extensions configuration strategy,
Devising a Configuration Strategy for Trusted Extensions
- zones,
Planning for Zones in Trusted Extensions
- policy.conf file
- changing defaults,
How to Change Security Defaults in System Files
- changing Trusted Extensions keywords,
How to Modify policy.conf Defaults
- defaults,
policy.conf File Defaults in Trusted Extensions
- how to edit,
How to Modify policy.conf Defaults
- PostScript
- enabling to print,
How to Enable Users to Print PostScript Files in Trusted Extensions
- printing restrictions in Trusted Extensions,
PostScript Printing of Security Information
- preventing, See protecting
- Print Postscript authorization
How to Create a Rights Profile for Convenient Authorizations
PostScript Printing of Security Information
How to Enable Users to Print PostScript Files in Trusted Extensions
- Print without Banner authorization
How to Create a Rights Profile for Convenient Authorizations
How to Suppress Banner and Trailer Pages for Specific Users
- Print without Label authorization,
How to Create a Rights Profile for Convenient Authorizations
- printer output, See printing
- printers, setting label range,
Effects of Label Range on a Device
- printing
- adding conversion filters,
Additional Conversion Filters
- and label_encodings file,
Label Encodings File
- authorizations for unlabeled output from a public system,
How to Modify policy.conf Defaults
- configuring for multilevel labeled output,
How to Configure a Multilevel Print Server and Its Printers
- configuring for print client,
How to Enable a Trusted Extensions Client to Access a Printer
- configuring labeled zone,
How to Configure a Zone for Single-Label Printing
- configuring labels and text,
Labeled Banner and Trailer Pages
- configuring public print jobs,
How to Assign a Label to an Unlabeled Print Server
- in local language,
Labeled Banner and Trailer Pages
- internationalizing labeled output,
Labeled Banner and Trailer Pages
- interoperability with Trusted Solaris 8,
Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
- labeling an Oracle Solaris print server,
How to Assign a Label to an Unlabeled Print Server
- localizing labeled output,
Labeled Banner and Trailer Pages
- managing,
Labels, Printers, and Printing
- model scripts,
Printer Model Scripts
- planning,
Planning for Multilevel Access
- PostScript files,
How to Enable Users to Print PostScript Files in Trusted Extensions
- PostScript restrictions in Trusted Extensions,
PostScript Printing of Security Information
- preventing labels on output,
How to Remove Labels From Printed Output
- public jobs from an Oracle Solaris print server,
How to Assign a Label to an Unlabeled Print Server
- removing PostScript restriction,
How to Create a Rights Profile for Convenient Authorizations
- restricting label range,
How to Configure a Restricted Label Range for a Printer
- using an Oracle Solaris print server,
How to Assign a Label to an Unlabeled Print Server
- without labeled banners and trailers
How to Create a Rights Profile for Convenient Authorizations
How to Suppress Banner and Trailer Pages for Specific Users
- without page labels
How to Create a Rights Profile for Convenient Authorizations
How to Remove Page Labels From All Print Jobs
- privileges
- changing defaults for users,
Security Attribute Assignment to Users in Trusted Extensions
- non-obvious reasons for requiring,
Evaluating Software for Security
- removing proc_info from basic set,
How to Modify policy.conf Defaults
- restricting users',
How to Restrict a User's Set of Privileges
- when executing commands,
How to Enter the Global Zone in Trusted Extensions
- proc_info privilege, removing from basic set,
How to Modify policy.conf Defaults
- procedures, See tasks and task maps
- processes
- labels of,
What Labels Protect and Where Labels Appear
- labels of user processes,
Label Ranges
- preventing users from seeing others' processes,
How to Modify policy.conf Defaults
- profiles, See rights profiles
- programs, See applications
- protecting
- devices
Device Manager
Device Protection With Trusted Extensions Software
- devices from remote allocation,
How to Protect Nonallocatable Devices in Trusted Extensions
- file systems by using non-proprietary names,
How to Share Directories From a Labeled Zone
- files at lower labels from being accessed,
How to Disable the Mounting of Lower-Level Files
- from access by arbitrary hosts,
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- information with labels,
What Labels Protect and Where Labels Appear
- labeled hosts from contact by arbitrary unlabeled hosts,
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- nonallocatable devices,
How to Protect Nonallocatable Devices in Trusted Extensions
- publications, security and UNIX,
Additional Security References