P
- packages, Trusted Extensions software, Add Trusted Extensions Packages to an Oracle Solaris System
- panels, displaying on Trusted Extensions desktop, Desktop Panels Do Not Display
- passwords
- assigning, Security Attribute Assignment to Users in Trusted Extensions
- Change Password menu item
- Trusted Extensions Security Features
- How to Change the Password for root
- changing for root, How to Change the Password for root
- changing user passwords, Trusted Extensions Security Features
- providing when changing labels, Trusted Extensions Security Features
- storage, Password Protection
- testing if password prompt is trusted, How to Regain Control of the Desktop's Current Focus
- plabel command, Command Line Tools in Trusted Extensions
- planning
- See also Trusted Extensions use
- account creation, Planning User Security in Trusted Extensions
- administration strategy, Devising an Administration Strategy for Trusted Extensions
- auditing, Planning for Auditing in Trusted Extensions
- data migration, Backing Up the System Before Enabling Trusted Extensions
- hardware, Planning System Hardware and Capacity for Trusted Extensions
- labels, Devising a Label Strategy
- laptop configuration, Planning for Multilevel Access
- LDAP naming service, Planning for the LDAP Naming Service in Trusted Extensions
- network, Planning Your Trusted Network
- NFS server, Planning for Multilevel Access
- printing, Planning for Multilevel Access
- Trusted Extensions, Planning for Security in Trusted Extensions
- Trusted Extensions configuration strategy, Devising a Configuration Strategy for Trusted Extensions
- zones, Planning for Zones in Trusted Extensions
- policy.conf file
- changing defaults, How to Change Security Defaults in System Files
- changing Trusted Extensions keywords, How to Modify policy.conf Defaults
- defaults, policy.conf File Defaults in Trusted Extensions
- how to edit, How to Modify policy.conf Defaults
- PostScript
- enabling to print, How to Enable Users to Print PostScript Files in Trusted Extensions
- printing restrictions in Trusted Extensions, PostScript Printing of Security Information
- preventing, See protecting
- Print Postscript authorization
- How to Create a Rights Profile for Convenient Authorizations
- PostScript Printing of Security Information
- How to Enable Users to Print PostScript Files in Trusted Extensions
- Print without Banner authorization
- How to Create a Rights Profile for Convenient Authorizations
- How to Suppress Banner and Trailer Pages for Specific Users
- Print without Label authorization, How to Create a Rights Profile for Convenient Authorizations
- printer output, See printing
- printers, setting label range, Effects of Label Range on a Device
- printing
- adding conversion filters, Additional Conversion Filters
- and label_encodings file, Label Encodings File
- authorizations for unlabeled output from a public system, How to Modify policy.conf Defaults
- configuring for multilevel labeled output, How to Configure a Multilevel Print Server and Its Printers
- configuring for print client, How to Enable a Trusted Extensions Client to Access a Printer
- configuring labeled zone, How to Configure a Zone for Single-Label Printing
- configuring labels and text, Labeled Banner and Trailer Pages
- configuring public print jobs, How to Assign a Label to an Unlabeled Print Server
- in local language, Labeled Banner and Trailer Pages
- internationalizing labeled output, Labeled Banner and Trailer Pages
- interoperability with Trusted Solaris 8, Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
- labeling an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
- localizing labeled output, Labeled Banner and Trailer Pages
- managing, Labels, Printers, and Printing
- model scripts, Printer Model Scripts
- planning, Planning for Multilevel Access
- PostScript files, How to Enable Users to Print PostScript Files in Trusted Extensions
- PostScript restrictions in Trusted Extensions, PostScript Printing of Security Information
- preventing labels on output, How to Remove Labels From Printed Output
- public jobs from an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
- removing PostScript restriction, How to Create a Rights Profile for Convenient Authorizations
- restricting label range, How to Configure a Restricted Label Range for a Printer
- using an Oracle Solaris print server, How to Assign a Label to an Unlabeled Print Server
- without labeled banners and trailers
- How to Create a Rights Profile for Convenient Authorizations
- How to Suppress Banner and Trailer Pages for Specific Users
- without page labels
- How to Create a Rights Profile for Convenient Authorizations
- How to Remove Page Labels From All Print Jobs
- privileges
- changing defaults for users, Security Attribute Assignment to Users in Trusted Extensions
- non-obvious reasons for requiring, Evaluating Software for Security
- removing proc_info from basic set, How to Modify policy.conf Defaults
- restricting users', How to Restrict a User's Set of Privileges
- when executing commands, How to Enter the Global Zone in Trusted Extensions
- proc_info privilege, removing from basic set, How to Modify policy.conf Defaults
- procedures, See tasks and task maps
- processes
- labels of, What Labels Protect and Where Labels Appear
- labels of user processes, Label Ranges
- preventing users from seeing others' processes, How to Modify policy.conf Defaults
- profiles, See rights profiles
- programs, See applications
- protecting
- devices
- Device Manager
- Device Protection With Trusted Extensions Software
- devices from remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions
- file systems by using non-proprietary names, How to Share Directories From a Labeled Zone
- files at lower labels from being accessed, How to Disable the Mounting of Lower-Level Files
- from access by arbitrary hosts, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- information with labels, What Labels Protect and Where Labels Appear
- labeled hosts from contact by arbitrary unlabeled hosts, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- nonallocatable devices, How to Protect Nonallocatable Devices in Trusted Extensions
- publications, security and UNIX, Additional Security References