R
- real UID of root, required for applications, Evaluating Software for Security
- rebooting
- activating labels, Reboot and Log In to Trusted Extensions
- enabling login to labeled zone, Enable Users to Log In to a Labeled Zone
- Reducing Printing Restrictions in Trusted Extensions (Task Map), Reducing Printing Restrictions in Trusted Extensions (Task Map)
- regaining control of desktop focus, How to Regain Control of the Desktop's Current Focus
- regular users, See users
- relabeling information, How to Enable a User to Change the Security Level of Data
- remote administration
- defaults, Secure Remote Administration in Trusted Extensions
- methods, Methods for Administering Remote Systems in Trusted Extensions
- remote host templates
- assigning, Configuring Trusted Network Databases (Task Map)
- assigning to hosts, How to Assign a Security Template to a Host or a Group of Hosts
- creating, How to Construct a Remote Host Template
- remote hosts, using fallback mechanism in tnrhdb, Trusted Network Fallback Mechanism
- Remote Login authorization, How to Create a Rights Profile for Convenient Authorizations
- remote logins, enabling for roles, Enable Remote Login by a Role in Trusted Extensions
- remote multilevel desktop, accessing, How to Use Xvnc to Remotely Access a Trusted Extensions System
- remove_allocatable command, Command Line Tools in Trusted Extensions
- removing
- labels on printer output, How to Remove Labels From Printed Output
- zone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone
- removing Trusted Extensions, See disabling
- repairing, labels in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
- requirements for Trusted Extensions
- Oracle Solaris installation options, Install an Oracle Solaris System Securely
- Oracle Solaris installed systems, Prepare an Installed Oracle Solaris System for Trusted Extensions
- resolv.conf file, loading during configuration, Make the Global Zone an LDAP Client in Trusted Extensions
- restoring control of desktop focus, How to Regain Control of the Desktop's Current Focus
- restricting
- access to computer based on label, Effects of Label Range on a Device
- access to devices, Device Protection With Trusted Extensions Software
- access to global zone, Role Assumption in Trusted Extensions
- access to lower-level files, How to Disable the Mounting of Lower-Level Files
- access to printers with labels, Restricting Access to Printers and Print Job Information in Trusted Extensions
- mounts of lower-level files, How to Disable the Mounting of Lower-Level Files
- printer access with labels, Restricting Access to Printers and Print Job Information in Trusted Extensions
- printer label range, How to Configure a Restricted Label Range for a Printer
- remote access, Secure Remote Administration in Trusted Extensions
- Revoke or Reclaim Device authorization
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- rights, See rights profiles
- rights profiles
- assigning, Security Attribute Assignment to Users in Trusted Extensions
- Convenient Authorizations, How to Create a Rights Profile for Convenient Authorizations
- with Allocate Device authorization, How to Assign Device Authorizations
- with device allocation authorizations, How to Assign Device Authorizations
- with new device authorizations, How to Create New Device Authorizations
- roadmaps
- Task Map: Configuring Networking, Task Map: Configuring Networking
- Task Map: Configuring the Global Zone, Task Map: Configuring the Global Zone
- Task Map: Configuring the Labeled Zones, Task Map: Configuring the Labeled Zones
- Task Map: Configuring Trusted Extensions to Your Site's Requirements, Task Map: Configuring Trusted Extensions to Your Site's Requirements
- Task Map: Configuring Trusted Extensions With the Provided Defaults, Task Map: Configuring Trusted Extensions With the Provided Defaults
- Task Map: Configuringthe LDAP Naming Service, Task Map: Configuring the LDAP Naming Service
- Task Map: Preparing an Oracle Solaris System for Trusted Extensions, Task Map: Preparing an Oracle Solaris System for Trusted Extensions
- Task Map: Preparing For and Enabling Trusted Extensions, Task Map: Preparing For and Enabling Trusted Extensions
- role workspace, global zone, Security Requirements When Administering Trusted Extensions
- roleadd command, Create the Security Administrator Role in Trusted Extensions
- roles
- adding local role with roleadd, Create the Security Administrator Role in Trusted Extensions
- administering auditing, Role Setup for Audit Administration
- assigning rights, Security Attribute Assignment to Users in Trusted Extensions
- assuming
- Security Requirements When Administering Trusted Extensions
- How to Enter the Global Zone in Trusted Extensions
- creating, Role Creation in Trusted Extensions
- creating Security Administrator, Create the Security Administrator Role in Trusted Extensions
- determining when to create, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- leaving role workspace, How to Exit the Global Zone in Trusted Extensions
- logging in remotely, Enable Remote Login by a Role in Trusted Extensions
- remote login, Remote Login by a Role in Trusted Extensions
- role assumption from unlabeled host, Remote Role-Based Administration From Unlabeled Hosts
- trusted application access, Administration Tools for Trusted Extensions
- verifying they work, Verify That the Trusted Extensions Roles Work
- workspaces, Security Requirements When Administering Trusted Extensions
- root passwords, required in Trusted Extensions, Prepare an Installed Oracle Solaris System for Trusted Extensions
- root UID, required for applications, Evaluating Software for Security
- route command
- Command Line Tools in Trusted Extensions
- Network Commands in Trusted Extensions
- routing, Overview of Routing in Trusted Extensions
- accreditation checks, Trusted Extensions Accreditation Checks
- commands in Trusted Extensions, Routing Commands in Trusted Extensions
- concepts, Administration of Routing in Trusted Extensions
- example of, Gateways in Trusted Extensions
- specifying default routes for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
- static with security attributes, How to Configure Routes With Security Attributes
- tables
- Routing Table Entries in Trusted Extensions
- Choosing Routers in Trusted Extensions
- using route command, How to Configure Routes With Security Attributes