R
- real UID of root, required for applications,
Evaluating Software for Security
- rebooting
- activating labels,
Reboot and Log In to Trusted Extensions
- enabling login to labeled zone,
Enable Users to Log In to a Labeled Zone
- Reducing Printing Restrictions in Trusted Extensions (Task Map),
Reducing Printing Restrictions in Trusted Extensions (Task Map)
- regaining control of desktop focus,
How to Regain Control of the Desktop's Current Focus
- regular users, See users
- relabeling information,
How to Enable a User to Change the Security Level of Data
- remote administration
- defaults,
Secure Remote Administration in Trusted Extensions
- methods,
Methods for Administering Remote Systems in Trusted Extensions
- remote host templates
- assigning,
Configuring Trusted Network Databases (Task Map)
- assigning to hosts,
How to Assign a Security Template to a Host or a Group of Hosts
- creating,
How to Construct a Remote Host Template
- remote hosts, using fallback mechanism in tnrhdb,
Trusted Network Fallback Mechanism
- Remote Login authorization,
How to Create a Rights Profile for Convenient Authorizations
- remote logins, enabling for roles,
Enable Remote Login by a Role in Trusted Extensions
- remote multilevel desktop, accessing,
How to Use Xvnc to Remotely Access a Trusted Extensions System
- remove_allocatable command,
Command Line Tools in Trusted Extensions
- removing
- labels on printer output,
How to Remove Labels From Printed Output
- zone-specific nscd daemon,
Configure a Name Service Cache in Each Labeled Zone
- removing Trusted Extensions, See disabling
- repairing, labels in internal databases,
How to Obtain a Readable Label From Its Hexadecimal Form
- requirements for Trusted Extensions
- Oracle Solaris installation options,
Install an Oracle Solaris System Securely
- Oracle Solaris installed systems,
Prepare an Installed Oracle Solaris System for Trusted Extensions
- resolv.conf file, loading during configuration,
Make the Global Zone an LDAP Client in Trusted Extensions
- restoring control of desktop focus,
How to Regain Control of the Desktop's Current Focus
- restricting
- access to computer based on label,
Effects of Label Range on a Device
- access to devices,
Device Protection With Trusted Extensions Software
- access to global zone,
Role Assumption in Trusted Extensions
- access to lower-level files,
How to Disable the Mounting of Lower-Level Files
- access to printers with labels,
Restricting Access to Printers and Print Job Information in Trusted Extensions
- mounts of lower-level files,
How to Disable the Mounting of Lower-Level Files
- printer access with labels,
Restricting Access to Printers and Print Job Information in Trusted Extensions
- printer label range,
How to Configure a Restricted Label Range for a Printer
- remote access,
Secure Remote Administration in Trusted Extensions
- Revoke or Reclaim Device authorization
How to Assign Device Authorizations
How to Assign Device Authorizations
- rights, See rights profiles
- rights profiles
- assigning,
Security Attribute Assignment to Users in Trusted Extensions
- Convenient Authorizations,
How to Create a Rights Profile for Convenient Authorizations
- with Allocate Device authorization,
How to Assign Device Authorizations
- with device allocation authorizations,
How to Assign Device Authorizations
- with new device authorizations,
How to Create New Device Authorizations
- roadmaps
- Task Map: Configuring Networking,
Task Map: Configuring Networking
- Task Map: Configuring the Global Zone,
Task Map: Configuring the Global Zone
- Task Map: Configuring the Labeled Zones,
Task Map: Configuring the Labeled Zones
- Task Map: Configuring Trusted Extensions to Your Site's Requirements,
Task Map: Configuring Trusted Extensions to Your Site's Requirements
- Task Map: Configuring Trusted Extensions With the Provided Defaults,
Task Map: Configuring Trusted Extensions With the Provided Defaults
- Task Map: Configuringthe LDAP Naming Service,
Task Map: Configuring the LDAP Naming Service
- Task Map: Preparing an Oracle Solaris System for Trusted Extensions,
Task Map: Preparing an Oracle Solaris System for Trusted Extensions
- Task Map: Preparing For and Enabling Trusted Extensions,
Task Map: Preparing For and Enabling Trusted Extensions
- role workspace, global zone,
Security Requirements When Administering Trusted Extensions
- roleadd command,
Create the Security Administrator Role in Trusted Extensions
- roles
- adding local role with roleadd,
Create the Security Administrator Role in Trusted Extensions
- administering auditing,
Role Setup for Audit Administration
- assigning rights,
Security Attribute Assignment to Users in Trusted Extensions
- assuming
Security Requirements When Administering Trusted Extensions
How to Enter the Global Zone in Trusted Extensions
- creating,
Role Creation in Trusted Extensions
- creating Security Administrator,
Create the Security Administrator Role in Trusted Extensions
- determining when to create,
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- leaving role workspace,
How to Exit the Global Zone in Trusted Extensions
- logging in remotely,
Enable Remote Login by a Role in Trusted Extensions
- remote login,
Remote Login by a Role in Trusted Extensions
- role assumption from unlabeled host,
Remote Role-Based Administration From Unlabeled Hosts
- trusted application access,
Administration Tools for Trusted Extensions
- verifying they work,
Verify That the Trusted Extensions Roles Work
- workspaces,
Security Requirements When Administering Trusted Extensions
- root passwords, required in Trusted Extensions,
Prepare an Installed Oracle Solaris System for Trusted Extensions
- root UID, required for applications,
Evaluating Software for Security
- route command
Command Line Tools in Trusted Extensions
Network Commands in Trusted Extensions
- routing,
Overview of Routing in Trusted Extensions
- accreditation checks,
Trusted Extensions Accreditation Checks
- commands in Trusted Extensions,
Routing Commands in Trusted Extensions
- concepts,
Administration of Routing in Trusted Extensions
- example of,
Gateways in Trusted Extensions
- specifying default routes for labeled zones,
Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
- static with security attributes,
How to Configure Routes With Security Attributes
- tables
Routing Table Entries in Trusted Extensions
Choosing Routers in Trusted Extensions
- using route command,
How to Configure Routes With Security Attributes