JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration and Administration     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

7.  Trusted Extensions Administration Concepts

8.  Trusted Extensions Administration Tools

9.  Getting Started as a Trusted Extensions Administrator (Tasks)

10.  Security Requirements on a Trusted Extensions System (Overview)

11.  Administering Security Requirements in Trusted Extensions (Tasks)

12.  Users, Rights, and Roles in Trusted Extensions (Overview)

13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

14.  Remote Administration in Trusted Extensions (Tasks)

15.  Trusted Extensions and LDAP (Overview)

16.  Managing Zones in Trusted Extensions (Tasks)

17.  Managing and Mounting Files in Trusted Extensions (Tasks)

18.  Trusted Networking (Overview)

19.  Managing Networks in Trusted Extensions (Tasks)

20.  Multilevel Mail in Trusted Extensions (Overview)

21.  Managing Labeled Printing (Tasks)

22.  Devices in Trusted Extensions (Overview)

23.  Managing Devices for Trusted Extensions (Tasks)

24.  Trusted Extensions Auditing (Overview)

25.  Software Management in Trusted Extensions (Reference)

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

S

scripts
getmounts, How to Display the Labels of Mounted Files
getzonelabels, How to Display Ready or Running Zones
/usr/sbin/txzonemgr
Administration Tools for Trusted Extensions
Zone Administration Utilities in Trusted Extensions
secure attention, key combination, How to Regain Control of the Desktop's Current Focus
security
initial setup team, Initial Setup Team Responsibilities
publications, Additional Security References
root password, Prepare an Installed Oracle Solaris System for Trusted Extensions
site security policy, Site Security Policy
Security Administrator role
administering PostScript restriction, PostScript Printing of Security Information
administering printer security, Labels, Printers, and Printing
administering users, Managing Users and Rights (Task Map)
assigning authorizations to users, How to Create a Rights Profile for Convenient Authorizations
audit tasks, Audit Tasks of the Security Administrator
configuring a device, How to Configure a Device in Trusted Extensions
creating, Create the Security Administrator Role in Trusted Extensions
creating Convenient Authorizations rights profile, How to Create a Rights Profile for Convenient Authorizations
enabling unlabeled body pages from a public system, How to Modify policy.conf Defaults
enforcing security, Enforcement of Device Security in Trusted Extensions
protecting nonallocatable devices, How to Protect Nonallocatable Devices in Trusted Extensions
security administrators, See Security Administrator role
security attributes, Routing Table Entries in Trusted Extensions
modifying defaults for all users, How to Modify policy.conf Defaults
modifying user defaults, How to Modify Default User Label Attributes
setting for remote hosts, How to Construct a Remote Host Template
using in routing, How to Configure Routes With Security Attributes
security information, on printer output, Labeled Printer Output
security label set, remote host templates, Network Security Attributes in Trusted Extensions
security mechanisms
extensible, Extension of Oracle Solaris Security Mechanisms by Trusted Extensions
Oracle Solaris, Oracle Solaris Security Mechanisms for Software
security policy
auditing, Trusted Extensions Audit Policy Options
training users, Users and Security Requirements
users and devices, Enforcement of Device Security in Trusted Extensions
security templates, See remote host templates
sel_config file, sel_config File
configuring selection transfer rules, sel_config File
selecting, audit records by label, Audit Tasks of the System Administrator
Selection Manager
changing timeout, How to Lengthen the Timeout When Relabeling Information
configuring rules for selection confirmer, sel_config File
Selection Manager application, Rules When Changing the Level of Security for Data
service management framework (SMF)
dpadm, Install the Sun Java System Directory Server
dsadm, Install the Sun Java System Directory Server
labeld service, Enable Trusted Extensions
session range, Label Ranges
sessions, failsafe, How to Log In to a Failsafe Session in Trusted Extensions
setlabel command, Command Line Tools in Trusted Extensions
sharing, ZFS dataset from labeled zone, How to Share a ZFS Dataset From a Labeled Zone
Shutdown authorization, How to Create a Rights Profile for Convenient Authorizations
similarities
between Trusted Extensions and Oracle Solaris auditing, Trusted Extensions and Auditing
between Trusted Extensions and Oracle Solaris OS, Similarities Between Trusted Extensions and the Oracle Solaris OS
single-label operation, Label Ranges
single-label printing, configuring for a zone, How to Configure a Zone for Single-Label Printing
site security policy
common violations, Common Security Violations
personnel recommendations, Personnel Security Recommendations
physical access recommendations, Physical Security Recommendations
recommendations, Computer Security Recommendations
tasks involved, Site Security Policy
Trusted Extensions configuration decisions, Site Security Policy and Trusted Extensions
understanding, Understanding Your Site's Security Policy
snoop command
Network Commands in Trusted Extensions
How to Debug the Trusted Extensions Network
software
administering third-party, Software Management in Trusted Extensions (Reference)
importing, Adding Software to Trusted Extensions
solaris.print.nobanner authorization
How to Modify policy.conf Defaults
How to Suppress Banner and Trailer Pages for Specific Users
solaris.print.ps authorization, How to Enable Users to Print PostScript Files in Trusted Extensions
solaris.print.unlabeled authorization, How to Modify policy.conf Defaults
StarOffice, lengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Information
startup files, procedures for customizing, How to Configure Startup Files for Users in Trusted Extensions
Stop-A, enabling, How to Change Security Defaults in System Files
Sun Java System Directory Server, See LDAP server
Sun Ray systems
enabling initial contact between client and server, How to Limit the Hosts That Can Be Contacted on the Trusted Network
LDAP servers, and, Configuring the Sun Java System Directory Server on a Trusted Extensions System
preventing users from seeing others' processes, How to Modify policy.conf Defaults
tnrhdb address for client contact, How to Limit the Hosts That Can Be Contacted on the Trusted Network
web site for documentation, Task Map: Preparing For and Enabling Trusted Extensions
System Administrator role
adding device_clean script, How to Add a Device_Clean Script in Trusted Extensions
adding print conversion filters, Additional Conversion Filters
administering printers, Labels, Printers, and Printing
audit tasks, Audit Tasks of the System Administrator
creating, Create a System Administrator Role
reclaiming a device, How to Revoke or Reclaim a Device in Trusted Extensions
reviewing audit records, Audit Tasks of the System Administrator
system files
editing, How to Change Security Defaults in System Files
Oracle Solaris /etc/default/print, How to Enable Users to Print PostScript Files in Trusted Extensions
Oracle Solaris policy.conf, How to Enable Users to Print PostScript Files in Trusted Extensions
Trusted Extensions sel_config, sel_config File
Trusted Extensions tsol_separator.ps, How to Remove Page Labels From All Print Jobs