JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration and Administration     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

7.  Trusted Extensions Administration Concepts

8.  Trusted Extensions Administration Tools

9.  Getting Started as a Trusted Extensions Administrator (Tasks)

10.  Security Requirements on a Trusted Extensions System (Overview)

11.  Administering Security Requirements in Trusted Extensions (Tasks)

12.  Users, Rights, and Roles in Trusted Extensions (Overview)

13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

14.  Remote Administration in Trusted Extensions (Tasks)

15.  Trusted Extensions and LDAP (Overview)

16.  Managing Zones in Trusted Extensions (Tasks)

17.  Managing and Mounting Files in Trusted Extensions (Tasks)

18.  Trusted Networking (Overview)

19.  Managing Networks in Trusted Extensions (Tasks)

20.  Multilevel Mail in Trusted Extensions (Overview)

21.  Managing Labeled Printing (Tasks)

22.  Devices in Trusted Extensions (Overview)

23.  Managing Devices for Trusted Extensions (Tasks)

24.  Trusted Extensions Auditing (Overview)

25.  Software Management in Trusted Extensions (Reference)

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

U

unlabeled printing, configuring, Reducing Printing Restrictions in Trusted Extensions (Task Map)
updatehome command
Command Line Tools in Trusted Extensions
.copy_files and .link_files Files
Upgrade DragNDrop or CutPaste Info authorization, How to Create a Rights Profile for Convenient Authorizations
Upgrade File Label authorization, How to Create a Rights Profile for Convenient Authorizations
upgrading labels, configuring rules for selection confirmer, sel_config File
useradd command, Create Users Who Can Assume Roles in Trusted Extensions
users
accessing devices
Device Protection With Trusted Extensions Software
Device Protection With Trusted Extensions Software
accessing printers, Labels, Printers, and Printing
adding local user with useradd, Create Users Who Can Assume Roles in Trusted Extensions
assigning authorizations to, Security Attribute Assignment to Users in Trusted Extensions
assigning labels, Security Attribute Assignment to Users in Trusted Extensions
assigning passwords, Security Attribute Assignment to Users in Trusted Extensions
assigning rights, Security Attribute Assignment to Users in Trusted Extensions
assigning roles to, Security Attribute Assignment to Users in Trusted Extensions
authorizations for, How to Create a Rights Profile for Convenient Authorizations
Change Password menu item, Trusted Extensions Security Features
Change Workspace Label menu item, Trusted Extensions Security Features
changing default privileges, Security Attribute Assignment to Users in Trusted Extensions
creating, Administrator Responsibilities for Users
creating initial users, Create Users Who Can Assume Roles in Trusted Extensions
customizing environment, Customizing the User Environment for Security (Task Map)
deletion precautions, User Deletion Practices
labels of processes, Label Ranges
lengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Information
logging in remotely to the global zone, How to Enable Specific Users to Log In Remotely to the Global Zone in Trusted Extensions
logging in to a failsafe session, How to Log In to a Failsafe Session in Trusted Extensions
modifying security defaults, How to Modify Default User Label Attributes
modifying security defaults for all users, How to Modify policy.conf Defaults
planning for, Decisions to Make Before Creating Users in Trusted Extensions
preventing account locking, How to Prevent Account Locking for Users
preventing from seeing others' processes, How to Modify policy.conf Defaults
printing, Labels, Printers, and Printing
removing some privileges, How to Restrict a User's Set of Privileges
restoring control of desktop focus, How to Regain Control of the Desktop's Current Focus
security precautions, Group Administration
security training
Security Requirements Enforcement
Group Administration
Enforcement of Device Security in Trusted Extensions
session range, Label Ranges
setting up skeleton directories, How to Configure Startup Files for Users in Trusted Extensions
startup files, How to Configure Startup Files for Users in Trusted Extensions
using .copy_files file, How to Configure Startup Files for Users in Trusted Extensions
using .link_files file, How to Configure Startup Files for Users in Trusted Extensions
using devices, Using Devices in Trusted Extensions (Task Map)
Using Devices in Trusted Extensions (Task Map), Using Devices in Trusted Extensions (Task Map)
/usr/bin/tsoljdsselmgr application, Rules When Changing the Level of Security for Data
/usr/lib/lp/postscript/tsol_separator.ps file, labeling printer output, Labeled Printer Output
/usr/local/scripts/getmounts script, How to Display the Labels of Mounted Files
/usr/local/scripts/getzonelabels script, How to Display Ready or Running Zones
/usr/sbin/txzonemgr script
Administration Tools for Trusted Extensions
Zone Administration Utilities in Trusted Extensions
/usr/sbin/txzonemgr script
Create a Default Trusted Extensions System
Labeled Zone Is Unable to Access the X Server
/usr/share/gnome/sel_config file, sel_config File
utadm command, default Sun Ray server configuration, How to Limit the Hosts That Can Be Contacted on the Trusted Network