C
- -c option, txzonemgr script,
Create a Default Trusted Extensions System
- Cannot reach global zone,
Labeled Zone Is Unable to Access the X Server
- CD-ROM drives, accessing,
Device Protection With Trusted Extensions Software
- Change Password menu item
- description,
Trusted Extensions Security Features
- using to change root password,
How to Change the Password for root
- Change Workspace Label menu item, description,
Trusted Extensions Security Features
- changing
- IDLETIME keyword,
How to Modify policy.conf Defaults
- labels by authorized users,
How to Enable a User to Change the Security Level of Data
- rules for label changes,
sel_config File
- security level of data,
How to Enable a User to Change the Security Level of Data
- system security defaults,
How to Change Security Defaults in System Files
- user privileges,
How to Restrict a User's Set of Privileges
- checking
- label_encodings file,
Check and Install Your Label Encodings File
- roles are working,
Verify That the Trusted Extensions Roles Work
- checklists for initial setup team,
Checklist for Configuring Trusted Extensions
- chk_encodings command
Check and Install Your Label Encodings File
Command Line Tools in Trusted Extensions
- choosing, See selecting
- classification label component,
Dominance Relationships Between Labels
- clearances, label overview,
Labels in Trusted Extensions Software
- collecting information
- before enabling Trusted Extensions,
Collect System Information Before Enabling Trusted Extensions
- for LDAP service,
Collect Information for the Directory Server for LDAP
- planning Trusted Extensions configuration,
Collecting Information Before Enabling Trusted Extensions
- colors, indicating label of workspace,
What Labels Protect and Where Labels Appear
- commands
- executing with privilege,
How to Enter the Global Zone in Trusted Extensions
- troubleshooting networking,
How to Debug the Trusted Extensions Network
- commercial applications, evaluating,
Security Administrator Responsibilities for Trusted Programs
- Common Tasks in Trusted Extensions (Task Map),
Common Tasks in Trusted Extensions (Task Map)
- compartment label component,
Dominance Relationships Between Labels
- component definitions, label_encodings file,
Label Encodings File
- computer access
- administrator responsibilities,
Information Protection
- restricting,
Effects of Label Range on a Device
- configuration files
- copying,
How to Copy Files to Portable Media in Trusted Extensions
- loading,
How to Copy Files From Portable Media in Trusted Extensions
- Configure Device Attributes authorization,
How to Assign Device Authorizations
- configuring
- access to headless Trusted Extensions,
Configuring a Headless System With Trusted Extensions (Tasks)
- as a role or as superuser?,
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- auditing,
Audit Tasks of the Security Administrator
- authorizations for devices,
How to Create New Device Authorizations
- devices,
How to Configure a Device in Trusted Extensions
- labeled printing,
Configuring Labeled Printing (Task Map)
- LDAP for Trusted Extensions,
Configuring the Sun Java System Directory Server on a Trusted Extensions System
- LDAP proxy server for Trusted Extensions clients,
Creating a Trusted Extensions Proxy for an Existing Sun Java System Directory Server
- network interfaces,
Configure the Network Interfaces in Trusted Extensions
- routes with security attributes,
How to Configure Routes With Security Attributes
- startup files for users,
How to Configure Startup Files for Users in Trusted Extensions
- Trusted Extensions labeled zones,
Creating Labeled Zones
- Trusted Extensions software,
Configuring Trusted Extensions (Tasks)
- trusted network,
Managing Networks in Trusted Extensions (Tasks)
- Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map),
Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
- Configuring an LDAP Server on a Trusted Extensions Host (Task Map),
Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
- Configuring Labeled IPsec (Task Map),
Configuring Labeled IPsec (Task Map)
- Configuring Labeled Printing (Task Map),
Configuring Labeled Printing (Task Map)
- Configuring Routes and Checking Network Information in Trusted Extensions (Task Map),
Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
- configuring Trusted Extensions
- checklist for initial setup team,
Checklist for Configuring Trusted Extensions
- headless access,
Configuring a Headless System With Trusted Extensions (Tasks)
- initial procedures,
Configuring Trusted Extensions (Tasks)
- labeled zones,
Creating Labeled Zones
- task maps,
Configuration Roadmap for Trusted Extensions
- Configuring Trusted Network Databases (Task Map),
Configuring Trusted Network Databases (Task Map)
- controlling, See restricting
- .copy_files file
- description,
.copy_files and .link_files Files
- setting up for users
How to Configure Startup Files for Users in Trusted Extensions
How to Configure Startup Files for Users in Trusted Extensions
- startup file,
Command Line Tools in Trusted Extensions
- creating
- accounts,
Creating Roles and Users in Trusted Extensions
- accounts during or after configuration,
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- authorizations for devices,
How to Create New Device Authorizations
- home directories
Creating Home Directories in Trusted Extensions
Home Directory Creation in Trusted Extensions
- home directory server,
Create the Home Directory Server in Trusted Extensions
- labeled zones,
Creating Labeled Zones
- LDAP client,
Make the Global Zone an LDAP Client in Trusted Extensions
- LDAP proxy server for Trusted Extensions clients,
Create an LDAP Proxy Server
- local role with roleadd,
Create the Security Administrator Role in Trusted Extensions
- local user with useradd,
Create Users Who Can Assume Roles in Trusted Extensions
- roles,
Creating Roles and Users in Trusted Extensions
- users who can assume roles,
Create Users Who Can Assume Roles in Trusted Extensions
- zones,
Creating Labeled Zones
- Creating Labeled Zones,
Creating Labeled Zones
- customizing
- device authorizations,
How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- label_encodings file,
Label Encodings File
- unlabeled printing,
Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user accounts,
Customizing the User Environment for Security (Task Map)
- Customizing Device Authorizations in Trusted Extensions (Task Map),
Customizing Device Authorizations in Trusted Extensions (Task Map)
- Customizing User Environment for Security (Task Map),
Customizing the User Environment for Security (Task Map)
- cut and paste, and labels,
Rules When Changing the Level of Security for Data
- cutting and pasting, configuring rules for label changes,
sel_config File