JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration and Administration     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

7.  Trusted Extensions Administration Concepts

8.  Trusted Extensions Administration Tools

9.  Getting Started as a Trusted Extensions Administrator (Tasks)

10.  Security Requirements on a Trusted Extensions System (Overview)

11.  Administering Security Requirements in Trusted Extensions (Tasks)

12.  Users, Rights, and Roles in Trusted Extensions (Overview)

13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

14.  Remote Administration in Trusted Extensions (Tasks)

15.  Trusted Extensions and LDAP (Overview)

16.  Managing Zones in Trusted Extensions (Tasks)

17.  Managing and Mounting Files in Trusted Extensions (Tasks)

18.  Trusted Networking (Overview)

19.  Managing Networks in Trusted Extensions (Tasks)

20.  Multilevel Mail in Trusted Extensions (Overview)

21.  Managing Labeled Printing (Tasks)

22.  Devices in Trusted Extensions (Overview)

23.  Managing Devices for Trusted Extensions (Tasks)

24.  Trusted Extensions Auditing (Overview)

25.  Software Management in Trusted Extensions (Reference)

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

D

DAC, See discretionary access control (DAC)
databases
in LDAP, Using a Naming Service in Trusted Extensions
trusted network, Network Configuration Databases in Trusted Extensions
datasets, See ZFS
deallocate command, Command Line Tools in Trusted Extensions
deallocating, forcing, How to Revoke or Reclaim a Device in Trusted Extensions
debugging, See troubleshooting
deciding
to configure as a role or as superuser, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
to use a Oracle-supplied encodings file, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
decisions to make
based on site security policy, Site Security Policy and Trusted Extensions
before enabling Trusted Extensions, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
default routes, specifying for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
deleting, labeled zones, How to Remove Trusted Extensions From the System
desktop, displaying panels, Desktop Panels Do Not Display
desktops
accessing multilevel remotely, How to Use Xvnc to Remotely Access a Trusted Extensions System
logging in to a failsafe session, How to Log In to a Failsafe Session in Trusted Extensions
workspace color changes, How to Enter the Global Zone in Trusted Extensions
/dev/kmem kernel image file, security violation, Evaluating Software for Security
developer responsibilities, Developer Responsibilities When Creating Trusted Programs
device allocation
authorizing, How to Assign Device Authorizations
overview, Device Protection With Trusted Extensions Software
profiles that include allocation authorizations, How to Assign Device Authorizations
device-clean scripts
adding to devices, How to Add a Device_Clean Script in Trusted Extensions
requirements, Device-Clean Scripts
Device Manager
administrative tool, Administration Tools for Trusted Extensions
description, Device Manager GUI
use by administrators, How to Configure a Device in Trusted Extensions
devices
access policy, Device Access Policies
accessing, Device Manager GUI
adding customized authorizations, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
adding device_clean script, How to Add a Device_Clean Script in Trusted Extensions
administering, Managing Devices for Trusted Extensions (Tasks)
administering with Device Manager, How to Configure a Device in Trusted Extensions
allocating, Device Protection With Trusted Extensions Software
configuring devices, How to Configure a Device in Trusted Extensions
creating new authorizations, How to Create New Device Authorizations
in Trusted Extensions, Devices in Trusted Extensions (Overview)
policy defaults, Device Access Policies
preventing remote allocation of audio, How to Protect Nonallocatable Devices in Trusted Extensions
protecting, Device Manager
protecting nonallocatable, How to Protect Nonallocatable Devices in Trusted Extensions
reclaiming, How to Revoke or Reclaim a Device in Trusted Extensions
setting label range for nonallocatable, Effects of Label Range on a Device
setting policy, Device Access Policies
troubleshooting, How to Revoke or Reclaim a Device in Trusted Extensions
using, Using Devices in Trusted Extensions (Task Map)
dfstab file, for public zone, Access to NFS Mounted Directories in Trusted Extensions
differences
administrative interfaces in Trusted Extensions, Administrative Interfaces in Trusted Extensions
between Trusted Extensions and Oracle Solaris auditing, Trusted Extensions and Auditing
between Trusted Extensions and Oracle Solaris OS, Differences Between Trusted Extensions and the Oracle Solaris OS
defaults in Trusted Extensions, Tighter Security Defaults in Trusted Extensions
extending Oracle Solaris interfaces, Oracle Solaris Interfaces Extended by Trusted Extensions
limited options in Trusted Extensions, Limited Options in Trusted Extensions
directories
accessing lower-level, Zones in Trusted Extensions
authorizing a user or role to change label of, How to Enable a User to Change the Security Level of Data
for naming service setup, Populate the Sun Java System Directory Server
mounting, How to Share Directories From a Labeled Zone
sharing, How to Share Directories From a Labeled Zone
disabling, Trusted Extensions, How to Remove Trusted Extensions From the System
discretionary access control (DAC), Trusted Extensions and Access Control
diskettes, accessing, Device Protection With Trusted Extensions Software
displaying
labels of file systems in labeled zone, How to Display the Labels of Mounted Files
status of every zone, How to Display Ready or Running Zones
DOI, remote host templates, Network Security Attributes in Trusted Extensions
domain of interpretation (DOI), entry in /etc/system file, Configure the Domain of Interpretation
dominance of labels, Dominance Relationships Between Labels
Downgrade DragNDrop or CutPaste Info authorization, How to Create a Rights Profile for Convenient Authorizations
Downgrade File Label authorization, How to Create a Rights Profile for Convenient Authorizations
downgrading labels, configuring rules for selection confirmer, sel_config File
dpadm service, Install the Sun Java System Directory Server
DragNDrop or CutPaste without viewing contents authorization, How to Create a Rights Profile for Convenient Authorizations
dsadm service, Install the Sun Java System Directory Server
dtsession command, running updatehome, .copy_files and .link_files Files