JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration and Administration     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

Task Map: Preparing an Oracle Solaris System for Trusted Extensions

Task Map: Preparing For and Enabling Trusted Extensions

Task Map: Configuring Trusted Extensions With the Provided Defaults

Task Map: Configuring Trusted Extensions to Your Site's Requirements

Task Map: Configuring the Global Zone

Task Map: Configuring the LDAP Naming Service

Task Map: Configuring the Labeled Zones

Task Map: Configuring Networking

3.  Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

7.  Trusted Extensions Administration Concepts

8.  Trusted Extensions Administration Tools

9.  Getting Started as a Trusted Extensions Administrator (Tasks)

10.  Security Requirements on a Trusted Extensions System (Overview)

11.  Administering Security Requirements in Trusted Extensions (Tasks)

12.  Users, Rights, and Roles in Trusted Extensions (Overview)

13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

14.  Remote Administration in Trusted Extensions (Tasks)

15.  Trusted Extensions and LDAP (Overview)

16.  Managing Zones in Trusted Extensions (Tasks)

17.  Managing and Mounting Files in Trusted Extensions (Tasks)

18.  Trusted Networking (Overview)

19.  Managing Networks in Trusted Extensions (Tasks)

20.  Multilevel Mail in Trusted Extensions (Overview)

21.  Managing Labeled Printing (Tasks)

22.  Devices in Trusted Extensions (Overview)

23.  Managing Devices for Trusted Extensions (Tasks)

24.  Trusted Extensions Auditing (Overview)

25.  Software Management in Trusted Extensions (Reference)

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

Task Map: Configuring Trusted Extensions to Your Site's Requirements


Tip - For a secure configuration process, create roles early.


The order of tasks when roles configure the system is shown in the following task map.

Task
For Instructions
Configure the global zone.
Configure the LDAP naming service.

Note - Skip if you are not LDAP.


Configure the labeled zones.
To communicate with other systems, set up networking.
Complete system setup.

Task Map: Configuring the Global Zone

For a secure configuration process, create roles early. The order of tasks when roles configure the system is shown in the following task maps.

Task
For Instructions
Protect machine hardware by requiring a password to change hardware settings.
Controlling Access to System Hardware in System Administration Guide: Security Services
Configure labels. Labels must be configured for your site.
If you are running an IPv6 network, enable IP to recognize labeled packets.
If the CIPSO Domain of Interpretation (DOI) of your network nodes is not 1, specify the DOI.
Boot to activate a labeled environment. Upon login, you are in the global zone.
Create the Security Administrator role and other roles that you plan to use locally. You create these roles just as you would create them in the Oracle Solaris OS.

You can delay this task until the end. For the consequences, see Devising a Configuration Strategy for Trusted Extensions.

Task Map: Configuring the LDAP Naming Service

If you plan to use files to administer Trusted Extensions, skip the following tasks.

Task
For Instructions
Add Trusted Extensions databases to an existing Sun Java System Directory Server (LDAP server). Then make your first Trusted Extensions system a proxy of this LDAP server.

Or, configure your first system as the server.

For systems that are not the LDAP server or proxy server, make them an LDAP client.
In the LDAP naming service, create the Security Administrator role and other roles that you plan to use.

You can delay this task until the end. For the consequences, see Devising a Configuration Strategy for Trusted Extensions.

Task Map: Configuring the Labeled Zones

For a customized configuration, use your label_encodings file to create the labeled zones by following this task map.

Task
For Instructions
Using the txzonemgr GUI, create your labeled zones.
Assign a label to a workspace for each of your labeled zones.
Substitute your zone names in Assign Labels to Two Zone Workspaces

Task Map: Configuring Networking

Network setup is required only if you plan to communicate with other systems.

Task
For Instructions
Configure the network interfaces.
(Optional) Add zone-specific network addresses and default routing to the labeled zones.