R
- real UID of root, required for applications, Evaluating Software for Security
- Reducing Printing Restrictions in Trusted Extensions (Task Map), Reducing Printing Restrictions in Trusted Extensions (Task Map)
- regaining control of desktop focus, How to Regain Control of the Desktop's Current Focus
- regular users, See users
- relabeling information, How to Enable a User to Change the Security Level of Data
- remote administration
- defaults, Secure Remote Administration in Trusted Extensions
- methods, Methods for Administering Remote Systems in Trusted Extensions
- remote host templates
- assigning, Configuring Trusted Network Databases (Task Map)
- assigning to hosts, How to Assign a Security Template to a Host or a Group of Hosts
- creating, How to Construct a Remote Host Template
- tool for administering, Security Templates Tool
- remote hosts, using fallback mechanism in tnrhdb, Trusted Network Fallback Mechanism
- Remote Login authorization, How to Create a Rights Profile for Convenient Authorizations
- remote multilevel desktop, accessing, How to Use Xvnc to Remotely Access a Trusted Extensions System
- removable media, mounting, How to Add a Software Package in Trusted Extensions
- remove_allocatable command, Command Line Tools in Trusted Extensions
- removing, labels on printer output, How to Remove Labels From Printed Output
- repairing, labels in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
- resolv.conf file, action for editing, Trusted CDE Actions
- Restart Zone action, Trusted CDE Actions
- restoring control of desktop focus, How to Regain Control of the Desktop's Current Focus
- restricting
- access to computer based on label, Effects of Label Range on a Device
- access to devices, Device Protection With Trusted Extensions Software
- access to global zone, Role Assumption in Trusted Extensions
- access to lower-level files, How to Disable the Mounting of Lower-Level Files
- access to printers with labels, Restricting Access to Printers and Print Job Information in Trusted Extensions
- actions by rights profiles, Trusted Processes in the Window System
- mounts of lower-level files, How to Disable the Mounting of Lower-Level Files
- printer access with labels, Restricting Access to Printers and Print Job Information in Trusted Extensions
- printer label range, How to Configure a Restricted Label Range for a Printer
- remote access, Secure Remote Administration in Trusted Extensions
- Revoke or Reclaim Device authorization
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- rights, See rights profiles
- rights profiles
- assigning, Security Attribute Assignment to Users in Trusted Extensions
- controlling the use of actions, Trusted Processes in the Window System
- Convenient Authorizations, How to Create a Rights Profile for Convenient Authorizations
- with Allocate Device authorization, How to Assign Device Authorizations
- with device allocation authorizations, How to Assign Device Authorizations
- with new device authorizations, How to Create New Device Authorizations
- Rights tool, Trusted Extensions Tools in the Solaris Management Console
- rmmount.conf file
- How to Configure an Audio Player Program for Use in Trusted CDE
- How to Prevent the File Manager From Displaying After Device Allocation
- role workspace, global zone, Security Requirements When Administering Trusted Extensions
- roles
- administering auditing, Role Setup for Audit Administration
- administering remotely
- How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
- How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
- assigning rights, Security Attribute Assignment to Users in Trusted Extensions
- assuming
- Security Requirements When Administering Trusted Extensions
- How to Enter the Global Zone in Trusted Extensions
- creating, Role Creation in Trusted Extensions
- leaving role workspace, How to Exit the Global Zone in Trusted Extensions
- remote login, Remote Login by a Role in Trusted Extensions
- role assumption from unlabeled host, Remote Role-Based Administration From Unlabeled Hosts
- trusted application access, Administration Tools for Trusted Extensions
- workspaces, Security Requirements When Administering Trusted Extensions
- root UID, required for applications, Evaluating Software for Security
- route command
- Command Line Tools in Trusted Extensions
- Network Commands in Trusted Extensions
- routing, Overview of Routing in Trusted Extensions
- accreditation checks, Trusted Extensions Accreditation Checks
- commands in Trusted Extensions, Routing Commands in Trusted Extensions
- concepts, Administration of Routing in Trusted Extensions
- example of, Gateways in Trusted Extensions
- static with security attributes, How to Configure Routes With Security Attributes
- tables
- Routing Table Entries in Trusted Extensions
- Choosing Routers in Trusted Extensions
- using route command, How to Configure Routes With Security Attributes