Skip Navigation Links | |
Exit Print View | |
Oracle Solaris Trusted Extensions Administrator's Procedures Oracle Solaris 10 8/11 Information Library |
1. Trusted Extensions Administration Concepts
2. Trusted Extensions Administration Tools
3. Getting Started as a Trusted Extensions Administrator (Tasks)
4. Security Requirements on a Trusted Extensions System (Overview)
5. Administering Security Requirements in Trusted Extensions (Tasks)
6. Users, Rights, and Roles in Trusted Extensions (Overview)
7. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
8. Remote Administration in Trusted Extensions (Tasks)
9. Trusted Extensions and LDAP (Overview)
10. Managing Zones in Trusted Extensions (Tasks)
11. Managing and Mounting Files in Trusted Extensions (Tasks)
12. Trusted Networking (Overview)
13. Managing Networks in Trusted Extensions (Tasks)
14. Multilevel Mail in Trusted Extensions (Overview)
15. Managing Labeled Printing (Tasks)
16. Devices in Trusted Extensions (Overview)
17. Managing Devices for Trusted Extensions (Tasks)
18. Trusted Extensions Auditing (Overview)
19. Software Management in Trusted Extensions (Tasks)
A. Quick Reference to Trusted Extensions Administration
The Oracle Solaris Trusted Extensions Administrator's Procedures guide provides procedures for configuring Trusted Extensions on the Solaris Operating System. This guide also provides procedures for managing users, zones, devices, and hosts that are labeled with Trusted Extensions software.
Note - This Oracle Solaris release supports systems that use the SPARC and x86 families of processor architectures. The supported systems appear in the Oracle Solaris OS: Hardware Compatibility Lists. This document cites any implementation differences between the platform types.
In this document these x86 related terms mean the following:
x86 refers to the larger family of 64-bit x86 compatible products.
x64 relates specifically to 64-bit x86 compatible CPUs.
For supported systems, see the Oracle Solaris OS: Hardware Compatibility Lists.
This guide is for knowledgeable system administrators and security administrators who are configuring and administering Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.
Administrators should be familiar with Oracle Solaris administration. In addition, administrators should understand the following:
The security features of Trusted Extensions and your site security policy
Basic concepts and procedures for using a host that is configured with Trusted Extensions, as described in the Oracle Solaris Trusted Extensions User’s Guide
How administrative tasks are divided among roles at your site
The following table lists the topics that are covered in the Trusted Extensions guides and the audience for each guide.
|
The following guides contain information that is useful when you prepare for and run Trusted Extensions software.
|
Your site security policy document – Describes the security policy and security procedures at your site
Solaris Common Desktop Environment: Advanced User's and System Administrator's Guide – Describes the Common Desktop Environment (CDE)
The administrator guide for your currently installed operating system – Describes how to back up system files
Third-party URLs are referenced in this document and provide additional, related information.
Note - Oracle is not responsible for the availability of third-party web sites that are mentioned in this document. Oracle does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Oracle will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
See the following web sites for additional resources:
Oracle Technology Network offers a range of resources related to Oracle software:
Discuss technical problems and solutions on the Discussion Forums.
Get hands-on step-by-step tutorials with Oracle By Example.
The following table describes the typographic conventions that are used in this book.
Table P-1 Typographic Conventions
|
The following table shows the default UNIX system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.
Table P-2 Shell Prompts
|