Skip Navigation Links | |
Exit Print View | |
Oracle Solaris Trusted Extensions Administrator's Procedures Oracle Solaris 10 8/11 Information Library |
1. Trusted Extensions Administration Concepts
2. Trusted Extensions Administration Tools
3. Getting Started as a Trusted Extensions Administrator (Tasks)
4. Security Requirements on a Trusted Extensions System (Overview)
5. Administering Security Requirements in Trusted Extensions (Tasks)
6. Users, Rights, and Roles in Trusted Extensions (Overview)
7. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
8. Remote Administration in Trusted Extensions (Tasks)
9. Trusted Extensions and LDAP (Overview)
10. Managing Zones in Trusted Extensions (Tasks)
11. Managing and Mounting Files in Trusted Extensions (Tasks)
12. Trusted Networking (Overview)
13. Managing Networks in Trusted Extensions (Tasks)
14. Multilevel Mail in Trusted Extensions (Overview)
15. Managing Labeled Printing (Tasks)
16. Devices in Trusted Extensions (Overview)
17. Managing Devices for Trusted Extensions (Tasks)
18. Trusted Extensions Auditing (Overview)
19. Software Management in Trusted Extensions (Tasks)
A. Quick Reference to Trusted Extensions Administration
B. List of Trusted Extensions Man Pages
Trusted Extensions adds information to the following Oracle Solaris man pages.
Trusted Extensions Modification
Adds options to support allocating a device in a zone and cleaning the device in a windowed environment
Adds the window policy for labeled information
Adds X server audit classes
Adds audit events
Adds a label selector
Adds label authorizations
Adds the capability to mount, and therefore view, lower-level home directories
Adds label restrictions to a user's ability to cancel a print job
Adds options to support deallocating a device in a zone, cleaning the device in a windowed environment, and specifying the type of device to deallocate
Is invoked by default in Trusted Extensions
Adds CDE actions as a type of profile object
Recognizes the NET_MAC_AWARE and NET_MAC_AWARE_INHERIT process flags
Gets the mandatory access control status, SO_MAC_EXEMPT, of the socket
Gets the mandatory access control status, SO_MAC_EXEMPT, of the socket
Adds the all-zones interface
Determines whether the system is configured with Trusted Extensions
Adds Trusted Extensions network databases
Adds attributes, such as labels, that are associated with a device
Adds the -nolabels option
Adds label restrictions to the administrator's ability to administer printing
Adds label restrictions to the administrator's ability to move a print job
Adds label restrictions to the display of print queue information
Adds label restrictions to the caller's ability to remove print requests
Adds label restrictions to the administrator's ability to stop and restart the print service
Adds label restrictions to the display of the print service status
Adds the -R option to display extended security attributes
Adds Trusted Extensions privileges, such as PRIV_FILE_DOWNGRADE_SL
Adds rights profiles, such as Object Label Management
Adds the -secattr option to add extended security attributes to a route
Sets the NET_MAC_AWARE per-process flag
Sets the SO_MAC_EXEMPT option
Sets the mandatory access control, SO_MAC_EXEMPT, on the socket
Adds options to support the CDE action type
Adds options to support a role's label
Adds options to support a user's label and other security attributes, such as permitted idle time
Supports the SO_MAC_EXEMPT option for unlabeled peers
Adds including labels in tar files and extracting files according to label
Adds attribute types that are used in labeled tar files
Adds getting the label value on a user credential
Adds user security attributes that are specific to Trusted Extensions