JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Label Administration     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

1.  Labels in Trusted Extensions Software

2.  Planning Labels (Tasks)

3.  Making a Label Encodings File (Tasks)

4.  Labeling Printer Output (Tasks)

5.  Customizing LOCAL DEFINITIONS

6.  Example: Planning an Organization's Labels

A.  Sample Label Encodings File

Index

Preface

Labels, clearances, and handling instructions are used to protect information on an Oracle Solaris system that is configured with the Trusted Extensions feature. The components of labels, clearances, and handling instructions are specified in the label_encodings file. This guide provides background for creating or modifying the file. The guide provides examples, and helps you to create and install a label_encodings file that is appropriate for your site.

Who Should Use This Book

This book is for security administrators. Security administrators are responsible for defining the organization's labels. Some security administrators are also responsible for implementing the labels. This book is for definers and implementers.


Note - Labels are always being used. Labels provide mandatory access control (MAC), and MAC is always enforced. Therefore, the site's label_encodings file must be in place before any users or roles are created.

Trusted Extensions installs a default label_encodings file. The security administrator must provide a file that is appropriate for the site.


The security administrator who implements the labels should be familiar with Oracle Solaris administration. The necessary level of knowledge can be acquired through training and reading the documentation.

How the Trusted Extensions Guides Are Organized

The following table lists the topics that are covered in the Trusted Extensions guides and the audience for each guide.

Title of Guide
Topics
Audience
Obsolete. Provides an overview of the differences between Trusted Solaris 8 software, Solaris 10 software, and Trusted Extensions software.

For this release, the What's New document for Oracle Solaris provides an overview of Trusted Extensions changes.

All
Solaris Trusted Extensions Reference Manual
Obsolete. Provides Trusted Extensions man pages for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions.

For this release, Trusted Extensions man pages are included with the Oracle Solaris man pages.

All
Describes the basic features of Trusted Extensions. This book contains a glossary.
End users, administrators, developers
Obsolete. Describes how to plan for, install, and configure Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions.
Administrators, developers
Starting with the Solaris 10 5/08 release, describes how to enable and initially configure Trusted Extensions. Replaces Solaris Trusted Extensions Installation and Configuration for the Solaris 10 11/06 and Solaris 10 8/07 Releases.
Administrators, developers
Shows how to perform specific administration tasks.
Administrators, developers
Describes how to develop applications with Trusted Extensions.
Developers, administrators
Provides information about how to specify label components in the label encodings file.
Administrators
Describes the syntax used in the label encodings file. The syntax enforces the various rules for well-formed labels for a system.
Administrators

How This Book Is Organized

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P-1 Typographic Conventions

Typeface
Description
Example
AaBbCc123
The names of commands, files, and directories, and onscreen computer output
Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123
What you type, contrasted with onscreen computer output
machine_name% su

Password:

aabbcc123
Placeholder: replace with a real name or value
The command to remove a file is rm filename.
AaBbCc123
Book titles, new terms, and terms to be emphasized
Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows the default UNIX system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.

Table P-2 Shell Prompts

Shell
Prompt
Bash shell, Korn shell, and Bourne shell
$
Bash shell, Korn shell, and Bourne shell for superuser
#
C shell
machine_name%
C shell for superuser
machine_name#