JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration Guide     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

A.  Site Security Policy

B.  Using CDE Actions to Install Zones in Trusted Extensions

C.  Configuration Checklist for Trusted Extensions

Glossary

Index

Preface

The Trusted Extensions Configuration Guide provides procedures for configuring Trusted Extensions on the Oracle Solaris operating system (Oracle Solaris OS). This guide also describes preparing the Oracle Solaris system to support a secure installation of Trusted Extensions.


Note - This Oracle Solaris release supports systems that use the SPARC and x86 families of processor architectures. The supported systems appear in the Oracle Solaris OS: Hardware Compatibility Lists. This document cites any implementation differences between the platform types.

In this document, these x86 related terms mean the following:

For supported systems, see the Oracle Solaris OS: Hardware Compatibility Lists.


Who Should Use This Guide

This guide is for knowledgeable system administrators and security administrators who are configuring Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.

Implementing Site Security

Successfully configuring Trusted Extensions on a system in a way that is consistent with site security requires understanding the security features of Trusted Extensions and your site security policy. Before you start, read Chapter 1, Security Planning for Trusted Extensions for information about how to ensure site security when configuring the software.

Trusted Extensions and the Oracle Solaris Operating System

Trusted Extensions runs on top of the Oracle Solaris OS. Because Trusted Extensions software can modify the Oracle Solaris OS, Trusted Extensions can require specific settings for Oracle Solaris installation options. For details, see Chapter 3, Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks). Also, Trusted Extensions guides supplement Oracle Solaris guides. As administrators, you need access to Oracle Solaris guides and Trusted Extensions guides.

How This Book Is Organized

Chapter 1, Security Planning for Trusted Extensions describes the security issues that you need to consider when configuring Trusted Extensions software on one or more Oracle Solaris systems.

Chapter 2, Configuration Roadmap for Trusted Extensions contains task maps for adding Trusted Extensions software to Oracle Solaris systems.

Chapter 3, Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks) provides instructions on preparing an Oracle Solaris system for Trusted Extensions software. It also includes instructions on enabling Trusted Extensions.

Chapter 4, Configuring Trusted Extensions (Tasks) provides instructions on configuring Trusted Extensions software on a system with a monitor.

Chapter 5, Configuring LDAP for Trusted Extensions (Tasks) provides instructions on configuring LDAP for Trusted Extensions.

Chapter 6, Configuring a Headless System With Trusted Extensions (Tasks) describes how to configure and administer Trusted Extensions software on a headless system.

Appendix A, Site Security Policy addresses site security policy and places Trusted Extensions in the context of wider organizational and site security.

Appendix B, Using CDE Actions to Install Zones in Trusted Extensions describes how to configure labeled zones by using Trusted CDE actions.

Appendix C, Configuration Checklist for Trusted Extensions provides a configuration checklist for the initial setup team.

Glossary defines selected terms and phrases that are used in this guide.

How the Trusted Extensions Guides Are Organized

The following table lists the topics that are covered in the Trusted Extensions guides and the audience for each guide.

Title of Guide
Topics
Audience
Obsolete. Provides an overview of the differences between Trusted Solaris 8 software, Solaris 10 software, and Trusted Extensions software.

For this release, the What's New document for Oracle Solaris provides an overview of Trusted Extensions changes.

All
Solaris Trusted Extensions Reference Manual
Obsolete. Provides Trusted Extensions man pages for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions.

For this release, Trusted Extensions man pages are included with the Oracle Solaris man pages.

All
Describes the basic features of Trusted Extensions. This book contains a glossary.
End users, administrators, developers
Obsolete. Describes how to plan for, install, and configure Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions.
Administrators, developers
Starting with the Solaris 10 5/08 release, describes how to enable and initially configure Trusted Extensions. Replaces Solaris Trusted Extensions Installation and Configuration for the Solaris 10 11/06 and Solaris 10 8/07 Releases.
Administrators, developers
Shows how to perform specific administration tasks.
Administrators, developers
Describes how to develop applications with Trusted Extensions.
Developers, administrators
Provides information about how to specify label components in the label encodings file.
Administrators
Describes the syntax used in the label encodings file. The syntax enforces the various rules for well-formed labels for a system.
Administrators

Related Installation Guides

The following guides contain information that is useful when you prepare for Trusted Extensions software.

Oracle Solaris 10 8/11 Installation Guide: Basic Installations – Provides guidance on the installation options for the Oracle Solaris OS

Oracle Solaris 10 8/11 Installation Guide: Custom JumpStart and Advanced Installations – Provides guidance on installation methods and configuration options

Oracle Solaris 10 8/11 Installation Guide: Planning for Installation and Upgrade – Provides guidance on installing an upgrade of the Oracle Solaris OS

Related References

Your site security policy document – Describes the security policy and security procedures at your site

Solaris Common Desktop Environment: Advanced User's and System Administrator's Guide – Describes the Common Desktop Environment (CDE)

The administrator guide for your currently installed operating system – Describes how to back up system files

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P-1 Typographic Conventions

Typeface
Description
Example
AaBbCc123
The names of commands, files, and directories, and onscreen computer output
Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123
What you type, contrasted with onscreen computer output
machine_name% su

Password:

aabbcc123
Placeholder: replace with a real name or value
The command to remove a file is rm filename.
AaBbCc123
Book titles, new terms, and terms to be emphasized
Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows the default UNIX system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.

Table P-2 Shell Prompts

Shell
Prompt
Bash shell, Korn shell, and Bourne shell
$
Bash shell, Korn shell, and Bourne shell for superuser
#
C shell
machine_name%
C shell for superuser
machine_name#