Index
A
- access
- See computer access
- remote systems,
Remote Administration in Trusted Extensions (Tasks)
- access policy
- devices,
Device Access Policies
- Discretionary Access Control (DAC)
Trusted Extensions and the Oracle Solaris OS
Differences Between Trusted Extensions and the Oracle Solaris OS
- Mandatory Access Control (MAC),
Differences Between Trusted Extensions and the Oracle Solaris OS
- accessing
- administrative tools,
Getting Started as a Trusted Extensions Administrator (Task Map)
- audit records by label,
Audit Tasks in Trusted Extensions
- devices,
Device Protection With Trusted Extensions Software
- global zone,
How to Enter the Global Zone in Trusted Extensions
- home directories,
Zones in Trusted Extensions
- labeled zones by users,
How to Enable Users to Log In to a Labeled Zone
- printers,
Labels, Printers, and Printing
- remote multilevel desktop,
How to Configure a Trusted Extensions System With Xvnc for Remote Access
- ZFS dataset mounted in lower-level zone from higher-level zone,
How to Share a ZFS Dataset From a Labeled Zone
- account locking, preventing for users who can assume roles,
How to Prevent Account Locking for Users
- accounts
- See roles
- See also users
creating,
Creating Roles and Users in Trusted Extensions
- planning,
Planning User Security in Trusted Extensions
- accreditation checks,
Trusted Extensions Accreditation Checks
- accreditation ranges, label_encodings file,
Label Encodings File
- adding
- LDAP role with roleadd,
How to Create the Security Administrator Role in Trusted Extensions
- local role with roleadd,
How to Create the Security Administrator Role in Trusted Extensions
- local user with useradd,
How to Create Users Who Can Assume Roles in Trusted Extensions
- logical interfaces,
How to Add an IP Instance to a Labeled Zone
- network databases to LDAP server,
Populate the Oracle Directory Server Enterprise Edition
- nscd daemon to every labeled zone,
How to Configure a Separate Name Service for Each Labeled Zone
- remote hosts,
How to Connect a Trusted Extensions System to Other Trusted Extensions Systems
- roles,
Creating Roles and Users in Trusted Extensions
- shared network interfaces,
How to Share a Single IP Address With All Zones
- Trusted Extensions software,
Add Trusted Extensions Packages to an Oracle Solaris System
- Trusted Extensions to an Oracle Solaris system,
Enable Trusted Extensions and Reboot
- users who can assume roles,
How to Create Users Who Can Assume Roles in Trusted Extensions
- VNIC interfaces,
How to Add a Virtual Network Interface to a Labeled Zone
- zone-specific nscd daemon,
How to Configure a Separate Name Service for Each Labeled Zone
- Additional Trusted Extensions Configuration Tasks,
Additional Trusted Extensions Configuration Tasks
- ADMIN_HIGH label,
Dominance Relationships Between Labels
- ADMIN_LOW label
- lowest label,
Dominance Relationships Between Labels
- protecting administrative files,
Password Protection
- administering
- account locking,
How to Prevent Account Locking for Users
- assigning device authorizations,
How to Assign Device Authorizations
- auditing in Trusted Extensions,
Audit Management by Role in Trusted Extensions
- changing label of information,
How to Enable a User to Change the Security Level of Data
- convenient authorizations for users,
How to Create a Rights Profile for Convenient Authorizations
- desktop authorizations for users,
How to Limit a User to Desktop Applications
- device allocation,
How to Assign Device Authorizations
- device authorizations,
How to Create New Device Authorizations
- devices
Managing Devices for Trusted Extensions (Tasks)
Managing Devices in Trusted Extensions (Task Map)
- file systems
- mounting,
How to NFS Mount Files in a Labeled Zone
- overview,
Sharing and Mounting Files in Trusted Extensions
- troubleshooting,
How to Troubleshoot Mount Failures in Trusted Extensions
files
- backing up,
How to Back Up Files in Trusted Extensions
- restoring,
How to Restore Files in Trusted Extensions
from the global zone,
How to Enter the Global Zone in Trusted Extensions
- labeled printing,
Managing Labeled Printing (Tasks)
- LDAP,
Trusted Extensions and LDAP (Overview)
- mail,
Multilevel Mail in Trusted Extensions (Overview)
- multilevel ports,
How to Create a Multilevel Port for a Zone
- network in Trusted Extensions,
Managing Networks in Trusted Extensions (Tasks)
- PostScript printing,
How to Enable Users to Print PostScript Files in Trusted Extensions
- quick reference for administrators,
Quick Reference to Trusted Extensions Administration
- remote host templates,
How to Create Security Templates
- remotely,
Remote Administration in Trusted Extensions (Tasks)
- routes with security attributes,
How to Add Default Routes
- security templates
How to Add a Host to a Security Template
How to Add a Range of Hosts to a Security Template
- sharing file systems,
How to Share File Systems From a Labeled Zone
- startup files for users,
How to Configure Startup Files for Users in Trusted Extensions
- system files,
How to Change Security Defaults in System Files
- third-party software,
Software Management in Trusted Extensions (Reference)
- Trusted Extensions remotely,
Enable Remote Administration of a Remote Trusted Extensions System
- trusted network,
Labeling Hosts and Networks (Task Map)
- trusted networking,
Managing Networks in Trusted Extensions (Tasks)
- unlabeled printing,
Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user privileges,
How to Restrict a User's Set of Privileges
- users
Decisions to Make Before Creating Users in Trusted Extensions
Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
Managing Users and Rights (Task Map)
- zones,
Managing Zones (Task Map)
- zones from Trusted GNOME,
Zone Administration Utilities in Trusted Extensions
- administrative labels,
Dominance Relationships Between Labels
- administrative roles, See roles
- administrative tools
- accessing,
Getting Started as a Trusted Extensions Administrator (Task Map)
- commands,
Command Line Tools in Trusted Extensions
- configuration files,
Configuration Files in Trusted Extensions
- description,
Trusted Extensions Administration Tools
- Device Manager,
Device Manager
- label builder,
Label Builder in Trusted Extensions
- Labeled Zone Manager,
txzonemgr Script
- Selection Manager,
Selection Manager in Trusted Extensions
- txzonemgr script,
txzonemgr Script
- Allocate Device authorization
How to Create a Rights Profile for Convenient Authorizations
Device Protection With Trusted Extensions Software
How to Assign Device Authorizations
How to Assign Device Authorizations
- allocate error state, correcting,
How to Revoke or Reclaim a Device in Trusted Extensions
- allocating, using Device Manager,
Device Manager GUI
- allocating devices, for copying data,
How to Copy Files to Portable Media in Trusted Extensions
- application security label,
Labels for IPsec-Protected Exchanges
- applications
- enabling initial network contact between client and server,
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- evaluating for security,
Security Administrator Responsibilities for Trusted Programs
- trusted and trustworthy,
Evaluating Software for Security
- assigning
- privileges to users,
Security Attribute Assignment to Users in Trusted Extensions
- rights profiles,
Security Attribute Assignment to Users in Trusted Extensions
- Assume Role menu item,
How to Enter the Global Zone in Trusted Extensions
- assuming, roles,
How to Enter the Global Zone in Trusted Extensions
- atohexlabel command,
How to Obtain the Hexadecimal Equivalent for a Label
- audio devices, preventing remote allocation,
How to Protect Nonallocatable Devices in Trusted Extensions
- audit classes for Trusted Extensions, list of new X audit classes,
Trusted Extensions Audit Classes
- audit events for Trusted Extensions, list of,
Trusted Extensions Audit Events
- audit policy in Trusted Extensions,
Trusted Extensions Audit Policy Options
- audit records in Trusted Extensions, window policies,
Trusted Extensions Audit Policy Options
- Audit Review profile, reviewing audit records,
Audit Tasks in Trusted Extensions
- audit tokens for Trusted Extensions
- label token,
label Token
- list of,
Trusted Extensions Audit Tokens
- xatom token,
xatom Token
- xcolormap token,
xcolormap Token
- xcursor token,
xcursor Token
- xfont token,
xfont Token
- xgc token,
xgc Token
- xpixmap token,
xpixmap Token
- xproperty token,
xproperty Token
- xselect token,
xselect Token
- xwindow token,
xwindow Token
- auditing, planning,
Planning for Auditing in Trusted Extensions
- auditing in Trusted Extensions
- additional audit events,
Trusted Extensions Audit Events
- additional audit policies,
Trusted Extensions Audit Policy Options
- additional audit tokens,
Trusted Extensions Audit Tokens
- additions to existing auditing commands,
Extensions to Auditing Commands in Trusted Extensions
- differences from Oracle Solaris auditing,
Trusted Extensions and Auditing
- reference,
Trusted Extensions Auditing (Overview)
- roles for administering,
Audit Management by Role in Trusted Extensions
- tasks,
Audit Tasks in Trusted Extensions
- X audit classes,
Trusted Extensions Audit Classes
- authorizations
- adding new device authorizations,
How to Create New Device Authorizations
- Allocate Device
Device Protection With Trusted Extensions Software
How to Assign Device Authorizations
How to Assign Device Authorizations
- assigning,
Security Attribute Assignment to Users in Trusted Extensions
- assigning device authorizations,
How to Assign Device Authorizations
- authorizing a user or role to change label,
How to Enable a User to Change the Security Level of Data
- Configure Device Attributes,
How to Assign Device Authorizations
- convenient for users,
How to Create a Rights Profile for Convenient Authorizations
- creating customized device authorizations,
How to Create New Device Authorizations
- creating local and remote device authorizations,
How to Create New Device Authorizations
- customizing for devices,
How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- desktop availability for users,
How to Limit a User to Desktop Applications
- gnome-applets,
How to Limit a User to Desktop Applications
- granted,
Trusted Extensions and Access Control
- Print PostScript,
How to Enable Users to Print PostScript Files in Trusted Extensions
- Print Postscript,
PostScript Printing of Security Information
- profiles that include device allocation authorizations,
How to Assign Device Authorizations
- Revoke or Reclaim Device
How to Assign Device Authorizations
How to Assign Device Authorizations
- solaris.print.nobanner,
How to Suppress Banner and Trailer Pages for Specific Users
- solaris.print.ps,
How to Enable Users to Print PostScript Files in Trusted Extensions
- authorizing
- device allocation,
How to Assign Device Authorizations
- PostScript printing,
Reducing Printing Restrictions in Trusted Extensions (Task Map)
- unlabeled printing,
Reducing Printing Restrictions in Trusted Extensions (Task Map)