S
- scripts
- getmounts,
How to Display the Labels of Mounted Files
- txzonemgr,
How to Display Ready or Running Zones
- /usr/sbin/txzonemgr
Administration Tools for Trusted Extensions
Zone Administration Utilities in Trusted Extensions
- secure attention, key combination,
How to Regain Control of the Desktop's Current Focus
- security
- initial setup team,
Initial Setup Team Responsibilities
- publications,
Additional Security References
- root password,
Prepare an Installed Oracle Solaris System for Trusted Extensions
- site security policy,
Site Security Policy
- Security Administrator role
- administering printer security,
Labels, Printers, and Printing
- administering users,
Managing Users and Rights (Task Map)
- assigning authorizations to users,
How to Create a Rights Profile for Convenient Authorizations
- configuring a device,
How to Configure a Device in Trusted Extensions
- creating,
How to Create the Security Administrator Role in Trusted Extensions
- creating Convenient Authorizations rights profile,
How to Create a Rights Profile for Convenient Authorizations
- creating Trusted Desktop Applets rights profile,
How to Limit a User to Desktop Applications
- enabling unlabeled body pages from a public system,
How to Modify policy.conf Defaults
- enforcing security,
Enforcement of Device Security in Trusted Extensions
- protecting nonallocatable devices,
How to Protect Nonallocatable Devices in Trusted Extensions
- security administrators, See Security Administrator role
- security attributes,
Routing Table Entries in Trusted Extensions
- modifying defaults for all users,
How to Modify policy.conf Defaults
- modifying user defaults,
How to Modify Default User Label Attributes
- setting for remote hosts,
How to Create Security Templates
- using in routing,
How to Add Default Routes
- security information
- on printer output,
Labeled Printer Output
- planning for Trusted Extensions,
Resolving Additional Issues Before Enabling Trusted Extensions
- security label set, remote host templates,
Network Security Attributes in Trusted Extensions
- security mechanisms
- extensible,
Extension of Oracle Solaris Security Features by Trusted Extensions
- Oracle Solaris,
Security Mechanisms for Oracle Solaris Software
- security policy
- auditing,
Trusted Extensions Audit Policy Options
- training users,
Users and Security Requirements
- users and devices,
Enforcement of Device Security in Trusted Extensions
- security templates
- See remote host templates
- 0.0.0.0/0 wildcard assignment,
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- sel_config file,
sel_config File
- configuring selection transfer rules,
sel_config File
- selecting, audit records by label,
Audit Tasks in Trusted Extensions
- Selection Manager, configuring rules for selection confirmer,
sel_config File
- Selection Manager application,
Rules When Changing the Level of Security for Data
- Service Management Framework (SMF)
- dpadm,
Install the Oracle Directory Server Enterprise Edition
- dsadm,
Install the Oracle Directory Server Enterprise Edition
- labeld service,
Enable Trusted Extensions and Reboot
- session range,
Label Ranges
- sessions, failsafe,
How to Log In to a Failsafe Session in Trusted Extensions
- Setting Up Remote Administration in Trusted Extensions (Task Map),
Configuring and Administering Remote Systems in Trusted Extensions (Task Map)
- sharing, ZFS dataset from labeled zone,
How to Share a ZFS Dataset From a Labeled Zone
- Shutdown authorization,
How to Create a Rights Profile for Convenient Authorizations
- similarities
- between Trusted Extensions and Oracle Solaris auditing,
Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS,
Similarities Between Trusted Extensions and the Oracle Solaris OS
- single-label operation,
Label Ranges
- single-label printing, configuring for a zone,
How to Configure a Zone As a Single-Level Print Server
- site security policy
- common violations,
Common Security Violations
- personnel recommendations,
Personnel Security Recommendations
- physical access recommendations,
Physical Security Recommendations
- recommendations,
Computer Security Recommendations
- tasks involved,
Site Security Policy
- Trusted Extensions configuration decisions,
Site Security Policy and Trusted Extensions
- understanding,
Understanding Your Site's Security Policy
- snoop command
Network Commands in Trusted Extensions
How to Debug the Trusted Extensions Network
- software
- administering third-party,
Software Management in Trusted Extensions (Reference)
- importing,
Adding Software to Trusted Extensions
- solaris.print.nobanner authorization
How to Modify policy.conf Defaults
How to Suppress Banner and Trailer Pages for Specific Users
- solaris.print.ps authorization,
How to Enable Users to Print PostScript Files in Trusted Extensions
- solaris.print.unlabeled authorization,
How to Modify policy.conf Defaults
- startup files, procedures for customizing,
How to Configure Startup Files for Users in Trusted Extensions
- Stop-A, enabling,
How to Change Security Defaults in System Files
- System Administrator role
- administering printers,
Labels, Printers, and Printing
- creating,
How to Create a System Administrator Role
- reclaiming a device,
How to Revoke or Reclaim a Device in Trusted Extensions
- reviewing audit records,
Audit Tasks in Trusted Extensions
- system files
- editing,
How to Change Security Defaults in System Files
- Oracle Solaris /etc/default/print,
How to Enable Users to Print PostScript Files in Trusted Extensions
- Oracle Solaris policy.conf,
How to Enable Users to Print PostScript Files in Trusted Extensions
- Trusted Extensions sel_config,
sel_config File
- Trusted Extensions tsol_separator.ps,
How to Remove Page Labels From All Print Jobs