JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions (Tasks)

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions (Tasks)

14.  Managing and Mounting Files in Trusted Extensions (Tasks)

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions (Reference)

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

S

scripts
getmounts, index iconHow to Display the Labels of Mounted Files
txzonemgr, index iconHow to Display Ready or Running Zones
/usr/sbin/txzonemgr
index iconAdministration Tools for Trusted Extensions
index iconZone Administration Utilities in Trusted Extensions
secure attention, key combination, index iconHow to Regain Control of the Desktop's Current Focus
security
initial setup team, index iconInitial Setup Team Responsibilities
publications, index iconAdditional Security References
root password, index iconPrepare an Installed Oracle Solaris System for Trusted Extensions
site security policy, index iconSite Security Policy
Security Administrator role
administering printer security, index iconLabels, Printers, and Printing
administering users, index iconManaging Users and Rights (Task Map)
assigning authorizations to users, index iconHow to Create a Rights Profile for Convenient Authorizations
configuring a device, index iconHow to Configure a Device in Trusted Extensions
creating, index iconHow to Create the Security Administrator Role in Trusted Extensions
creating Convenient Authorizations rights profile, index iconHow to Create a Rights Profile for Convenient Authorizations
creating Trusted Desktop Applets rights profile, index iconHow to Limit a User to Desktop Applications
enabling unlabeled body pages from a public system, index iconHow to Modify policy.conf Defaults
enforcing security, index iconEnforcement of Device Security in Trusted Extensions
protecting nonallocatable devices, index iconHow to Protect Nonallocatable Devices in Trusted Extensions
security administrators, See Security Administrator role
security attributes, index iconRouting Table Entries in Trusted Extensions
modifying defaults for all users, index iconHow to Modify policy.conf Defaults
modifying user defaults, index iconHow to Modify Default User Label Attributes
setting for remote hosts, index iconHow to Create Security Templates
using in routing, index iconHow to Add Default Routes
security information
on printer output, index iconLabeled Printer Output
planning for Trusted Extensions, index iconResolving Additional Issues Before Enabling Trusted Extensions
security label set, remote host templates, index iconNetwork Security Attributes in Trusted Extensions
security mechanisms
extensible, index iconExtension of Oracle Solaris Security Features by Trusted Extensions
Oracle Solaris, index iconSecurity Mechanisms for Oracle Solaris Software
security policy
auditing, index iconTrusted Extensions Audit Policy Options
training users, index iconUsers and Security Requirements
users and devices, index iconEnforcement of Device Security in Trusted Extensions
security templates
See remote host templates
0.0.0.0/0 wildcard assignment, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
sel_config file, index iconsel_config File
configuring selection transfer rules, index iconsel_config File
selecting, audit records by label, index iconAudit Tasks in Trusted Extensions
Selection Manager, configuring rules for selection confirmer, index iconsel_config File
Selection Manager application, index iconRules When Changing the Level of Security for Data
Service Management Framework (SMF)
dpadm, index iconInstall the Oracle Directory Server Enterprise Edition
dsadm, index iconInstall the Oracle Directory Server Enterprise Edition
labeld service, index iconEnable Trusted Extensions and Reboot
session range, index iconLabel Ranges
sessions, failsafe, index iconHow to Log In to a Failsafe Session in Trusted Extensions
Setting Up Remote Administration in Trusted Extensions (Task Map), index iconConfiguring and Administering Remote Systems in Trusted Extensions (Task Map)
sharing, ZFS dataset from labeled zone, index iconHow to Share a ZFS Dataset From a Labeled Zone
Shutdown authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
similarities
between Trusted Extensions and Oracle Solaris auditing, index iconTrusted Extensions and Auditing
between Trusted Extensions and Oracle Solaris OS, index iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
single-label operation, index iconLabel Ranges
single-label printing, configuring for a zone, index iconHow to Configure a Zone As a Single-Level Print Server
site security policy
common violations, index iconCommon Security Violations
personnel recommendations, index iconPersonnel Security Recommendations
physical access recommendations, index iconPhysical Security Recommendations
recommendations, index iconComputer Security Recommendations
tasks involved, index iconSite Security Policy
Trusted Extensions configuration decisions, index iconSite Security Policy and Trusted Extensions
understanding, index iconUnderstanding Your Site's Security Policy
snoop command
index iconNetwork Commands in Trusted Extensions
index iconHow to Debug the Trusted Extensions Network
software
administering third-party, index iconSoftware Management in Trusted Extensions (Reference)
importing, index iconAdding Software to Trusted Extensions
solaris.print.nobanner authorization
index iconHow to Modify policy.conf Defaults
index iconHow to Suppress Banner and Trailer Pages for Specific Users
solaris.print.ps authorization, index iconHow to Enable Users to Print PostScript Files in Trusted Extensions
solaris.print.unlabeled authorization, index iconHow to Modify policy.conf Defaults
startup files, procedures for customizing, index iconHow to Configure Startup Files for Users in Trusted Extensions
Stop-A, enabling, index iconHow to Change Security Defaults in System Files
System Administrator role
administering printers, index iconLabels, Printers, and Printing
creating, index iconHow to Create a System Administrator Role
reclaiming a device, index iconHow to Revoke or Reclaim a Device in Trusted Extensions
reviewing audit records, index iconAudit Tasks in Trusted Extensions
system files
editing, index iconHow to Change Security Defaults in System Files
Oracle Solaris /etc/default/print, index iconHow to Enable Users to Print PostScript Files in Trusted Extensions
Oracle Solaris policy.conf, index iconHow to Enable Users to Print PostScript Files in Trusted Extensions
Trusted Extensions sel_config, index iconsel_config File
Trusted Extensions tsol_separator.ps, index iconHow to Remove Page Labels From All Print Jobs