D
- DAC, See discretionary access control (DAC)
- databases
- in LDAP,
Using a Naming Service in Trusted Extensions
- trusted network,
Network Configuration Databases in Trusted Extensions
- datasets, See ZFS
- deallocating, forcing,
How to Revoke or Reclaim a Device in Trusted Extensions
- debugging, See troubleshooting
- deciding
- to configure as a role or as superuser,
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- to use an Oracle-supplied encodings file,
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- decisions to make
- based on site security policy,
Site Security Policy and Trusted Extensions
- before enabling Trusted Extensions,
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- deleting, labeled zones,
How to Remove Trusted Extensions From the System
- desktop, displaying panels,
How to Move Desktop Panels to the Bottom of the Screen
- Desktop Applets rights profile, limiting user to desktop use only,
How to Limit a User to Desktop Applications
- desktop GUIs, restricting users to,
How to Limit a User to Desktop Applications
- desktops
- accessing multilevel remotely,
How to Configure a Trusted Extensions System With Xvnc for Remote Access
- logging in to a failsafe session,
How to Log In to a Failsafe Session in Trusted Extensions
- workspace color changes,
How to Enter the Global Zone in Trusted Extensions
- /dev/kmem kernel image file, security violation,
Evaluating Software for Security
- developer responsibilities,
Developer Responsibilities When Creating Trusted Programs
- device allocation
- authorizing,
How to Assign Device Authorizations
- overview,
Device Protection With Trusted Extensions Software
- profiles that include allocation authorizations,
How to Assign Device Authorizations
- device-clean scripts
- adding to devices,
How to Add a Device_Clean Script in Trusted Extensions
- requirements,
Device-Clean Scripts
- Device Manager
- administrative tool,
Administration Tools for Trusted Extensions
- description,
Device Manager GUI
- use by administrators,
How to Configure a Device in Trusted Extensions
- devices
- access policy,
Device Access Policies
- accessing,
Device Manager GUI
- adding customized authorizations,
How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- adding device_clean script,
How to Add a Device_Clean Script in Trusted Extensions
- administering,
Managing Devices for Trusted Extensions (Tasks)
- administering with Device Manager,
How to Configure a Device in Trusted Extensions
- allocating,
Device Protection With Trusted Extensions Software
- configuring devices,
How to Configure a Device in Trusted Extensions
- creating new authorizations,
How to Create New Device Authorizations
- in Trusted Extensions,
Devices in Trusted Extensions (Overview)
- policy defaults,
Device Access Policies
- preventing remote allocation of audio,
How to Protect Nonallocatable Devices in Trusted Extensions
- protecting,
Device Manager
- protecting nonallocatable,
How to Protect Nonallocatable Devices in Trusted Extensions
- reclaiming,
How to Revoke or Reclaim a Device in Trusted Extensions
- setting label range for nonallocatable,
Effects of Label Range on a Device
- setting policy,
Device Access Policies
- troubleshooting,
How to Revoke or Reclaim a Device in Trusted Extensions
- using,
Using Devices in Trusted Extensions (Task Map)
- differences
- administrative interfaces in Trusted Extensions,
Administrative Interfaces in Trusted Extensions
- between Trusted Extensions and Oracle Solaris auditing,
Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS,
Differences Between Trusted Extensions and the Oracle Solaris OS
- defaults in Trusted Extensions,
Tighter Security Defaults in Trusted Extensions
- extending Oracle Solaris interfaces,
Oracle Solaris Interfaces Extended by Trusted Extensions
- limited options in Trusted Extensions,
Limited Options in Trusted Extensions
- directories
- accessing lower-level,
Zones in Trusted Extensions
- authorizing a user or role to change label of,
How to Enable a User to Change the Security Level of Data
- for naming service setup,
Populate the Oracle Directory Server Enterprise Edition
- mounting,
How to Share File Systems From a Labeled Zone
- sharing,
How to Share File Systems From a Labeled Zone
- disabling, Trusted Extensions,
How to Remove Trusted Extensions From the System
- discretionary access control (DAC),
Trusted Extensions and Access Control
- diskettes, accessing,
Device Protection With Trusted Extensions Software
- displaying
- labels of file systems in labeled zone,
How to Display the Labels of Mounted Files
- status of every zone,
How to Display Ready or Running Zones
- DOI, remote host templates,
Network Security Attributes in Trusted Extensions
- domain of interpretation (DOI), modifying,
How to Configure the Domain of Interpretation
- dominance of labels,
Dominance Relationships Between Labels
- Downgrade DragNDrop or CutPaste Info authorization,
How to Create a Rights Profile for Convenient Authorizations
- Downgrade File Label authorization,
How to Create a Rights Profile for Convenient Authorizations
- downgrading labels, configuring rules for selection confirmer,
sel_config File
- dpadm service,
Install the Oracle Directory Server Enterprise Edition
- DragNDrop or CutPaste without viewing contents authorization,
How to Create a Rights Profile for Convenient Authorizations
- dsadm service,
Install the Oracle Directory Server Enterprise Edition
- dtsession command, running updatehome,
.copy_files and .link_files Files