JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

U

unlabeled printing, configuring, index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
updatehome command, index icon.copy_files and .link_files Files
Upgrade DragNDrop or CutPaste Info authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
Upgrade File Label authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
upgrading labels, configuring rules for selection confirmer, index iconsel_config File
useradd command, index iconHow to Create Users Who Can Assume Roles in Trusted Extensions
users
accessing devices
index iconDevice Protection With Trusted Extensions Software
index iconDevice Protection With Trusted Extensions Software
accessing printers, index iconLabels, Printers, and Printing
adding local user with useradd, index iconHow to Create Users Who Can Assume Roles in Trusted Extensions
assigning authorizations to, index iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning labels, index iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning passwords, index iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning rights, index iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning roles to, index iconSecurity Attribute Assignment to Users in Trusted Extensions
authorizations for, index iconHow to Create a Rights Profile for Convenient Authorizations
Change Password menu item, index iconUnique Trusted Extensions Security Features
Change Workspace Label menu item
index iconUnique Trusted Extensions Security Features
index iconUnique Trusted Extensions Security Features
index iconUnique Trusted Extensions Security Features
changing default privileges, index iconSecurity Attribute Assignment to Users in Trusted Extensions
creating, index iconAdministrator Responsibilities for Users
creating initial users, index iconHow to Create Users Who Can Assume Roles in Trusted Extensions
customizing environment, index iconCustomizing the User Environment for Security (Task Map)
deletion precautions, index iconUser Deletion Practices
labels of processes, index iconLabel Ranges
logging in to a failsafe session, index iconHow to Log In to a Failsafe Session in Trusted Extensions
modifying security defaults, index iconHow to Modify Default User Label Attributes
modifying security defaults for all users, index iconHow to Modify policy.conf Defaults
planning for, index iconDecisions to Make Before Creating Users in Trusted Extensions
preventing account locking, index iconHow to Prevent Account Locking for Users
preventing from seeing others' processes, index iconHow to Modify policy.conf Defaults
printing, index iconLabels, Printers, and Printing
removing some privileges, index iconHow to Restrict a User's Set of Privileges
restoring control of desktop focus, index iconHow to Regain Control of the Desktop's Current Focus
security precautions, index iconGroup Administration Practices
security training
index iconSecurity Requirements Enforcement
index iconGroup Administration Practices
index iconEnforcement of Device Security in Trusted Extensions
session range, index iconLabel Ranges
setting up skeleton directories, index iconHow to Configure Startup Files for Users in Trusted Extensions
startup files, index iconHow to Configure Startup Files for Users in Trusted Extensions
using .copy_files file, index iconHow to Configure Startup Files for Users in Trusted Extensions
using .link_files file, index iconHow to Configure Startup Files for Users in Trusted Extensions
using devices, index iconUsing Devices in Trusted Extensions (Task Map)
Using Devices in Trusted Extensions (Task Map), index iconUsing Devices in Trusted Extensions (Task Map)
/usr/bin/tsoljdsselmgr application, index iconRules When Changing the Level of Security for Data
/usr/lib/cups/filter/tsol_separator.ps file, index iconLabeled Printer Output
/usr/local/scripts/getmounts script, index iconHow to Display the Labels of Mounted Files
/usr/sbin/txzonemgr script
index iconHow to Create a Default Trusted Extensions System
index iconAdministration Tools for Trusted Extensions
index iconZone Administration Utilities in Trusted Extensions
index iconHow to Display Ready or Running Zones
/usr/share/gnome/sel_config file, index iconsel_config File
utadm command, default Sun Ray server configuration, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network