JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

C

-c option, txzonemgr script, index iconHow to Create a Default Trusted Extensions System
CD-ROM drives, accessing, index iconDevice Protection With Trusted Extensions Software
Change Password menu item
description, index iconUnique Trusted Extensions Security Features
using to change root password, index iconHow to Change the Password for root
Change Workspace Label menu item
description
index iconUnique Trusted Extensions Security Features
index iconUnique Trusted Extensions Security Features
index iconUnique Trusted Extensions Security Features
changing
IDLETIME keyword, index iconHow to Modify policy.conf Defaults
labels by authorized users, index iconHow to Enable a User to Change the Security Level of Data
rules for label changes, index iconsel_config File
security level of data, index iconHow to Enable a User to Change the Security Level of Data
system security defaults, index iconHow to Change Security Defaults in System Files
user privileges, index iconHow to Restrict a User's Set of Privileges
checking
label_encodings file, index iconHow to Check and Install Your Label Encodings File
roles are working, index iconHow to Verify That the Trusted Extensions Roles Work
checklists for initial setup team, index iconChecklist for Configuring Trusted Extensions
chk_encodings command, index iconHow to Check and Install Your Label Encodings File
choosing, See selecting
classification label component, index iconDominance Relationships Between Labels
clearances, label overview, index iconLabels in Trusted Extensions Software
collecting information, for LDAP service, index iconCollect Information for the Directory Server for LDAP
colors, indicating label of workspace, index iconWhat Labels Protect and Where Labels Appear
commands
executing with privilege, index iconHow to Enter the Global Zone in Trusted Extensions
troubleshooting networking, index iconHow to Debug the Trusted Extensions Network
commercial applications, evaluating, index iconSecurity Administrator Responsibilities for Trusted Programs
Common Tasks in Trusted Extensions (Task Map), index iconCommon Tasks in Trusted Extensions (Task Map)
compartment label component, index iconDominance Relationships Between Labels
component definitions, label_encodings file, index iconLabel Encodings File
computer access
administrator responsibilities, index iconInformation Protection
restricting, index iconEffects of Label Range on a Device
configuration files
copying, index iconHow to Copy Files to Portable Media in Trusted Extensions
loading, index iconHow to Copy Files From Portable Media in Trusted Extensions
Configure Device Attributes authorization, index iconHow to Assign Device Authorizations
configuring
access to remote Trusted Extensions, index iconRemote Administration in Trusted Extensions (Tasks)
authorizations for devices, index iconHow to Create New Device Authorizations
by assuming a limited role or as root, index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
devices, index iconHow to Configure a Device in Trusted Extensions
labeled printing, index iconConfiguring Labeled Printing (Task Map)
LDAP for Trusted Extensions, index iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
LDAP proxy server for Trusted Extensions clients, index iconCreating a Trusted Extensions Proxy for an Existing Oracle Directory Server Enterprise Edition
logical interfaces, index iconHow to Add an IP Instance to a Labeled Zone
network interfaces
index iconHow to Share a Single IP Address With All Zones
index iconHow to Connect a Trusted Extensions System to Other Trusted Extensions Systems
routes with security attributes, index iconHow to Add Default Routes
startup files for users, index iconHow to Configure Startup Files for Users in Trusted Extensions
Trusted Extensions, index iconConfiguring Trusted Extensions (Tasks)
Trusted Extensions labeled zones, index iconCreating Labeled Zones
trusted network, index iconManaging Networks in Trusted Extensions (Tasks)
VNICs, index iconHow to Add a Virtual Network Interface to a Labeled Zone
Configuring an LDAP Proxy Server on a Trusted Extensions System (Task Map), index iconConfiguring an LDAP Proxy Server on a Trusted Extensions System (Task Map)
Configuring Labeled IPsec (Task Map), index iconConfiguring Labeled IPsec (Task Map)
Configuring Labeled Printing (Task Map), index iconConfiguring Labeled Printing (Task Map)
Configuring LDAP on a Trusted Extensions Network (Task Map), index iconConfiguring LDAP on a Trusted Extensions Network (Task Map)
configuring Trusted Extensions
checklist for initial setup team, index iconChecklist for Configuring Trusted Extensions
initial procedures, index iconConfiguring Trusted Extensions (Tasks)
labeled zones, index iconCreating Labeled Zones
remote access, index iconRemote Administration in Trusted Extensions (Tasks)
task maps, index iconConfiguration Roadmap for Trusted Extensions
controlling, See restricting
.copy_files file
description, index icon.copy_files and .link_files Files
setting up for users
index iconHow to Configure Startup Files for Users in Trusted Extensions
index iconHow to Configure Startup Files for Users in Trusted Extensions
creating
accounts, index iconCreating Roles and Users in Trusted Extensions
accounts during or after configuration, index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
authorizations for devices, index iconHow to Create New Device Authorizations
home directories
index iconCreating Centralized Home Directories in Trusted Extensions
index iconHome Directory Creation in Trusted Extensions
home directory server, index iconHow to Create the Home Directory Server in Trusted Extensions
labeled zones, index iconCreating Labeled Zones
LDAP client, index iconMake the Global Zone an LDAP Client in Trusted Extensions
LDAP proxy server for Trusted Extensions clients, index iconCreate an LDAP Proxy Server
LDAP role with roleadd, index iconHow to Create the Security Administrator Role in Trusted Extensions
local role with roleadd, index iconHow to Create the Security Administrator Role in Trusted Extensions
local user with useradd, index iconHow to Create Users Who Can Assume Roles in Trusted Extensions
roles, index iconCreating Roles and Users in Trusted Extensions
users who can assume roles, index iconHow to Create Users Who Can Assume Roles in Trusted Extensions
zones, index iconCreating Labeled Zones
Creating Labeled Zones, index iconCreating Labeled Zones
customizing
device authorizations, index iconHow to Add Site-Specific Authorizations to a Device in Trusted Extensions
label_encodings file, index iconLabel Encodings File
unlabeled printing, index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
user accounts, index iconCustomizing the User Environment for Security (Task Map)
Customizing Device Authorizations in Trusted Extensions (Task Map), index iconCustomizing Device Authorizations in Trusted Extensions (Task Map)
Customizing User Environment for Security (Task Map), index iconCustomizing the User Environment for Security (Task Map)
cut and paste, and labels, index iconRules When Changing the Level of Security for Data
cutting and pasting, configuring rules for label changes, index iconsel_config File