JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

D

DAC, See discretionary access control (DAC)
data, relabeling efficiently, index iconHow to Create and Share a Multilevel Dataset
databases
in LDAP, index iconUsing the LDAP Naming Service in Trusted Extensions
trusted network, index iconNetwork Configuration Databases in Trusted Extensions
datasets, See ZFS
deallocating, forcing, index iconHow to Revoke or Reclaim a Device in Trusted Extensions
debugging, See troubleshooting
deciding
to configure by assuming a limited role or as root, index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
to use an Oracle-supplied encodings file, index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
decisions to make
based on site security policy, index iconSite Security Policy and Trusted Extensions
before enabling Trusted Extensions, index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
deleting, labeled zones, index iconHow to Remove Trusted Extensions From the System
desktops
accessing multilevel remotely, index iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
logging in to a failsafe session, index iconHow to Log In to a Failsafe Session in Trusted Extensions
moving panels to bottom of screen, index iconHow to Move Desktop Panels to the Bottom of the Screen
using Vino to share, index iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
workspace color changes, index iconHow to Enter the Global Zone in Trusted Extensions
/dev/kmem kernel image file, security violation, index iconEvaluating Software for Security
developer responsibilities, index iconDeveloper Responsibilities When Creating Trusted Programs
device allocation
authorizing, index iconHow to Assign Device Authorizations
overview, index iconDevice Protection With Trusted Extensions Software
profiles that include allocation authorizations, index iconHow to Assign Device Authorizations
device-clean scripts
adding to devices, index iconHow to Add a Device_Clean Script in Trusted Extensions
requirements, index iconDevice-Clean Scripts
Device Manager
administrative tool, index iconAdministration Tools for Trusted Extensions
description, index iconDevice Manager GUI
use by administrators, index iconHow to Configure a Device in Trusted Extensions
devices
access policy, index iconDevice Access Policies
accessing, index iconDevice Manager GUI
adding customized authorizations, index iconHow to Add Site-Specific Authorizations to a Device in Trusted Extensions
adding device_clean script, index iconHow to Add a Device_Clean Script in Trusted Extensions
administering, index iconManaging Devices for Trusted Extensions (Tasks)
administering with Device Manager, index iconHow to Configure a Device in Trusted Extensions
allocating, index iconDevice Protection With Trusted Extensions Software
configuring devices, index iconHow to Configure a Device in Trusted Extensions
creating new authorizations, index iconHow to Create New Device Authorizations
in Trusted Extensions, index iconDevices in Trusted Extensions (Overview)
policy defaults, index iconDevice Access Policies
preventing remote allocation of audio, index iconHow to Protect Nonallocatable Devices in Trusted Extensions
protecting, index iconDevice Manager
protecting nonallocatable, index iconHow to Protect Nonallocatable Devices in Trusted Extensions
reclaiming, index iconHow to Revoke or Reclaim a Device in Trusted Extensions
setting label range for nonallocatable, index iconEffects of Label Range on a Device
setting policy, index iconDevice Access Policies
troubleshooting, index iconHow to Revoke or Reclaim a Device in Trusted Extensions
using, index iconUsing Devices in Trusted Extensions (Task Map)
differences
administrative interfaces in Trusted Extensions, index iconAdministrative Interfaces in Trusted Extensions
between Trusted Extensions and Oracle Solaris auditing, index iconTrusted Extensions and Auditing
between Trusted Extensions and Oracle Solaris OS, index iconDifferences Between Trusted Extensions and the Oracle Solaris OS
defaults in Trusted Extensions, index iconTighter Security Defaults in Trusted Extensions
extending Oracle Solaris interfaces, index iconOracle Solaris Interfaces Extended by Trusted Extensions
limited options in Trusted Extensions, index iconLimited Options in Trusted Extensions
directories
accessing lower-level, index iconZones in Trusted Extensions
authorizing a user or role to change label of, index iconHow to Enable a User to Change the Security Level of Data
for naming service setup, index iconPopulate the Oracle Directory Server Enterprise Edition
mounting, index iconHow to Share File Systems From a Labeled Zone
sharing, index iconHow to Share File Systems From a Labeled Zone
disabling, Trusted Extensions, index iconHow to Remove Trusted Extensions From the System
discretionary access control (DAC), index iconTrusted Extensions and Access Control
diskettes, accessing, index iconDevice Protection With Trusted Extensions Software
displaying
labels of file systems in labeled zone, index iconHow to Display the Labels of Mounted Files
status of every zone, index iconHow to Display Ready or Running Zones
DOI, remote host templates, index iconNetwork Security Attributes in Trusted Extensions
domain of interpretation (DOI), modifying, index iconHow to Configure a Different Domain of Interpretation
dominance of labels, index iconDominance Relationships Between Labels
Downgrade DragNDrop or CutPaste Info authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
Downgrade File Label authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
downgrading labels, configuring rules for selection confirmer, index iconsel_config File
dpadm service, index iconInstall the Oracle Directory Server Enterprise Edition
DragNDrop or CutPaste without viewing contents authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
dsadm service, index iconInstall the Oracle Directory Server Enterprise Edition
dtsession command, running updatehome, index icon.copy_files and .link_files Files