Index
A
- access, See computer access
- access policy
- devices,
Device Access Policies
- Discretionary Access Control (DAC)
Trusted Extensions Software and the Oracle Solaris OS
Differences Between Trusted Extensions and the Oracle Solaris OS
- Mandatory Access Control (MAC),
Differences Between Trusted Extensions and the Oracle Solaris OS
- accessing
- Admin Editor action,
How to Edit Administrative Files in Trusted Extensions
- administrative tools,
Getting Started as a Trusted Extensions Administrator (Task Map)
- audit records by label,
Audit Tasks of the System Administrator
- devices,
Device Protection With Trusted Extensions Software
- global zone,
How to Enter the Global Zone in Trusted Extensions
- home directories,
Zones in Trusted Extensions
- printers,
Labels, Printers, and Printing
- remote multilevel desktop,
How to Use Xvnc to Remotely Access a Trusted Extensions System
- Solaris Management Console,
How to Administer the Local System With the Solaris Management Console
- trusted CDE actions,
How to Start CDE Administrative Actions in Trusted Extensions
- ZFS dataset mounted in lower-level zone from higher-level zone,
How to Share a ZFS Dataset From a Labeled Zone
- account locking, preventing,
How to Prevent Account Locking for Users
- accounts
- See roles
- See also users
- accreditation checks,
Trusted Extensions Accreditation Checks
- accreditation ranges, label_encodings file,
Label Encodings File
- actions
- See also individual actions by name
- adding new Trusted CDE actions,
Adding Trusted CDE Actions
- Admin Editor,
How to Edit Administrative Files in Trusted Extensions
- Device Allocation Manager
Device Allocation Manager GUI
Device Allocation Manager GUI
- list of trusted CDE,
Trusted CDE Actions
- Name Service Switch,
How to Debug the Trusted Extensions Network
- restricted by rights profiles,
Trusted Processes in the Window System
- use differences between CDE and Trusted CDE,
Adding Trusted CDE Actions
- add_allocatable command,
Command Line Tools in Trusted Extensions
- Add Allocatable Device action,
Trusted CDE Actions
- Admin Editor action,
Trusted CDE Actions
- opening,
How to Edit Administrative Files in Trusted Extensions
- ADMIN_HIGH label,
Dominance Relationships Between Labels
- ADMIN_LOW label
- lowest label,
Dominance Relationships Between Labels
- protecting administrative files,
Password Protection
- administering
- account locking,
How to Prevent Account Locking for Users
- assigning device authorizations,
How to Assign Device Authorizations
- audio device to play music,
How to Configure an Audio Player Program for Use in Trusted CDE
- auditing in Trusted Extensions,
Audit Management by Role in Trusted Extensions
- changing label of information,
How to Enable a User to Change the Security Level of Data
- convenient authorizations for users,
How to Create a Rights Profile for Convenient Authorizations
- device allocation,
How to Assign Device Authorizations
- device authorizations,
How to Create New Device Authorizations
- devices
Managing Devices for Trusted Extensions (Tasks)
Managing Devices in Trusted Extensions (Task Map)
- file systems
- mounting,
How to NFS Mount Files in a Labeled Zone
- overview,
Sharing and Mounting Files in Trusted Extensions
- troubleshooting,
How to Troubleshoot Mount Failures in Trusted Extensions
files
- backing up,
How to Back Up Files in Trusted Extensions
- restoring,
How to Restore Files in Trusted Extensions
from the global zone,
How to Enter the Global Zone in Trusted Extensions
- labeled printing,
Managing Labeled Printing (Tasks)
- LDAP,
Trusted Extensions and LDAP (Overview)
- mail,
Multilevel Mail in Trusted Extensions (Overview)
- multilevel ports,
How to Compare Trusted Network Database Information With the Kernel Cache
- network in Trusted Extensions,
Managing Networks in Trusted Extensions (Tasks)
- network of users,
Managing Users and Rights With the Solaris Management Console (Task Map)
- PostScript printing,
How to Enable Users to Print PostScript Files in Trusted Extensions
- printing in Trusted Extensions,
Managing Printing in Trusted Extensions (Task Map)
- printing interoperability with Trusted Solaris 8,
Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
- quick reference for administrators,
Quick Reference to Trusted Extensions Administration
- remote host database,
How to Assign a Security Template to a Host or a Group of Hosts
- remote host templates,
How to Construct a Remote Host Template
- remotely,
Remote Administration in Trusted Extensions (Tasks)
- remotely from command line,
How to Log In Remotely From the Command Line in Trusted Extensions
- remotely with dtappsession,
How to Remotely Administer Trusted Extensions With dtappsession
- remotely with Solaris Management Console
How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
- routes with security attributes,
How to Configure Routes With Security Attributes
- serial line for login,
How to Configure a Serial Line for Logins
- sharing file systems,
How to Share Directories From a Labeled Zone
- startup files for users,
How to Configure Startup Files for Users in Trusted Extensions
- Sun Ray printing,
How to Configure a Network Printer for Sun Ray Clients
- system files,
How to Change Security Defaults in System Files
- third-party software,
Software Management in Trusted Extensions (Tasks)
- trusted network databases,
Configuring Trusted Network Databases (Task Map)
- trusted networking,
Managing Networks in Trusted Extensions (Tasks)
- unlabeled printing,
Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user privileges,
How to Restrict a User's Set of Privileges
- users
Decisions to Make Before Creating Users in Trusted Extensions
Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
- zones,
Managing Zones (Task Map)
- zones from Trusted JDS,
Zone Administration Utilities in Trusted Extensions
- Administering Trusted Extensions Remotely (Task Map),
Administering Trusted Extensions Remotely (Task Map)
- administrative actions
- See also actions
- accessing,
How to Edit Administrative Files in Trusted Extensions
- in CDE,
Trusted CDE Actions
- in Trusted_Extensions folder,
How to Start CDE Administrative Actions in Trusted Extensions
- list of trusted CDE,
Trusted CDE Actions
- starting remotely
How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
- trusted,
Trusted Processes in the Window System
- administrative labels,
Dominance Relationships Between Labels
- administrative roles, See roles
- Administrative Roles tool,
Trusted Extensions Tools in the Solaris Management Console
- administrative tools
- accessing,
Getting Started as a Trusted Extensions Administrator (Task Map)
- commands,
Command Line Tools in Trusted Extensions
- description,
Trusted Extensions Administration Tools
- Device Allocation Manager,
Device Allocation Manager
- in Trusted_Extensions folder,
How to Start CDE Administrative Actions in Trusted Extensions
- label builder,
Label Builder in Trusted Extensions
- Labeled Zone Manager,
txzonemgr Script
- Solaris Management Console
Solaris Management Console Tools
How to Administer the Local System With the Solaris Management Console
- Trusted CDE actions,
Trusted CDE Actions
- txzonemgr script,
txzonemgr Script
- allocate command,
Command Line Tools in Trusted Extensions
- Allocate Device authorization
How to Create a Rights Profile for Convenient Authorizations
Device Protection With Trusted Extensions Software
How to Assign Device Authorizations
How to Assign Device Authorizations
- allocate error state, correcting,
How to Revoke or Reclaim a Device in Trusted Extensions
- allocating, using Device Allocation Manager,
Device Allocation Manager GUI
- applications
- evaluating for security,
Security Administrator Responsibilities for Trusted Programs
- installing,
Managing Software in Trusted Extensions (Tasks)
- trusted and trustworthy,
Evaluating Software for Security
- assigning
- editor as the trusted editor,
How to Assign the Editor of Your Choice as the Trusted Editor
- privileges to users,
Security Attribute Assignment to Users in Trusted Extensions
- rights profiles,
Security Attribute Assignment to Users in Trusted Extensions
- Assume Role menu item,
How to Enter the Global Zone in Trusted Extensions
- assuming, roles,
How to Enter the Global Zone in Trusted Extensions
- atohexlabel command
Command Line Tools in Trusted Extensions
How to Obtain the Hexadecimal Equivalent for a Label
- audio devices
- automatically starting an audio player,
How to Configure an Audio Player Program for Use in Trusted CDE
- preventing remote allocation,
How to Protect Nonallocatable Devices in Trusted Extensions
- audit_class file, action for editing,
Trusted CDE Actions
- Audit Classes action,
Trusted CDE Actions
- audit classes for Trusted Extensions, list of new X audit classes,
Trusted Extensions Audit Classes
- Audit Control action,
Trusted CDE Actions
- audit_control file, action for editing,
Trusted CDE Actions
- audit_event file,
Trusted CDE Actions
- Audit Events action,
Trusted CDE Actions
- audit events for Trusted Extensions, list of,
Trusted Extensions Audit Events
- audit policy in Trusted Extensions,
Trusted Extensions Audit Policy Options
- audit records in Trusted Extensions, policy,
Trusted Extensions Audit Policy Options
- Audit Review profile, reviewing audit records,
Audit Tasks of the System Administrator
- Audit Startup action,
Trusted CDE Actions
- audit_startup command, action for editing,
Trusted CDE Actions
- Audit Tasks of the System Administrator,
Audit Tasks of the System Administrator
- audit tokens for Trusted Extensions
- label token,
label Token
- list of,
Trusted Extensions Audit Tokens
- xatom token,
xatom Token
- xclient token,
xclient Token
- xcolormap token,
xcolormap Token
- xcursor token,
xcursor Token
- xfont token,
xfont Token
- xgc token,
xgc Token
- xpixmap token,
xpixmap Token
- xproperty token,
xproperty Token
- xselect token,
xselect Token
- xwindow token,
xwindow Token
- auditconfig command,
Command Line Tools in Trusted Extensions
- auditing in Trusted Extensions
- additional audit events,
Trusted Extensions Audit Events
- additional audit policies,
Trusted Extensions Audit Policy Options
- additional audit tokens,
Trusted Extensions Audit Tokens
- additions to existing auditing commands,
Extensions to Auditing Commands in Trusted Extensions
- differences from Oracle Solaris auditing,
Trusted Extensions and Auditing
- reference,
Trusted Extensions Auditing (Overview)
- roles for administering,
Audit Management by Role in Trusted Extensions
- security administrator tasks,
Audit Tasks of the Security Administrator
- system administrator tasks,
Audit Tasks of the System Administrator
- tasks,
Audit Tasks in Trusted Extensions
- X audit classes,
Trusted Extensions Audit Classes
- auditreduce command,
Command Line Tools in Trusted Extensions
- authorizations
- adding new device authorizations,
How to Create New Device Authorizations
- Allocate Device
Device Protection With Trusted Extensions Software
How to Assign Device Authorizations
How to Assign Device Authorizations
- assigning,
Security Attribute Assignment to Users in Trusted Extensions
- assigning device authorizations,
How to Assign Device Authorizations
- authorizing a user or role to change label,
How to Enable a User to Change the Security Level of Data
- Configure Device Attributes,
How to Assign Device Authorizations
- convenient for users,
How to Create a Rights Profile for Convenient Authorizations
- creating customized device authorizations,
How to Create New Device Authorizations
- creating local and remote device authorizations,
How to Create New Device Authorizations
- customizing for devices,
How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- granted,
Trusted Extensions and Access Control
- Print Postscript,
PostScript Printing of Security Information
- Print PostScript,
How to Enable Users to Print PostScript Files in Trusted Extensions
- profiles that include device allocation authorizations,
How to Assign Device Authorizations
- Revoke or Reclaim Device
How to Assign Device Authorizations
How to Assign Device Authorizations
- solaris.print.nobanner,
How to Suppress Banner and Trailer Pages for Specific Users
- solaris.print.ps,
How to Enable Users to Print PostScript Files in Trusted Extensions
- authorizing
- device allocation,
How to Assign Device Authorizations
- PostScript printing,
Reducing Printing Restrictions in Trusted Extensions (Task Map)
- unlabeled printing,
Reducing Printing Restrictions in Trusted Extensions (Task Map)
- automount command,
Command Line Tools in Trusted Extensions