R
- real UID of root, required for applications,
Evaluating Software for Security
- Reducing Printing Restrictions in Trusted Extensions (Task Map),
Reducing Printing Restrictions in Trusted Extensions (Task Map)
- regaining control of desktop focus,
How to Regain Control of the Desktop's Current Focus
- regular users, See users
- relabeling information,
How to Enable a User to Change the Security Level of Data
- remote administration
- defaults,
Secure Remote Administration in Trusted Extensions
- methods,
Methods for Administering Remote Systems in Trusted Extensions
- remote host templates
- assigning,
Configuring Trusted Network Databases (Task Map)
- assigning to hosts,
How to Assign a Security Template to a Host or a Group of Hosts
- creating,
How to Construct a Remote Host Template
- tool for administering,
Security Templates Tool
- remote hosts, using fallback mechanism in tnrhdb,
Trusted Network Fallback Mechanism
- Remote Login authorization,
How to Create a Rights Profile for Convenient Authorizations
- remote multilevel desktop, accessing,
How to Use Xvnc to Remotely Access a Trusted Extensions System
- removable media, mounting,
How to Add a Software Package in Trusted Extensions
- remove_allocatable command,
Command Line Tools in Trusted Extensions
- removing, labels on printer output,
How to Remove Labels From Printed Output
- repairing, labels in internal databases,
How to Obtain a Readable Label From Its Hexadecimal Form
- resolv.conf file, action for editing,
Trusted CDE Actions
- Restart Zone action,
Trusted CDE Actions
- restoring control of desktop focus,
How to Regain Control of the Desktop's Current Focus
- restricting
- access to computer based on label,
Effects of Label Range on a Device
- access to devices,
Device Protection With Trusted Extensions Software
- access to global zone,
Role Assumption in Trusted Extensions
- access to lower-level files,
How to Disable the Mounting of Lower-Level Files
- access to printers with labels,
Restricting Access to Printers and Print Job Information in Trusted Extensions
- actions by rights profiles,
Trusted Processes in the Window System
- mounts of lower-level files,
How to Disable the Mounting of Lower-Level Files
- printer access with labels,
Restricting Access to Printers and Print Job Information in Trusted Extensions
- printer label range,
How to Configure a Restricted Label Range for a Printer
- remote access,
Secure Remote Administration in Trusted Extensions
- Revoke or Reclaim Device authorization
How to Assign Device Authorizations
How to Assign Device Authorizations
- rights, See rights profiles
- rights profiles
- assigning,
Security Attribute Assignment to Users in Trusted Extensions
- controlling the use of actions,
Trusted Processes in the Window System
- Convenient Authorizations,
How to Create a Rights Profile for Convenient Authorizations
- with Allocate Device authorization,
How to Assign Device Authorizations
- with device allocation authorizations,
How to Assign Device Authorizations
- with new device authorizations,
How to Create New Device Authorizations
- Rights tool,
Trusted Extensions Tools in the Solaris Management Console
- rmmount.conf file
How to Configure an Audio Player Program for Use in Trusted CDE
How to Prevent the File Manager From Displaying After Device Allocation
- role workspace, global zone,
Security Requirements When Administering Trusted Extensions
- roles
- administering auditing,
Role Setup for Audit Administration
- administering remotely
How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
- assigning rights,
Security Attribute Assignment to Users in Trusted Extensions
- assuming
Security Requirements When Administering Trusted Extensions
How to Enter the Global Zone in Trusted Extensions
- creating,
Role Creation in Trusted Extensions
- leaving role workspace,
How to Exit the Global Zone in Trusted Extensions
- remote login,
Remote Login by a Role in Trusted Extensions
- role assumption from unlabeled host,
Remote Role-Based Administration From Unlabeled Hosts
- trusted application access,
Administration Tools for Trusted Extensions
- workspaces,
Security Requirements When Administering Trusted Extensions
- root role, adding device_clean script,
How to Add a Device_Clean Script in Trusted Extensions
- root UID, required for applications,
Evaluating Software for Security
- route command
Command Line Tools in Trusted Extensions
Network Commands in Trusted Extensions
- routing,
Overview of Routing in Trusted Extensions
- accreditation checks,
Trusted Extensions Accreditation Checks
- commands in Trusted Extensions,
Routing Commands in Trusted Extensions
- concepts,
Administration of Routing in Trusted Extensions
- example of,
Gateways in Trusted Extensions
- static with security attributes,
How to Configure Routes With Security Attributes
- tables
Routing Table Entries in Trusted Extensions
Choosing Routers in Trusted Extensions
- using route command,
How to Configure Routes With Security Attributes