S
- scripts
- getmounts,
How to Display the Labels of Mounted Files
- getzonelabels,
How to Display Ready or Running Zones
- /usr/sbin/txzonemgr
Administration Tools for Trusted Extensions
Zone Administration Utilities in Trusted Extensions
- secure attention, key combination,
How to Regain Control of the Desktop's Current Focus
- Security Administrator role
- administering network of users,
Managing Users and Rights With the Solaris Management Console (Task Map)
- administering PostScript restriction,
PostScript Printing of Security Information
- administering printer security,
Labels, Printers, and Printing
- assigning authorizations to users,
How to Create a Rights Profile for Convenient Authorizations
- audit tasks,
Audit Tasks of the Security Administrator
- configuring a device,
How to Configure a Device in Trusted Extensions
- configuring serial line for login,
How to Configure a Serial Line for Logins
- creating Convenient Authorizations rights profile,
How to Create a Rights Profile for Convenient Authorizations
- enabling unlabeled body pages from a public system,
How to Modify policy.conf Defaults
- enforcing security,
Enforcement of Device Security in Trusted Extensions
- modifying window configuration files,
Front Panel Customization
- protecting nonallocatable devices,
How to Protect Nonallocatable Devices in Trusted Extensions
- security administrators, See Security Administrator role
- security attributes,
Routing Table Entries in Trusted Extensions
- modifying defaults for all users,
How to Modify policy.conf Defaults
- modifying user defaults,
How to Modify Default User Label Attributes
- setting for remote hosts,
How to Construct a Remote Host Template
- using in routing,
How to Configure Routes With Security Attributes
- security information, on printer output,
Labeled Printer Output
- security label set, remote host templates,
Network Security Attributes in Trusted Extensions
- security mechanisms
- extensible,
Extension of Oracle Solaris Security Mechanisms by Trusted Extensions
- Oracle Solaris,
Oracle Solaris Security Mechanisms for Software
- security policy
- auditing,
Trusted Extensions Audit Policy Options
- training users,
Users and Security Requirements
- users and devices,
Enforcement of Device Security in Trusted Extensions
- security templates, See remote host templates
- Security Templates tool
Trusted Extensions Tools in the Solaris Management Console
Security Templates Tool
- assigning templates,
How to Assign a Security Template to a Host or a Group of Hosts
- modifying tnrhdb
Configuring Trusted Network Databases (Task Map)
Configuring Trusted Network Databases (Task Map)
- using,
How to Open the Trusted Networking Tools
- sel_config file,
sel_config File
- action for editing,
Trusted CDE Actions
- configuring selection transfer rules,
sel_config File
- sel_mgr application,
Rules When Changing the Level of Security for Data
- selecting, audit records by label,
Audit Tasks of the System Administrator
- Selection Confirmer, changing defaults,
sel_config File
- Selection Manager, configuring rules for selection confirmer,
sel_config File
- Selection Manager application,
Rules When Changing the Level of Security for Data
- serial line, configuring for logins,
How to Configure a Serial Line for Logins
- service management facility (SMF), Trusted Extensions service,
What's New in Trusted Extensions
- session range,
Label Ranges
- sessions, failsafe,
How to Log In to a Failsafe Session in Trusted Extensions
- Set Daily Message action,
Trusted CDE Actions
- Set Default Routes action,
Trusted CDE Actions
- Set DNS Servers action,
Trusted CDE Actions
- setlabel command,
Command Line Tools in Trusted Extensions
- Share Filesystems action,
Trusted CDE Actions
- Share Logical Interface action,
Trusted CDE Actions
- Share Physical Interface action,
Trusted CDE Actions
- sharing, ZFS dataset from labeled zone,
How to Share a ZFS Dataset From a Labeled Zone
- Shut Down Zone action,
Trusted CDE Actions
- Shutdown authorization,
How to Create a Rights Profile for Convenient Authorizations
- similarities
- between Trusted Extensions and Oracle Solaris auditing,
Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS,
Similarities Between Trusted Extensions and the Oracle Solaris OS
- single-label operation,
Label Ranges
- single-label printing, configuring for a zone,
How to Configure a Zone for Single-Label Printing
- smtnrhdb command,
Command Line Tools in Trusted Extensions
- smtnrhtp command,
Command Line Tools in Trusted Extensions
- smtnzonecfg command,
Command Line Tools in Trusted Extensions
- snoop command
Network Commands in Trusted Extensions
How to Debug the Trusted Extensions Network
- software
- administering third-party,
Software Management in Trusted Extensions (Tasks)
- importing,
Adding Software to Trusted Extensions
- installing Java programs,
How to Install a Java Archive File in Trusted Extensions
- Solaris Management Console
- administering trusted network,
Configuring Trusted Network Databases (Task Map)
- administering users,
Managing Users and Rights With the Solaris Management Console (Task Map)
- Computers and Networks tool,
How to Add Hosts to the System's Known Network
- description of tools and toolboxes,
Solaris Management Console Tools
- Security Templates tool
Security Templates Tool
How to Open the Trusted Networking Tools
- starting,
How to Administer the Local System With the Solaris Management Console
- toolboxes,
Solaris Management Console Tools
- Trusted Network Zones tool,
Trusted Network Zones Tool
- solaris.print.nobanner authorization
How to Modify policy.conf Defaults
How to Suppress Banner and Trailer Pages for Specific Users
- solaris.print.ps authorization,
How to Enable Users to Print PostScript Files in Trusted Extensions
- solaris.print.unlabeled authorization,
How to Modify policy.conf Defaults
- Start Zone action,
Trusted CDE Actions
- startup files, procedures for customizing,
How to Configure Startup Files for Users in Trusted Extensions
- Stop-A, enabling,
How to Change Security Defaults in System Files
- Sun Ray systems
- configuring network printer,
How to Configure a Network Printer for Sun Ray Clients
- enabling initial contact between client and server,
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- preventing users from seeing others' processes,
How to Modify policy.conf Defaults
- tnrhdb address for client contact,
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- System Administrator role
- adding print conversion filters,
Additional Conversion Filters
- administering printers,
Labels, Printers, and Printing
- audit tasks,
Audit Tasks of the System Administrator
- enabling music to play automatically,
How to Configure an Audio Player Program for Use in Trusted CDE
- preventing File Manager display,
How to Prevent the File Manager From Displaying After Device Allocation
- reclaiming a device,
How to Revoke or Reclaim a Device in Trusted Extensions
- reviewing audit records,
Audit Tasks of the System Administrator
- system files
- editing
How to Edit Administrative Files in Trusted Extensions
How to Change Security Defaults in System Files
- Oracle Solaris /etc/default/print,
How to Enable Users to Print PostScript Files in Trusted Extensions
- Oracle Solaris policy.conf,
How to Enable Users to Print PostScript Files in Trusted Extensions
- Trusted Extensions sel_config,
sel_config File
- Trusted Extensions tsol_separator.ps,
How to Remove Page Labels From All Print Jobs