D
- DAC, See discretionary access control (DAC)
- databases
- devices,
Trusted CDE Actions
- in LDAP,
Using a Naming Service in Trusted Extensions
- trusted network,
Network Configuration Databases in Trusted Extensions
- datasets, See ZFS
- deallocate command,
Command Line Tools in Trusted Extensions
- deallocating, forcing,
How to Revoke or Reclaim a Device in Trusted Extensions
- debugging, See troubleshooting
- desktops
- accessing multilevel remotely,
How to Use Xvnc to Remotely Access a Trusted Extensions System
- logging in to a failsafe session,
How to Log In to a Failsafe Session in Trusted Extensions
- workspace color changes,
How to Enter the Global Zone in Trusted Extensions
- /dev/kmem kernel image file, security violation,
Evaluating Software for Security
- developer responsibilities,
Developer Responsibilities When Creating Trusted Programs
- device allocation
- authorizing,
How to Assign Device Authorizations
- overview,
Device Protection With Trusted Extensions Software
- preventing File Manager display,
How to Prevent the File Manager From Displaying After Device Allocation
- profiles that include allocation authorizations,
How to Assign Device Authorizations
- Device Allocation Manager
- administrative tool,
Administration Tools for Trusted Extensions
- description,
Device Allocation Manager GUI
- device-clean scripts
- adding to devices,
How to Add a Device_Clean Script in Trusted Extensions
- requirements,
Device-Clean Scripts
- device databases, action for editing,
Trusted CDE Actions
- Device Manager
- administrative tool,
Administration Tools for Trusted Extensions
- use by administrators,
How to Configure a Device in Trusted Extensions
- devices
- access policy,
Device Access Policies
- accessing
Device Allocation Manager GUI
Device Allocation Manager GUI
- adding customized authorizations,
How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- adding device_clean script,
How to Add a Device_Clean Script in Trusted Extensions
- administering,
Managing Devices for Trusted Extensions (Tasks)
- administering with Device Manager,
How to Configure a Device in Trusted Extensions
- allocating,
Device Protection With Trusted Extensions Software
- automatically starting an audio player,
How to Configure an Audio Player Program for Use in Trusted CDE
- configuring devices,
How to Configure a Device in Trusted Extensions
- configuring serial line,
How to Configure a Serial Line for Logins
- creating new authorizations,
How to Create New Device Authorizations
- in Trusted Extensions,
Devices in Trusted Extensions (Overview)
- policy defaults,
Device Access Policies
- preventing remote allocation of audio,
How to Protect Nonallocatable Devices in Trusted Extensions
- protecting,
Device Allocation Manager
- protecting nonallocatable,
How to Protect Nonallocatable Devices in Trusted Extensions
- reclaiming,
How to Revoke or Reclaim a Device in Trusted Extensions
- setting label range for nonallocatable,
Effects of Label Range on a Device
- setting policy,
Device Access Policies
- setting up audio,
How to Configure an Audio Player Program for Use in Trusted CDE
- troubleshooting,
How to Revoke or Reclaim a Device in Trusted Extensions
- using,
Using Devices in Trusted Extensions (Task Map)
- dfstab file
- action for editing,
Trusted CDE Actions
- for public zone,
Access to NFS Mounted Directories in Trusted Extensions
- differences
- administrative interfaces in Trusted Extensions,
Administrative Interfaces in Trusted Extensions
- between Trusted Extensions and Oracle Solaris auditing,
Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS,
Differences Between Trusted Extensions and the Oracle Solaris OS
- defaults in Trusted Extensions,
Tighter Security Defaults in Trusted Extensions
- extending Oracle Solaris interfaces,
Oracle Solaris Interfaces Extended by Trusted Extensions
- limited options in Trusted Extensions,
Limited Options in Trusted Extensions
- directories
- accessing lower-level,
Zones in Trusted Extensions
- authorizing a user or role to change label of,
How to Enable a User to Change the Security Level of Data
- mounting,
How to Share Directories From a Labeled Zone
- sharing,
How to Share Directories From a Labeled Zone
- discretionary access control (DAC),
Trusted Extensions and Access Control
- diskettes, accessing,
Device Protection With Trusted Extensions Software
- displaying
- labels of file systems in labeled zone,
How to Display the Labels of Mounted Files
- status of every zone,
How to Display Ready or Running Zones
- DOI, remote host templates,
Network Security Attributes in Trusted Extensions
- dominance of labels,
Dominance Relationships Between Labels
- Downgrade DragNDrop or CutPaste Info authorization,
How to Create a Rights Profile for Convenient Authorizations
- Downgrade File Label authorization,
How to Create a Rights Profile for Convenient Authorizations
- downgrading labels, configuring rules for selection confirmer,
sel_config File
- DragNDrop or CutPaste without viewing contents authorization,
How to Create a Rights Profile for Convenient Authorizations
- dtappsession command,
Command Line Tools in Trusted Extensions
- dtsession command, running updatehome,
.copy_files and .link_files Files
- dtterm terminal, forcing the sourcing of .profile,
How to Configure Startup Files for Users in Trusted Extensions
- dtwm command,
Trusted Processes in the Window System