JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Administrator's Procedures     Oracle Solaris 10 1/13 Information Library
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

Trusted Extensions Software and the Oracle Solaris OS

Similarities Between Trusted Extensions and the Oracle Solaris OS

Differences Between Trusted Extensions and the Oracle Solaris OS

Multiheaded Systems and the Trusted Extensions Desktop

Basic Concepts of Trusted Extensions

Trusted Extensions Protections

Trusted Extensions and Access Control

Roles and Trusted Extensions

Labels in Trusted Extensions Software

Dominance Relationships Between Labels

Administrative Labels

Label Encodings File

Label Ranges

Account Label Range

Session Range

What Labels Protect and Where Labels Appear

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

Trusted Extensions Software and the Oracle Solaris OS

Trusted Extensions software adds labels to a system that is running the Solaris Operating System (Oracle Solaris OS). Labels implement mandatory access control (MAC). MAC, along with discretionary access control (DAC), protects system subjects (processes) and objects (data). Trusted Extensions software provides interfaces to handle label configuration, label assignment, and label policy.

Similarities Between Trusted Extensions and the Oracle Solaris OS

Trusted Extensions software uses rights profiles, roles, auditing, privileges, and other security features of the Oracle Solaris OS. You can use Oracle Solaris Secure Shell (SSH), BART, the Oracle Solaris cryptographic framework, IPsec, and IP Filter with Trusted Extensions.

Differences Between Trusted Extensions and the Oracle Solaris OS

Trusted Extensions software extends the Oracle Solaris OS. The following list provides an overview. For a quick reference, see Appendix A, Quick Reference to Trusted Extensions Administration.

Multiheaded Systems and the Trusted Extensions Desktop

When the monitors of a multiheaded Trusted Extensions system are configured horizontally, the trusted stripe stretches across the monitors. When the monitors are configured vertically, the trusted stripe appears in the lowest monitor.

When different workspaces are displayed on the monitors of a multiheaded system, Trusted CDE and Trusted JDS render the trusted stripe differently.