Trusted Extensions Developer's Guide

Exit Print View

Updated: July 2014
 
 

Using This Documentation

  • Overview – Describes how to use the programming interfaces to write new trusted applications for systems that run the Trusted Extensions feature of Oracle Solaris.

  • Audience – Developers of secure, labeled programs. Note that the example programs in this book focus on the APIs being shown and do not perform error checking. Your applications should perform the appropriate error checking.

  • Required knowledge – UNIX programming skills and understanding of site security requirements.

Product Documentation Library

Late-breaking information and known issues for this product are included in the documentation library at http://www.oracle.com/pls/topic/lookup?ctx=E36784.

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Feedback

Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.