Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: November 2020
 
 

Index

A

access  Seeindex iconcomputer access
remote systemsindex iconRemote Administration in Trusted Extensions
access policy
Discretionary Access Control (DAC)
index iconDifferences Between Trusted Extensions and the Oracle Solaris OS
index iconTrusted Extensions and the Oracle Solaris OS
Mandatory Access Control (MAC)index iconDifferences Between Trusted Extensions and the Oracle Solaris OS
accessing
home directoriesindex iconZones in Trusted Extensions
labeled zones by usersindex iconHow to Enable Users to Log In to a Labeled Zone
printersindex iconLabels, Printers, and Printing
remote desktopindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
ZFS dataset mounted in lower-level zone from higher-level zoneindex iconSharing and Mounting a ZFS Dataset From Labeled Zones
account locking
preventing for users who can assume rolesindex iconHow to Prevent Account Locking for Users
account-policy SMF stencil
index iconHow to Modify policy.conf Defaults
index iconCustomizing the User Environment for Security
index iconSecurity Attributes That Must Be Assigned to Users
index iconpolicy.conf File Defaults in Trusted Extensions
index iconHow to Change Security Defaults in System Files
index iconApplications That Are Restricted to a Labeled Zone
accounts
  See Alsoindex iconroles
  See Alsoindex iconusers
creatingindex iconCreating Roles and Users in Trusted Extensions
planningindex iconPlanning User Security in Trusted Extensions
accreditation checksindex iconTrusted Extensions Accreditation Checks
accreditation ranges
label_encodings fileindex iconLabel Encodings File
adding
IPsec protectionsindex iconHow to Apply IPsec Protections in a Multilevel Trusted Extensions Network
LDAP role with roleaddindex iconCreating the Security Administrator Role in LDAP
local role with roleaddindex iconHow to Create the Security Administrator Role in Trusted Extensions
local user with useraddindex iconUsing the useradd Command to Create a Local User
multilevel datasetindex iconHow to Create and Share a Multilevel Dataset
network databases to LDAP serverindex iconPopulate the LDAP Server With Trusted Extensions Data
nscd daemon to every labeled zoneindex iconHow to Configure a Separate Name Service for Each Labeled Zone
remote host templatesindex iconCreating Security Templates
remote hostsindex iconHow to Connect a Trusted Extensions System to Other Trusted Extensions Systems
rolesindex iconCreating Roles and Users in Trusted Extensions
secondary zonesindex iconHow to Create a Secondary Labeled Zone
shared network interfacesindex iconHow to Share a Single IP Address With All Zones
Trusted Extensions packagesindex iconAdd Trusted Extensions Packages to an Oracle Solaris System
users who can assume rolesindex iconHow to Create Users Who Can Assume Roles in Trusted Extensions
VNIC interfacesindex iconHow to Add a Virtual Network Interface to a Labeled Zone
zone-specific nscd daemonindex iconHow to Configure a Separate Name Service for Each Labeled Zone
Additional Trusted Extensions Configuration Tasksindex iconAdditional Trusted Extensions Configuration Tasks
ADMIN_HIGH label
body page labels andindex iconHow to Configure a Zone as a Single-Level Print Server
global zone processes and zonesindex iconGlobal Zone Processes and Labeled Zones
mlslabel andindex iconmlslabel Property and Mounting Single-Level File Systems
multilevel datasets andindex iconNo Privilege Overrides for MAC Read-Write Policy
NFS-mounted files in global zoneindex iconTrusted Extensions Policy for Single-Level Datasets
no localizationindex iconFor International Customers of Trusted Extensions
role clearanceindex iconHow to Create a System Administrator Role
roles andindex iconRole Creation in Trusted Extensions
top administrative labelindex iconAdministrative Labels
ADMIN_LOW label
limitations on unlabeled system mountsindex iconSharing and Mounting Files in the Global Zone
lowest labelindex iconAdministrative Labels
mounting files andindex iconSharing and Mounting Files in the Global Zone
administering
account lockingindex iconHow to Prevent Account Locking for Users
auditing in Trusted Extensionsindex iconAuditing in Trusted Extensions
changing label of informationindex iconHow to Enable a User to Change the Security Level of Data
convenient authorizations for usersindex iconHow to Create a Rights Profile for Convenient Authorizations
file systems
mountingindex iconHow to NFS Mount Files in a Labeled Zone
overviewindex iconTrusted Extensions Policies for Mounted File Systems
troubleshootingindex iconHow to Troubleshoot Mount Failures in Trusted Extensions
files
backing up with labelsindex iconHow to Back Up Files in Trusted Extensions
restoring with labelsindex iconHow to Restore Files in Trusted Extensions
labeled IPsecindex iconConfiguring Labeled IPsec
labeled printingindex iconManaging Labeled Printing
LDAPindex iconConfiguring LDAP for Trusted Extensions
mailindex iconAbout Multilevel Mail in Trusted Extensions
multilevel datasetsindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
multilevel portsindex iconDisplaying Multilevel Ports on a System
printingindex iconManaging Printing in Trusted Extensions
quick reference for administratorsindex iconQuick Reference to Trusted Extensions Administration
remote host templatesindex iconCreating Security Templates
remotelyindex iconRemote Administration in Trusted Extensions
routes with security attributesindex iconHow to Add Default Routes
security templates
index iconHow to Add a Range of Hosts to a Security Template
index iconHow to Add a Host to a Security Template
sharing file systemsindex iconHow to Share File Systems From a Labeled Zone
startup files for usersindex iconHow to Configure Startup Files for Users in Trusted Extensions
system filesindex iconHow to Change Security Defaults in System Files
third-party softwareindex iconSoftware Management in Trusted Extensions
trusted networkindex iconManaging Networks in Trusted Extensions
unlabeled printingindex iconReducing Printing Restrictions in Trusted Extensions
user privilegesindex iconHow to Restrict a User's Set of Privileges
users
index iconManaging Users and Rights
index iconManaging Users, Rights, and Roles in Trusted Extensions
index iconDecisions to Make Before Creating Users in Trusted Extensions
zonesindex iconManaging Zones
zones by using txzonemgrindex iconZone Administration Utilities in Trusted Extensions
administrative labelsindex iconAdministrative Labels
administrative roles  Seeindex iconroles
administrative tools
commandsindex iconCommand Line Tools in Trusted Extensions
configuration filesindex iconConfiguration Files in Trusted Extensions
descriptionindex iconTrusted Extensions Administration Tools
Labeled Zone Managerindex icontxzonemgr Script
txzonemgr scriptindex icontxzonemgr Script
all-zones address
index iconOracle Solaris Man Pages That Are Modified by Trusted Extensions
index iconHow to Configure a Multilevel Print Server and Its Printers
index iconNetwork Commands in Trusted Extensions
index iconZones and IP Addresses in Trusted Extensions
index iconConfiguring the Network Interfaces in Trusted Extensions Task Map
index iconAccess to Labeled Zones
Allocate Device authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
application security labelindex iconLabels for IPsec-Protected Exchanges
applications
enabling initial network contact between client and serverindex iconMaking the Host Address 0.0.0.0/32 a Valid Initial Address
evaluating for securityindex iconSecurity Administrator Responsibilities for Trusted Programs
trusted and trustworthyindex iconEvaluating Software for Security
ARMOR roles
index iconCreating Roles and Users in Trusted Extensions Task Map
index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
assigning
privileges to usersindex iconSecurity Attribute Assignment to Users in Trusted Extensions
rights profilesindex iconSecurity Attribute Assignment to Users in Trusted Extensions
atohexlabel commandindex iconHow to Obtain the Hexadecimal Equivalent for a Label
auditing in Trusted Extensions
differences from Oracle Solaris auditingindex iconTrusted Extensions and Auditing
planningindex iconPlanning for Auditing in Trusted Extensions
referenceindex iconTrusted Extensions and Auditing
roles for administeringindex iconAuditing in Trusted Extensions
authorizations
assigningindex iconSecurity Attribute Assignment to Users in Trusted Extensions
authorizing a user or role to change labelindex iconHow to Enable a User to Change the Security Level of Data
convenient for usersindex iconHow to Create a Rights Profile for Convenient Authorizations
grantedindex iconTrusted Extensions and Access Control
authorizing
unlabeled printingindex iconReducing Printing Restrictions in Trusted Extensions

B

backing up
previous system before installationindex iconBacking Up the System Before Enabling Trusted Extensions
banner pages
description of labeledindex iconLabeled Banner and Trailer Pages
difference from trailer pageindex iconDifferences on a Trailer Page
removing labelsindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output
typicalindex iconTypical Banner Page of a Labeled Print Job
body pages
ADMIN_HIGH label onindex iconHow to Configure a Zone as a Single-Level Print Server
description of labeledindex iconLabeled Body Pages
unlabeledindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output

C

.copy_files file
setting up for usersindex iconCustomizing Startup Files for Users
.copy_files file
setting up for usersindex iconHow to Configure Startup Files for Users in Trusted Extensions
.copy_files file
descriptionindex icon.copy_files and .link_files Files
changing
IDLETIME keywordindex iconChanging the System's Idle Settings
labels by authorized usersindex iconHow to Enable a User to Change the Security Level of Data
security level of dataindex iconHow to Enable a User to Change the Security Level of Data
system security defaultsindex iconHow to Change Security Defaults in System Files
user privilegesindex iconHow to Restrict a User's Set of Privileges
checking
label_encodings fileindex iconHow to Check and Install Your Label Encodings File
roles are workingindex iconHow to Verify That the Trusted Extensions Roles Work
checklists for initial setup teamindex iconChecklist for Configuring Trusted Extensions
chk_encodings commandindex iconChecking label_encodings Syntax on the Command Line
choosing  Seeindex iconselecting
classification label componentindex iconDominance Relationships Between Labels
clearances
label overviewindex iconLabels in Trusted Extensions Software
commands
troubleshooting networkingindex iconHow to Debug the Trusted Extensions Network
commercial applications
evaluatingindex iconSecurity Administrator Responsibilities for Trusted Programs
Common Tasks in Trusted Extensions (Task Map)index iconPerforming Common Tasks in Trusted Extensions
compartment label componentindex iconDominance Relationships Between Labels
component definitions
label_encodings fileindex iconLabel Encodings File
configuring
access to remote Trusted Extensionsindex iconRemote Administration in Trusted Extensions
by assuming a limited role or as rootindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
labeled printingindex iconConfiguring Labeled Printing
LDAP for Trusted Extensionsindex iconConfiguring LDAP on a Trusted Extensions System
LDAP proxy server for Trusted Extensions clientsindex iconConfiguring a Trusted Extensions LDAP Proxy Server
network interfaces
index iconHow to Connect a Trusted Extensions System to Other Trusted Extensions Systems
index iconHow to Share a Single IP Address With All Zones
routes with security attributesindex iconHow to Add Default Routes
startup files for usersindex iconHow to Configure Startup Files for Users in Trusted Extensions
Trusted Extensionsindex iconConfiguring Trusted Extensions
Trusted Extensions labeled zonesindex iconCreating Labeled Zones
trusted networkindex iconManaging Networks in Trusted Extensions
VNICsindex iconHow to Add a Virtual Network Interface to a Labeled Zone
Configuring Labeled IPsec (Task Map)index iconConfiguring Labeled IPsec
Configuring Labeled Printing (Task Map)index iconConfiguring Labeled Printing
configuring Trusted Extensions
checklist for initial setup teamindex iconChecklist for Configuring Trusted Extensions
initial proceduresindex iconConfiguring Trusted Extensions
kernel zonesindex iconCreating Labeled Zones
labeled zonesindex iconCreating Labeled Zones
remote accessindex iconRemote Administration in Trusted Extensions
task mapsindex iconConfiguration Roadmap for Trusted Extensions
controlling  Seeindex iconrestricting
creating
accountsindex iconCreating Roles and Users in Trusted Extensions
accounts during or after configurationindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
home directories
index iconHome Directory Creation in Trusted Extensions
index iconCreating Centralized Home Directories in Trusted Extensions
home directory serverindex iconHow to Create the Home Directory Server in Trusted Extensions
kernel zonesindex iconCreating Labeled Zones
labeled zonesindex iconCreating Labeled Zones
LDAP clientindex iconMake the Global Zone an LDAP Client in Trusted Extensions
LDAP proxy server for Trusted Extensions clientsindex iconConfiguring a Trusted Extensions LDAP Proxy Server
LDAP role with roleaddindex iconCreating the Security Administrator Role in LDAP
local role with roleaddindex iconHow to Create the Security Administrator Role in Trusted Extensions
local user with useraddindex iconUsing the useradd Command to Create a Local User
rolesindex iconCreating Roles and Users in Trusted Extensions
users who can assume rolesindex iconHow to Create Users Who Can Assume Roles in Trusted Extensions
zonesindex iconCreating Labeled Zones
Creating Labeled Zonesindex iconCreating Labeled Zones
customizing
label_encodings fileindex iconLabel Encodings File
unlabeled printingindex iconReducing Printing Restrictions in Trusted Extensions
user accountsindex iconCustomizing the User Environment for Security
Customizing User Environment for Security (Task Map)index iconCustomizing the User Environment for Security
cut and paste
and labelsindex iconRules When Changing the Level of Security for Data

D

/dev/kmem kernel image file
security violationindex iconEvaluating Software for Security
DAC  Seeindex icondiscretionary access control (DAC)
data
relabeling efficientlyindex iconHow to Create and Share a Multilevel Dataset
database schema
LDAP and Trusted Extensions, forindex iconTrusted Extensions Database Schema for LDAP
databases
in LDAP from Trusted Extensionsindex iconUsing the LDAP Naming Service in Trusted Extensions
trusted networkindex iconNetwork Configuration Databases in Trusted Extensions
datasets  Seeindex iconZFS
debugging  Seeindex icontroubleshooting
deciding
to configure by assuming a limited role or as rootindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
to use an Oracle-supplied encodings fileindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
decisions to make
based on site security policyindex iconSite Security Policy for Trusted Extensions
before enabling Trusted Extensionsindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
deleting
labeled zonesindex iconHow to Remove Trusted Extensions From the System
developer responsibilitiesindex iconDeveloper Responsibilities When Creating Trusted Programs
differences
administrative interfaces in Trusted Extensionsindex iconAdministrative Interfaces in Trusted Extensions
between Trusted Extensions and Oracle Solaris auditingindex iconTrusted Extensions and Auditing
between Trusted Extensions and Oracle Solaris OSindex iconDifferences Between Trusted Extensions and the Oracle Solaris OS
defaults in Trusted Extensionsindex iconTighter Security Defaults in Trusted Extensions
extending Oracle Solaris interfacesindex iconOracle Solaris Interfaces Extended by Trusted Extensions
limited options in Trusted Extensionsindex iconLimited Options in Trusted Extensions
directories
accessing lower-levelindex iconZones in Trusted Extensions
authorizing a user or role to change label ofindex iconHow to Enable a User to Change the Security Level of Data
for naming service setupindex iconPopulate the LDAP Server With Trusted Extensions Data
mountingindex iconHow to Share File Systems From a Labeled Zone
sharingindex iconHow to Share File Systems From a Labeled Zone
disabling
Trusted Extensionsindex iconHow to Remove Trusted Extensions From the System
discretionary access control (DAC)index iconTrusted Extensions and Access Control
displaying
labels of file systems in labeled zoneindex iconDisplaying the Labels of File Systems in the restricted Zone
status of every zoneindex iconHow to Display Ready or Running Zones
DOI
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
domain of interpretation (DOI)
modifyingindex iconHow to Configure a Different Domain of Interpretation
dominance of labelsindex iconDominance Relationships Between Labels
Downgrade File Label authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations

E

/etc/default/kbd file
how to editindex iconHow to Change Security Defaults in System Files
/etc/default/login file
how to editindex iconHow to Change Security Defaults in System Files
/etc/default/passwd file
how to editindex iconHow to Change Security Defaults in System Files
/etc/hosts fileindex iconHow to Add Hosts to the System's Known Network
/etc/security/policy.conf file
modifyingindex iconHow to Modify policy.conf Defaults
/etc/security/policy.conf file
defaultsindex iconpolicy.conf File Defaults in Trusted Extensions
how to editindex iconHow to Change Security Defaults in System Files
/etc/security/tsol/label_encodings fileindex iconLabel Encodings File
/etc/system file
modifying for IPv6 CIPSO networkindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
editing system filesindex iconHow to Change Security Defaults in System Files
enabling
DOI different from 1index iconHow to Configure a Different Domain of Interpretation
IPv6 CIPSO networkindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
keyboard shutdownindex iconHow to Change Security Defaults in System Files
labeld serviceindex iconInstalling and Enabling Trusted Extensions
login to labeled zoneindex iconHow to Enable Users to Log In to a Labeled Zone
Trusted Extensions featureindex iconInstalling and Enabling Trusted Extensions
enabling Trusted Extensions
/usr/sbin/labeladmindex iconTrusted Extensions Administrative Tools
encodings file  Seeindex iconlabel_encodings file
evaluating programs for securityindex iconEvaluating Software for Security
exporting  Seeindex iconsharing

F

fallback mechanism
in security templatesindex iconTrusted Network Fallback Mechanism
file systems
mounting in global and labeled zonesindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
NFS mountsindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
sharingindex iconTrusted Extensions Policies for Mounted File Systems
sharing in global and labeled zonesindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
files
.copy_files
index iconHow to Configure Startup Files for Users in Trusted Extensions
index icon.copy_files and .link_files Files
.link_files
index iconHow to Configure Startup Files for Users in Trusted Extensions
index icon.copy_files and .link_files Files
/etc/default/kbdindex iconHow to Change Security Defaults in System Files
/etc/default/loginindex iconHow to Change Security Defaults in System Files
/etc/default/passwdindex iconHow to Change Security Defaults in System Files
/etc/security/policy.conf
index iconHow to Modify policy.conf Defaults
index iconpolicy.conf File Defaults in Trusted Extensions
/etc/security/tsol/label_encodings fileindex iconLabel Encodings File
/usr/lib/cups/filter/tsol_separator.psindex iconLabeled Printer Output
/usr/sbin/txzonemgr
index iconZone Administration Utilities in Trusted Extensions
index iconTrusted Extensions Administrative Tools
accessing from dominating labelsindex iconHow to Display the Labels of Mounted Files
authorizing a user or role to change label ofindex iconHow to Enable a User to Change the Security Level of Data
backing up with labelsindex iconHow to Back Up Files in Trusted Extensions
getmountsindex iconHow to Display the Labels of Mounted Files
loopback mountingindex iconHow to Loopback Mount a File That Is Usually Not Visible in a Labeled Zone
policy.confindex iconHow to Change Security Defaults in System Files
preventing access from dominating labelsindex iconHow to Disable the Mounting of Lower-Level Files
relabeling privilegesindex iconHow to Enable Files to Be Relabeled From a Labeled Zone
restoring with labelsindex iconHow to Restore Files in Trusted Extensions
startupindex iconHow to Configure Startup Files for Users in Trusted Extensions
files and file systems
mountingindex iconHow to Share File Systems From a Labeled Zone
namingindex iconHow to Share File Systems From a Labeled Zone
sharingindex iconHow to Share File Systems From a Labeled Zone
finding
label equivalent in hexadecimalindex iconHow to Obtain the Hexadecimal Equivalent for a Label
label equivalent in text formatindex iconHow to Obtain a Readable Label From Its Hexadecimal Form

G

gateways
accreditation checksindex iconGateway Accreditation Checks
example ofindex iconGateways in Trusted Extensions
gdm
accessing multilevel remotelyindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
getmounts scriptindex iconHow to Display the Labels of Mounted Files
global zone
difference from labeled zonesindex iconZones in Trusted Extensions

H

hardware planningindex iconPlanning System Hardware and Capacity for Trusted Extensions
hextoalabel commandindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
home directories
accessingindex iconZones in Trusted Extensions
creating
index iconHome Directory Creation in Trusted Extensions
index iconCreating Centralized Home Directories in Trusted Extensions
creating server forindex iconHow to Create the Home Directory Server in Trusted Extensions
logging in and getting
index iconHow to Enable Users to Access Their Remote Home Directories by Configuring the Automounter on Each Server
index iconHow to Enable Users to Access Their Remote Home Directories at Every Label by Logging In to Each NFS Server
host types
networking
index iconHost Type and Template Name in Security Templates
index iconTrusted Extensions Data Packets
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
table of templates and protocolsindex iconHost Type and Template Name in Security Templates
hosts
adding to /etc/hosts fileindex iconHow to Add Hosts to the System's Known Network
adding to security template
index iconHow to Add a Range of Hosts to a Security Template
index iconHow to Add a Host to a Security Template
assigning a templateindex iconAdding Hosts to Security Templates
networking conceptsindex iconTrusted Network Communications

I

IDLECMD keyword
changing defaultindex iconChanging the System's Idle Settings
IDLETIME keyword
changing defaultindex iconChanging the System's Idle Settings
IKE
labels in tunnel modeindex iconLabels and Accreditation in Tunnel Mode IPsec
immutable zones
Trusted Extensions andindex iconCreating Labeled Zones
importing
softwareindex iconAdding Software to Trusted Extensions
initial setup team
checklist for configuring Trusted Extensionsindex iconChecklist for Configuring Trusted Extensions
inner labelindex iconLabels for IPsec-Protected Exchanges
installing
label_encodings file
index iconHow to Check and Install Your Label Encodings File
index iconEnable Trusted Extensions
LDAP server on Trusted Extensionsindex iconConfiguring LDAP on a Trusted Extensions System
Oracle Solaris OS for Trusted Extensionsindex iconAdding the Trusted Extensions Feature to Oracle Solaris
interfaces
adding to security template
index iconHow to Add a Range of Hosts to a Security Template
index iconHow to Add a Host to a Security Template
verifying they are upindex iconHow to Verify That a System's Interfaces Are Up
internationalizing  Seeindex iconlocalizing
IP addresses
0.0.0.0 host addressindex iconTrusted Extensions Host Address and Fallback Mechanism Entries
fallback mechanism in trusted networkingindex iconTrusted Network Fallback Mechanism
ipadm commandindex iconNetwork Commands in Trusted Extensions
IPsec
label extensionsindex iconLabel Extensions for IPsec Security Associations
labels in tunnel modeindex iconLabels and Accreditation in Tunnel Mode IPsec
labels on trusted exchangesindex iconLabels for IPsec-Protected Exchanges
protections with label extensionsindex iconConfidentiality and Integrity Protections With Label Extensions
with Trusted Extensions labelsindex iconAdministration of Labeled IPsec
ipseckey commandindex iconNetwork Commands in Trusted Extensions
ipTnetHostindex iconTrusted Extensions Database Schema for LDAP
ipTnetNumberindex iconTrusted Extensions Database Schema for LDAP
ipTnetTemplateindex iconTrusted Extensions Database Schema for LDAP
ipTnetTemplateNameindex iconTrusted Extensions Database Schema for LDAP
IPv6
entry in /etc/system fileindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
troubleshootingindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions

K

kernel zones
Trusted Extensions andindex iconCreating Labeled Zones
keyboard shutdown
enablingindex iconHow to Change Security Defaults in System Files
kmem kernel image fileindex iconEvaluating Software for Security

L

.link_files file
setting up for usersindex iconHow to Configure Startup Files for Users in Trusted Extensions
.link_files file
descriptionindex icon.copy_files and .link_files Files
label extensions
IKE negotiationsindex iconLabel Extensions for IKE
IPsec SAsindex iconLabel Extensions for IPsec Security Associations
label ranges
restricting remote accessindex iconRemote Administration in Trusted Extensions
label_encodings file
checkingindex iconHow to Check and Install Your Label Encodings File
contentsindex iconLabel Encodings File
installing
index iconHow to Check and Install Your Label Encodings File
index iconEnable Trusted Extensions
localizingindex iconFor International Customers of Trusted Extensions
modifying
index iconHow to Check and Install Your Label Encodings File
index iconEnable Trusted Extensions
reference for labeled printingindex iconLabeled Printer Output
source of accreditation rangesindex iconLabel Encodings File
labeladm commandindex iconInstalling and Enabling Trusted Extensions
enabling Trusted Extensionsindex iconInstalling and Enabling Trusted Extensions
installing encodings file
index iconEnable Trusted Extensions
index iconEnable Trusted Extensions
removing Trusted Extensionsindex iconHow to Remove Trusted Extensions From the System
labeld service
disablingindex iconHow to Remove Trusted Extensions From the System
enablingindex iconInstalling and Enabling Trusted Extensions
labeled IPsec  Seeindex iconIPsec
labeled multicast packetsindex iconTrusted Extensions Multicast Packets
labeled printing
banner pagesindex iconLabeled Banner and Trailer Pages
body pagesindex iconLabeled Body Pages
removing labelindex iconHow to Create a Rights Profile for Convenient Authorizations
without banner pageindex iconHow to Create a Rights Profile for Convenient Authorizations
Labeled Zone Manager  Seeindex icontxzonemgr script
labeled zones  Seeindex iconzones
labeling
turning on labelsindex iconLog In to Trusted Extensions
zonesindex iconHow to Create Labeled Zones Interactively
Labeling Hosts and Networks (Tasks)index iconLabeling Hosts and Networks
labels  See Alsoindex iconlabel ranges
accreditation in tunnel modeindex iconLabels and Accreditation in Tunnel Mode IPsec
authorizing a user or role to change label of dataindex iconHow to Enable a User to Change the Security Level of Data
classification componentindex iconDominance Relationships Between Labels
compartment componentindex iconDominance Relationships Between Labels
default in remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
describedindex iconTrusted Extensions and Access Control
determining text equivalentsindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
displaying in hexadecimalindex iconHow to Obtain the Hexadecimal Equivalent for a Label
displaying labels of file systems in labeled zoneindex iconDisplaying the Labels of File Systems in the restricted Zone
dominanceindex iconDominance Relationships Between Labels
extensions for IKE SAsindex iconLabel Extensions for IKE
extensions for IPsec SAsindex iconLabel Extensions for IPsec Security Associations
of processesindex iconWhat Labels Protect and Where Labels Appear
of user processesindex iconSession Range
on IPsec exchangesindex iconLabels for IPsec-Protected Exchanges
on printoutsindex iconLabeled Printer Output
overviewindex iconLabels in Trusted Extensions Software
planningindex iconDevising a Label Strategy
printing without page labelsindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output
relationshipsindex iconDominance Relationships Between Labels
repairing in internal databasesindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
specifying for zonesindex iconHow to Create Labeled Zones Interactively
troubleshootingindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
well-formedindex iconLabel Ranges
laptops
planningindex iconPlanning for Multilevel Services
LDAP
naming service for Trusted Extensionsindex iconConfiguring LDAP for Trusted Extensions
planningindex iconPlanning for the LDAP Naming Service in Trusted Extensions
referencesindex iconQuick Reference for the LDAP Directory Service in Trusted Extensions
troubleshootingindex iconHow to Debug a Client's Connection to the LDAP Server
Trusted Extensions database schemaindex iconTrusted Extensions Database Schema for LDAP
Trusted Extensions databasesindex iconUsing the LDAP Naming Service in Trusted Extensions
LDAP configuration
creating clientindex iconMake the Global Zone an LDAP Client in Trusted Extensions
for Trusted Extensionsindex iconConfiguring LDAP on a Trusted Extensions System
NFS servers, andindex iconConfiguring LDAP on a Trusted Extensions System
LDAP server
configuring multilevel portindex iconConfigure a Multilevel Port for the LDAP Server
configuring proxy for Trusted Extensions clientsindex iconConfiguring a Trusted Extensions LDAP Proxy Server
creating proxy for Trusted Extensions clientsindex iconConfiguring a Trusted Extensions LDAP Proxy Server
limiting
defined hosts on the networkindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
localizing
configuring labeled printoutsindex icontsol_separator.ps Configuration File
LOFS
mounting datasets in Trusted Extensionsindex iconMount Possibilities in Trusted Extensions
logging in
to a home directory server
index iconHow to Enable Users to Access Their Remote Home Directories by Configuring the Automounter on Each Server
index iconHow to Enable Users to Access Their Remote Home Directories at Every Label by Logging In to Each NFS Server
using ssh commandindex iconHow to Log In and Administer a Remote Trusted Extensions System
login
by rolesindex iconRoles in Trusted Extensions
remoteindex iconEnable Remote Administration of a Remote Trusted Extensions System
logout
requiringindex iconChanging the System's Idle Settings

M

MAC  Seeindex iconmandatory access control (MAC)
mail
administeringindex iconAbout Multilevel Mail in Trusted Extensions
implementation in Trusted Extensionsindex iconTrusted Extensions Mail Features
multilevelindex iconMultilevel Mail Service
man pages
quick reference for Trusted Extensions administratorsindex iconList of Trusted Extensions Man Pages
managing  Seeindex iconadministering
Managing Printing in Trusted Extensions (Task Map)index iconManaging Printing in Trusted Extensions
Managing Users and Rights (Task Map)index iconManaging Users and Rights
Managing Zones (Task Map)index iconManaging Zones
mandatory access control (MAC)
enforcing on the networkindex iconAbout the Trusted Network
in Trusted Extensionsindex iconTrusted Extensions and Access Control
maximum labels
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
minimum labels
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
MLPs  Seeindex iconmultilevel ports (MLPs)
mlslabel property
ADMIN_HIGH label andindex iconmlslabel Property and Mounting Single-Level File Systems
modifying
label_encodings fileindex iconHow to Check and Install Your Label Encodings File
mounting
file systemsindex iconHow to Share File Systems From a Labeled Zone
files by loopback mountingindex iconHow to Loopback Mount a File That Is Usually Not Visible in a Labeled Zone
overviewindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
troubleshootingindex iconHow to Troubleshoot Mount Failures in Trusted Extensions
ZFS dataset on labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
mounting datasets in Trusted Extensionsindex iconMount Possibilities in Trusted Extensions
multicast packetsindex iconTrusted Extensions Multicast Packets
multilevel datasets
creatingindex iconHow to Create and Share a Multilevel Dataset
overviewindex iconMultilevel Datasets for Relabeling Files
multilevel mounts
NFS protocol versionsindex iconTrusted Extensions Software and NFS Protocol Versions
multilevel ports (MLPs)
administeringindex iconDisplaying Multilevel Ports on a System
example of NFSv3 MLPindex iconConfiguring a Private Multilevel Port for NFSv3 Over udp
example of web proxy MLPindex iconHow to Create a Multilevel Port for a Zone
multilevel printing
accessing by print clientindex iconHow to Enable a Trusted Extensions Client to Access a Printer
configuring
index iconHow to Configure a Network Printer
index iconHow to Configure a Multilevel Print Server and Its Printers
multilevel server
planningindex iconPlanning for Multilevel Services

N

name service cache daemon  Seeindex iconnscd daemon
names
specifying for zonesindex iconHow to Create Labeled Zones Interactively
names of file systemsindex iconHow to Share File Systems From a Labeled Zone
naming
zonesindex iconHow to Create Labeled Zones Interactively
naming services
databases unique to Trusted Extensionsindex iconUsing the LDAP Naming Service in Trusted Extensions
LDAPindex iconConfiguring LDAP for Trusted Extensions
net_mac_aware privilegeindex iconHow to Disable the Mounting of Lower-Level Files
netstat command
index iconHow to Debug the Trusted Extensions Network
index iconNetwork Commands in Trusted Extensions
network
  Seeindex icontrusted network
  Seeindex iconTrusted Extensions network
network databases
descriptionindex iconNetwork Configuration Databases in Trusted Extensions
in LDAPindex iconConfiguring LDAP for Trusted Extensions
network packetsindex iconTrusted Extensions Data Packets
networking conceptsindex iconTrusted Network Communications
NFS
mounting datasets in Trusted Extensionsindex iconMount Possibilities in Trusted Extensions
NFS mounts
accessing lower-level directoriesindex iconNFS Server and Client Configuration in Trusted Extensions
in global and labeled zonesindex iconResults of Sharing and Mounting File Systems in Trusted Extensions
NFS servers
LDAP servers, andindex iconConfiguring LDAP on a Trusted Extensions System
nscd daemon
adding to every labeled zoneindex iconHow to Configure a Separate Name Service for Each Labeled Zone

O

Oracle Solaris OS
differences from Trusted Extensionsindex iconDifferences Between Trusted Extensions and the Oracle Solaris OS
differences from Trusted Extensions auditingindex iconTrusted Extensions and Auditing
similarities with Trusted Extensionsindex iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
similarities with Trusted Extensions auditingindex iconTrusted Extensions and Auditing

P

packages
Trusted Extensions featureindex iconAdd Trusted Extensions Packages to an Oracle Solaris System
passwords
assigningindex iconSecurity Attribute Assignment to Users in Trusted Extensions
changing in labeled zoneindex iconHow to Enforce a New Local User Password in a Labeled Zone
planning  See Alsoindex iconTrusted Extensions use
account creationindex iconPlanning User Security in Trusted Extensions
administration strategyindex iconPlanning Who Will Configure Trusted Extensions
auditingindex iconPlanning for Auditing in Trusted Extensions
hardwareindex iconPlanning System Hardware and Capacity for Trusted Extensions
labelsindex iconDevising a Label Strategy
laptop configurationindex iconPlanning for Multilevel Services
LDAP naming serviceindex iconPlanning for the LDAP Naming Service in Trusted Extensions
networkindex iconPlanning Your Trusted Network
Trusted Extensionsindex iconPlanning for Security in Trusted Extensions
Trusted Extensions configuration strategyindex iconForming an Install Team for Trusted Extensions
zonesindex iconPlanning Your Labeled Zones in Trusted Extensions
policy.conf file
changing defaultsindex iconHow to Change Security Defaults in System Files
changing Trusted Extensions keywordsindex iconChanging the System's Idle Settings
defaultsindex iconpolicy.conf File Defaults in Trusted Extensions
how to editindex iconHow to Modify policy.conf Defaults
preventing  Seeindex iconprotecting
Print without Banner authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
Print without Label authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
printed output  Seeindex iconprinting
printer output  Seeindex iconprinting
printing
and label_encodings fileindex iconLabel Encodings File
authorizationsindex iconTrusted Extensions Print Interfaces (Reference)
authorizations for unlabeled output from a public systemindex iconAssigning Printing-Related Authorizations to All Users of a System
configuring for multilevel labeled output
index iconHow to Configure a Network Printer
index iconHow to Configure a Multilevel Print Server and Its Printers
configuring for print clientindex iconHow to Enable a Trusted Extensions Client to Access a Printer
configuring labeled zoneindex iconHow to Configure a Zone as a Single-Level Print Server
configuring labels and textindex icontsol_separator.ps Configuration File
configuring public print jobsindex iconSending Public Print Jobs to an Unlabeled Printer
in local languageindex icontsol_separator.ps Configuration File
internationalizing labeled outputindex icontsol_separator.ps Configuration File
labeling an Oracle Solaris print serverindex iconHow to Assign a Label to an Unlabeled Print Server
localizing labeled outputindex icontsol_separator.ps Configuration File
managingindex iconLabels, Printers, and Printing
PostScriptindex iconPostScript Printing of Security Information
preventing labels on outputindex iconHow to Remove Banner and Trailer Pages
public jobs from an Oracle Solaris print serverindex iconSending Public Print Jobs to an Unlabeled Printer
using an Oracle Solaris print serverindex iconHow to Assign a Label to an Unlabeled Print Server
without labeled banners and trailersindex iconHow to Create a Rights Profile for Convenient Authorizations
without page labels
index iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output
index iconHow to Create a Rights Profile for Convenient Authorizations
printouts  Seeindex iconprinting
privileges
changing defaults for usersindex iconSecurity Attribute Assignment to Users in Trusted Extensions
non-obvious reasons for requiringindex iconEvaluating Software for Security
removing proc_info from basic setindex iconModifying Every User's Basic Privilege Set
restricting users'index iconHow to Restrict a User's Set of Privileges
proc_info privilege
removing from basic setindex iconModifying Every User's Basic Privilege Set
procedures  Seeindex icontasks and task maps
processes
labels ofindex iconWhat Labels Protect and Where Labels Appear
labels of user processesindex iconSession Range
preventing users from seeing others' processesindex iconModifying Every User's Basic Privilege Set
profiles  Seeindex iconrights profiles
programs  Seeindex iconapplications
protecting
file systems by using non-proprietary namesindex iconHow to Share File Systems From a Labeled Zone
files at lower labels from being accessedindex iconHow to Disable the Mounting of Lower-Level Files
information with labelsindex iconWhat Labels Protect and Where Labels Appear
labeled hosts from access by arbitrary hostsindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network

R

real UID of root
required for applicationsindex iconEvaluating Software for Security
rebooting
activating labelsindex iconLog In to Trusted Extensions
enabling login to labeled zoneindex iconHow to Enable Users to Log In to a Labeled Zone
Reducing Printing Restrictions in Trusted Extensions (Task Map)index iconReducing Printing Restrictions in Trusted Extensions
regular users  Seeindex iconusers
relabeling data
eliminating IOindex iconHow to Create and Share a Multilevel Dataset
relabeling informationindex iconHow to Enable a User to Change the Security Level of Data
remote administration
defaultsindex iconRemote Administration in Trusted Extensions
methodsindex iconMethods for Administering Remote Systems in Trusted Extensions
remote desktop
accessingindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
remote host templates
0.0.0.0/0 wildcard assignmentindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
adding systems to
index iconHow to Add a Range of Hosts to a Security Template
index iconHow to Add a Host to a Security Template
assigningindex iconAdding Hosts to Security Templates
creatingindex iconCreating Security Templates
entry for Sun Ray serversindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
remote hosts
using fallback mechanism in tnrhdbindex iconTrusted Network Fallback Mechanism
Remote Login authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
remote systems
configuring for role assumptionindex iconEnable Remote Administration of a Remote Trusted Extensions System
removing
labels on printoutsindex iconHow to Remove Banner and Trailer Pages
zone-specific nscd daemonindex iconRemoving a Name Service Cache From Each Labeled Zone
removing Trusted Extensions  Seeindex icondisabling
repairing
labels in internal databasesindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
restricting
access to lower-level filesindex iconHow to Disable the Mounting of Lower-Level Files
access to printers with labels
index iconRestricting Access to Printers and Print Job Information in Trusted Extensions
index iconDifferences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11.4
mounts of lower-level filesindex iconHow to Disable the Mounting of Lower-Level Files
printer access with labels
index iconRestricting Access to Printers and Print Job Information in Trusted Extensions
index iconDifferences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11.4
remote accessindex iconRemote Administration in Trusted Extensions
rights  Seeindex iconrights profiles
rights profiles
assigningindex iconSecurity Attribute Assignment to Users in Trusted Extensions
Convenient Authorizationsindex iconHow to Create a Rights Profile for Convenient Authorizations
roadmaps
Task Map: Choosing a Trusted Extensions Configurationindex iconTask Map: Choosing a Trusted Extensions Configuration
Task Map: Configuring Trusted Extensions to Your Site's Requirementsindex iconTask Map: Configuring Trusted Extensions to Meet Your Site's Requirements
Task Map: Configuring Trusted Extensions With the Provided Defaultsindex iconTask Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Preparing For and Enabling Trusted Extensionsindex iconTask Map: Preparing for and Enabling Trusted Extensions
role workspace
global zoneindex iconRoles in Trusted Extensions
roleadd commandindex iconHow to Create the Security Administrator Role in Trusted Extensions
roles
adding LDAP role with roleaddindex iconCreating the Security Administrator Role in LDAP
adding local role with roleaddindex iconHow to Create the Security Administrator Role in Trusted Extensions
administering auditingindex iconAuditing in Trusted Extensions
assigning rightsindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assumingindex iconRoles in Trusted Extensions
creatingindex iconRole Creation in Trusted Extensions
creating Security Administratorindex iconHow to Create the Security Administrator Role in Trusted Extensions
deciding if ARMORindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
determining when to createindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
verifying they workindex iconHow to Verify That the Trusted Extensions Roles Work
workspacesindex iconRoles in Trusted Extensions
root UID
required for applicationsindex iconEvaluating Software for Security
route commandindex iconNetwork Commands in Trusted Extensions
routingindex iconAbout Routing in Trusted Extensions
accreditation checksindex iconTrusted Extensions Accreditation Checks
commands in Trusted Extensionsindex iconRouting Commands in Trusted Extensions
conceptsindex iconAdministration of Routing in Trusted Extensions
example ofindex iconGateways in Trusted Extensions
tables
index iconChoosing Routers in Trusted Extensions
index iconRouting Table Entries in Trusted Extensions
using route commandindex iconHow to Add Default Routes

S

scripts
/usr/bin/txzonemgrindex iconHow to Display Ready or Running Zones
/usr/sbin/txzonemgr
index iconZone Administration Utilities in Trusted Extensions
index iconTrusted Extensions Administrative Tools
getmountsindex iconHow to Display the Labels of Mounted Files
security
initial setup teamindex iconInitial Setup Team Responsibilities
site security policy at a labeled siteindex iconSite Security Policy for Trusted Extensions
Security Administrator role
administering printer securityindex iconLabels, Printers, and Printing
administering usersindex iconManaging Users and Rights
assigning authorizations to usersindex iconHow to Create a Rights Profile for Convenient Authorizations
creatingindex iconHow to Create the Security Administrator Role in Trusted Extensions
creating Convenient Authorizations rights profileindex iconHow to Create a Rights Profile for Convenient Authorizations
enabling unlabeled body pages from a public systemindex iconAssigning Printing-Related Authorizations to All Users of a System
security administrators  Seeindex iconSecurity Administrator role
security attributesindex iconRouting Table Entries in Trusted Extensions
modifying defaults for all usersindex iconHow to Modify policy.conf Defaults
modifying user defaultsindex iconHow to Modify Default User Label Attributes
setting for remote hostsindex iconCreating Security Templates
using in routingindex iconHow to Add Default Routes
security information
on printoutsindex iconLabeled Printer Output
planning for Trusted Extensionsindex iconResolving Additional Issues Before Enabling Trusted Extensions
security label set
remote host templatesindex iconNetwork Security Attributes in Trusted Extensions
security mechanisms
extensibleindex iconExtension of Oracle Solaris Security Features by Trusted Extensions
Oracle Solarisindex iconSecurity Mechanisms for Oracle Solaris Software
security templates  Seeindex iconremote host templates
session rangeindex iconSession Range
Setting Up Remote Administration in Trusted Extensions (Task Map)index iconConfiguring and Administering Remote Systems in Trusted Extensions
shared-IP address  Seeindex iconall-zones address
sharing
ZFS dataset from labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
Shutdown authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
similarities
between Trusted Extensions and Oracle Solaris auditingindex iconTrusted Extensions and Auditing
between Trusted Extensions and Oracle Solaris OSindex iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
single-label
loginindex iconAccount Label Range
printing in a zoneindex iconHow to Configure a Zone as a Single-Level Print Server
site security policy
tasks involved at a labeled siteindex iconSite Security Policy for Trusted Extensions
understandingindex iconUnderstanding Your Site's Security Policy
snoop command
index iconHow to Debug the Trusted Extensions Network
index iconNetwork Commands in Trusted Extensions
software
administering third-partyindex iconSoftware Management in Trusted Extensions
importingindex iconAdding Software to Trusted Extensions
solaris.print.admin
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.list
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.nobanner
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.nobanner authorizationindex iconAssigning Printing-Related Authorizations to All Users of a System
solaris.print.unlabeled
authorizationindex iconTrusted Extensions Print Interfaces (Reference)
solaris.print.unlabeled authorizationindex iconAssigning Printing-Related Authorizations to All Users of a System
startup files
procedures for customizingindex iconHow to Configure Startup Files for Users in Trusted Extensions
Stop-A
enablingindex iconHow to Change Security Defaults in System Files
Sun Ray systems
0.0.0.0/32 address for client contactindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
System Administrator role
administering printersindex iconLabels, Printers, and Printing
creatingindex iconHow to Create a System Administrator Role
system files
editingindex iconHow to Change Security Defaults in System Files
label_encodingsindex iconHow to Check and Install Your Label Encodings File
tsol_separator.psindex iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output

T

tasks and task maps
Additional Trusted Extensions Configuration Tasksindex iconAdditional Trusted Extensions Configuration Tasks
Common Tasks in Trusted Extensions Task Map)index iconPerforming Common Tasks in Trusted Extensions
Configuring Labeled IPsec (Task Map)index iconConfiguring Labeled IPsec
Configuring Labeled Printing (Task Map)index iconConfiguring Labeled Printing
Creating Labeled Zonesindex iconCreating Labeled Zones
Customizing User Environment for Security (Task Map)index iconCustomizing the User Environment for Security
Labeling Hosts and Networks (Tasks)index iconLabeling Hosts and Networks
Managing Printing in Trusted Extensions (Task Map)index iconManaging Printing in Trusted Extensions
Managing Users and Rightsindex iconManaging Users and Rights
Managing Zones (Task Map)index iconManaging Zones
Reducing Printing Restrictions in Trusted Extensions (Task Map)index iconReducing Printing Restrictions in Trusted Extensions
Setting Up Remote Administration in Trusted Extensions (Task Map)index iconConfiguring and Administering Remote Systems in Trusted Extensions
Task Map: Choosing a Trusted Extensions Configurationindex iconTask Map: Choosing a Trusted Extensions Configuration
Task Map: Configuring Trusted Extensions to Your Site's Requirementsindex iconTask Map: Configuring Trusted Extensions to Meet Your Site's Requirements
Task Map: Configuring Trusted Extensions With the Provided Defaultsindex iconTask Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Preparing For and Enabling Trusted Extensionsindex iconTask Map: Preparing for and Enabling Trusted Extensions
Troubleshooting the Trusted Network (Task Map)index iconTroubleshooting the Trusted Network
Viewing Existing Security Templates (Tasks)index iconViewing Existing Security Templates
templates  Seeindex iconremote host templates
text label equivalents
determiningindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
tncfg command
creating a multilevel portindex iconHow to Create a Multilevel Port for a Zone
descriptionindex iconNetwork Commands in Trusted Extensions
modifying DOI valueindex iconHow to Configure a Different Domain of Interpretation
tnchkdb command
descriptionindex iconNetwork Commands in Trusted Extensions
tnctl command
descriptionindex iconNetwork Commands in Trusted Extensions
tnd command
descriptionindex iconNetwork Commands in Trusted Extensions
tninfo command
descriptionindex iconNetwork Commands in Trusted Extensions
usingindex iconHow to Debug a Client's Connection to the LDAP Server
tnrhdb
LDAP database schemaindex iconTrusted Extensions Database Schema for LDAP
tnrhtp
LDAP database schemaindex iconTrusted Extensions Database Schema for LDAP
tools  Seeindex iconadministrative tools
trailer pages  Seeindex iconbanner pages
translation  Seeindex iconlocalizing
troubleshooting
IPv6 configurationindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
LDAPindex iconHow to Debug a Client's Connection to the LDAP Server
mounted file systemsindex iconHow to Troubleshoot Mount Failures in Trusted Extensions
networkindex iconTroubleshooting the Trusted Network
repairing labels in internal databasesindex iconHow to Obtain a Readable Label From Its Hexadecimal Form
trusted networkindex iconHow to Debug the Trusted Extensions Network
verifying interface is upindex iconHow to Verify That a System's Interfaces Are Up
viewing ZFS dataset mounted in lower-level zoneindex iconSharing and Mounting a ZFS Dataset From Labeled Zones
Troubleshooting the Trusted Network (Task Map)index iconTroubleshooting the Trusted Network
Trusted Extensions  See Alsoindex iconTrusted Extensions planning
addingindex iconAdd Trusted Extensions Packages to an Oracle Solaris System
adding to Oracle Solarisindex iconInstalling and Enabling Trusted Extensions
decisions to make before enablingindex iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
differences from Oracle Solaris administrator's perspectiveindex iconResults of Enabling Trusted Extensions From an Administrator's Perspective
differences from Oracle Solaris auditingindex iconTrusted Extensions and Auditing
differences from Oracle Solaris OSindex iconDifferences Between Trusted Extensions and the Oracle Solaris OS
disablingindex iconHow to Remove Trusted Extensions From the System
enablingindex iconInstalling and Enabling Trusted Extensions
IPsec protectionsindex iconLabels for IPsec-Protected Exchanges
man pages quick referenceindex iconList of Trusted Extensions Man Pages
memory requirementsindex iconPlanning System Hardware and Capacity for Trusted Extensions
networkingindex iconTrusted Networking
new features in this releaseindex iconWhat's New in Trusted Extensions in Oracle Solaris 11.4
planning configuration strategyindex iconForming an Install Team for Trusted Extensions
planning forindex iconPlanning for Security in Trusted Extensions
planning hardwareindex iconPlanning System Hardware and Capacity for Trusted Extensions
planning networkindex iconPlanning Your Trusted Network
preparing forindex iconResolving Security Issues Before Installing Trusted Extensions
quick reference to administrationindex iconQuick Reference to Trusted Extensions Administration
results before configurationindex iconResults of Enabling Trusted Extensions From an Administrator's Perspective
similarities with Oracle Solaris auditingindex iconTrusted Extensions and Auditing
similarities with Oracle Solaris OSindex iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
two-role configuration strategyindex iconForming an Install Team for Trusted Extensions
Trusted Extensions configuration
adding network databases to LDAP serverindex iconPopulate the LDAP Server With Trusted Extensions Data
changing default DOI valueindex iconHow to Configure a Different Domain of Interpretation
databases for LDAPindex iconConfiguring LDAP on a Trusted Extensions System
division of tasksindex iconInitial Setup Team Responsibilities
initial proceduresindex iconConfiguring Trusted Extensions
initial setup team responsibilitiesindex iconInitial Setup Team Responsibilities
labeled zonesindex iconCreating Labeled Zones
LDAPindex iconConfiguring LDAP on a Trusted Extensions System
reboot to activate labelsindex iconLog In to Trusted Extensions
remote systemsindex iconRemote Administration in Trusted Extensions
task mapsindex iconConfiguration Roadmap for Trusted Extensions
Trusted Extensions network
adding zone-specific nscd daemonindex iconHow to Configure a Separate Name Service for Each Labeled Zone
enabling IPv6 for CIPSO packetsindex iconHow to Configure an IPv6 CIPSO Network in Trusted Extensions
planningindex iconPlanning Your Trusted Network
removing zone-specific nscd daemonindex iconRemoving a Name Service Cache From Each Labeled Zone
trusted network
0.0.0.0/0 wildcard addressindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
0.0.0.0 tnrhdb entryindex iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
conceptsindex iconTrusted Networking
default labelingindex iconTrusted Extensions Accreditation Checks
example of routingindex iconGateways in Trusted Extensions
host typesindex iconHost Type and Template Name in Security Templates
labels and MAC enforcementindex iconAbout the Trusted Network
using templatesindex iconCreating Security Templates
trusted path attribute
when availableindex iconRoles and Trusted Extensions
trusted programs
addingindex iconDeveloper Responsibilities When Creating Trusted Programs
definedindex iconEvaluating Software for Security
trustworthy programsindex iconEvaluating Software for Security
tsol_separator.ps file
configurable valuesindex icontsol_separator.ps Configuration File
customizing labeled printingindex iconLabeled Printer Output
txzonemgr scriptindex iconHow to Display Ready or Running Zones
–c optionindex iconHow to Create a Default Trusted Extensions System

U

/usr/lib/cups/filter/tsol_separator.ps fileindex iconLabeled Printer Output
/usr/local/scripts/getmounts scriptindex iconHow to Display the Labels of Mounted Files
/usr/sbin/txzonemgr script
index iconZone Administration Utilities in Trusted Extensions
index iconTrusted Extensions Administrative Tools
index iconHow to Create a Default Trusted Extensions System
unlabeled printing
configuringindex iconReducing Printing Restrictions in Trusted Extensions
updatehome commandindex icon.copy_files and .link_files Files
Upgrade File Label authorizationindex iconHow to Create a Rights Profile for Convenient Authorizations
useradd commandindex iconUsing the useradd Command to Create a Local User
users
accessing printersindex iconLabels, Printers, and Printing
adding local user with useraddindex iconUsing the useradd Command to Create a Local User
assigning authorizations toindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning labelsindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning passwordsindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning rightsindex iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning roles toindex iconSecurity Attribute Assignment to Users in Trusted Extensions
authorizations forindex iconHow to Create a Rights Profile for Convenient Authorizations
changing default privilegesindex iconSecurity Attribute Assignment to Users in Trusted Extensions
creatingindex iconAdministrator Responsibilities for Users
creating initial usersindex iconHow to Create Users Who Can Assume Roles in Trusted Extensions
customizing environmentindex iconCustomizing the User Environment for Security
labels of processesindex iconSession Range
modifying security defaultsindex iconHow to Modify Default User Label Attributes
modifying security defaults for all usersindex iconHow to Modify policy.conf Defaults
planning forindex iconDecisions to Make Before Creating Users in Trusted Extensions
preventing account lockingindex iconHow to Prevent Account Locking for Users
preventing from seeing others' processesindex iconModifying Every User's Basic Privilege Set
printingindex iconLabels, Printers, and Printing
removing some privilegesindex iconHow to Restrict a User's Set of Privileges
session rangeindex iconSession Range
setting up skeleton directoriesindex iconHow to Configure Startup Files for Users in Trusted Extensions
startup filesindex iconHow to Configure Startup Files for Users in Trusted Extensions
using .copy_files fileindex iconHow to Configure Startup Files for Users in Trusted Extensions
using .link_files fileindex iconHow to Configure Startup Files for Users in Trusted Extensions

V

verifying
interface is upindex iconHow to Verify That a System's Interfaces Are Up
label_encodings fileindex iconHow to Check and Install Your Label Encodings File
roles are workingindex iconHow to Verify That the Trusted Extensions Roles Work
viewing  Seeindex iconaccessing
virtual network computing (VNC)  Seeindex iconXvnc systems running Trusted Extensions

W

well-formed labelsindex iconLabel Ranges
wildcard address  Seeindex iconfallback mechanism
wire labelindex iconLabels for IPsec-Protected Exchanges
workspaces
global zoneindex iconRoles in Trusted Extensions

X

Xvnc
accessing multilevel remotelyindex iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
Xvnc systems running Trusted Extensions
remote access to
index iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
index iconMethods for Administering Remote Systems in Trusted Extensions

Z

zenity scriptindex iconHow to Create a Default Trusted Extensions System
ZFS
adding dataset to labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
fast zone creation methodindex iconZone Creation in Trusted Extensions
mounting dataset read-write on labeled zoneindex iconHow to Share a ZFS Dataset From a Labeled Zone
mounting datasets in Trusted Extensionsindex iconMount Possibilities in Trusted Extensions
multilevel datasets
index iconMultilevel Datasets for Relabeling Files
index iconHow to Create and Share a Multilevel Dataset
viewing mounted dataset read-only from higher-level zoneindex iconSharing and Mounting a ZFS Dataset From Labeled Zones
zones
adding nscd daemon to each labeled zoneindex iconHow to Configure a Separate Name Service for Each Labeled Zone
administeringindex iconManaging Zones
creating MLPindex iconHow to Create a Multilevel Port for a Zone
creating MLP for NFSv3index iconConfiguring a Private Multilevel Port for NFSv3 Over udp
creating secondaryindex iconHow to Create a Secondary Labeled Zone
deciding creation methodindex iconPlanning Your Labeled Zones in Trusted Extensions
deletingindex iconHow to Remove Trusted Extensions From the System
displaying labels of file systemsindex iconDisplaying the Labels of File Systems in the restricted Zone
displaying statusindex iconHow to Display Ready or Running Zones
enabling login toindex iconHow to Enable Users to Log In to a Labeled Zone
for isolating labeled servicesindex iconHow to Create a Secondary Labeled Zone
globalindex iconZones in Trusted Extensions
global zone processes andindex iconGlobal Zone Processes and Labeled Zones
immutable and Trusted Extensionsindex iconCreating Labeled Zones
in Trusted Extensionsindex iconManaging Zones in Trusted Extensions
kernel and Trusted Extensionsindex iconCreating Labeled Zones
managingindex iconManaging Zones in Trusted Extensions
net_mac_aware privilegeindex iconHow to NFS Mount Files in a Labeled Zone
primaryindex iconPrimary and Secondary Labeled Zones
removing nscd daemon from labeled zonesindex iconRemoving a Name Service Cache From Each Labeled Zone
secondaryindex iconPrimary and Secondary Labeled Zones
specifying labelsindex iconHow to Create Labeled Zones Interactively
specifying namesindex iconHow to Create Labeled Zones Interactively
txzonemgr scriptindex iconHow to Create a Default Trusted Extensions System