Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: November 2020

Default User Security Attributes in Trusted Extensions

Settings in the label_encodings and the policy.conf files together define default security attributes for user accounts. The values that you explicitly set for a user override these system values. Some values that are set in these files also apply to role accounts. For security attributes that you can explicitly set, see Configurable User Attributes in Trusted Extensions.

label_encodings File Defaults

The label_encodings file defines a user's minimum label, clearance, and default label view. For details about the file, see the label_encodings(5) man page. Your site's label_encodings file was installed by your initial setup team. Their decisions were based on Devising a Label Strategy, and examples from Trusted Extensions Label Administration.

Label values that the security administrator explicitly sets for individual users override values in the label_encodings file.

policy.conf File Defaults in Trusted Extensions

The /etc/security/policy.conf file can contain the default security values for the system. Trusted Extensions adds two keywords to this file. To change the values system-wide, add these keyword=value pairs to the file. The following table shows the default values and the possible values for these keywords.

Note -  If you are using the account-policy SMF stencil and the group property for a security attribute is enabled, then security policy is determined by the SMF property. The value in an /etc file is not used. For examples of viewing and changing account-policy properties, see the procedures in Modifying Rights System-Wide As SMF Properties in Securing Users and Processes in Oracle Solaris 11.4. See also the account-policy(8S) man page.
Table 13  Trusted Extensions Security Defaults in policy.conf File
Default Value
Possible Values
Applies to the login user.
0 to 120 minutes
Applies to the login user.

The authorizations and rights profiles that are defined in the policy.conf file are in addition to any authorizations and profiles that are assigned to individual accounts. For the other fields, the individual user's value overrides the system value.

Planning User Security in Trusted Extensions includes a table of every policy.conf keyword. See also the policy.conf(5) man page. For a comparison of policy.conf values to SMF properties, see User Account Security Attributes in Files and SMF in Securing Users and Processes in Oracle Solaris 11.4.