Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: November 2020

Using This Documentation

  • Overview – Describes how to enable, configure, and maintain the Trusted Extensions feature of Oracle Solaris on one or more servers. Trusted Extensions software adds labels that implement mandatory access control (MAC) to protect all system subjects (processes) and objects (data), including network endpoints. Trusted Extensions software provides interfaces to handle label configuration, label assignment, and label policy.

  • Audience – System administrators of labeled systems and networks.

  • Required knowledge – Security labels and site security requirements.

Product Documentation Library

Documentation and resources for this product and related products are available at Oracle Solaris 11.4 Information Library.


Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.