Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: March 2019
 
 

List of Trusted Extensions Man Pages

Trusted Extensions is a configuration of the Oracle Solaris OS. This appendix provides a description of the man pages that describe Trusted Extensions.

Trusted Extensions Man Pages in Alphabetical Order

The following man pages are relevant only on a system that is configured with Trusted Extensions. The description includes links to examples or explanations of these features in the Trusted Extensions document set.

Trusted Extensions Man Page

Purpose and Links to Additional Information

add_allocatable(8)

Enables a device to be allocated by adding the device to device allocation databases. By default, removable devices are allocatable.

getpathbylabel(3TSOL)

Gets the zone pathname

getzoneidbylabel(3TSOL)

Gets zone ID from zone label

getzonelabelbyid(3TSOL)

Gets zone label from zone ID

getzonelabelbyname(3TSOL)

Gets zone label from zone name

getzonepath(1)

Displays the root path of the zone that corresponds to the specified label.

Acquiring a Sensitivity Label in Trusted Extensions Developer’s Guide

getzonerootbyid(3TSOL)

Gets zone root pathname from zone root ID

getzonerootbylabel(3TSOL)

Gets zone root pathname from zone label

getzonerootbyname(3TSOL)

Gets zone root pathname from zone name

labeladm(8)

Enables and disables the Trusted Extensions labeling service and can set the label_encodings file

label_encodings(5)

Describes the label encodings file

libtsnet(3LIB)

Is the Trusted Extensions network library

libtsol(3LIB)

Is the Trusted Extensions library

pam_tsol_account(7)

Checks account limitations that are due to labels

For an example of its use, see How to Log In and Administer a Remote Trusted Extensions System.

plabel(1)

Gets the label of a process

remove_allocatable(8)

Prevents allocation of a device by removing its entry from device allocation databases

setflabel(3TSOL)

Moves a file to a zone with the corresponding sensitivity label

tncfg(8)

Manages the trusted network databases. An alternative to the txzonmgr GUI for managing the trusted network. The list subcommand displays the security characteristics of network interfaces. tncfg provides more complete information than the tninfo command.

For many examples, see Managing Networks in Trusted Extensions.

tnctl(8)

Configures Trusted Extensions network parameters. You can also use the tncfg command.

For an example, see Example 1, Assigning the CIPSO Host Type for Remote Administration.

tnd(8)

Executes the trusted network daemon when the LDAP naming service is enabled.

tninfo(8)

Displays kernel-level Trusted Extensions network information and statistics.

How to Debug the Trusted Extensions Network. You can also use the tncfg command and the txzonemgr GUI.

For a comparison with the tncfg command, see How to Troubleshoot Mount Failures in Trusted Extensions.

trusted_extensions(7)

Introduces Trusted Extensions

txzonemgr(8)

Manages labeled zones and network interfaces. Command-line options enable automatic creation of two zones. This command accepts a configuration file as input and enables the deletion of zones. txzonemgr is a zenity (1) script.

See Creating Labeled Zones and Troubleshooting the Trusted Network.

tsol_getrhtype(3TSOL)

Gets the host type from Trusted Extensions network information