Overview – Describes how to enable, configure, and maintain the Trusted Extensions feature of Oracle Solaris on one or more systems. Trusted Extensions software adds labels that implement mandatory access control (MAC) to protect system subjects (processes) and objects (data), including network endpoints and the desktop. Trusted Extensions software provides interfaces to handle label configuration, label assignment, and label policy.
Audience – System administrators of labeled systems and networks.
Required knowledge – Security labels and site security requirements.
Documentation and resources for this product and related products are available at http://www.oracle.com/pls/topic/lookup?ctx=E53394-01.
Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.