Go to main content

man pages section 7: Standards, Environments, Macros, Character Sets, and Miscellany

Exit Print View

Updated: Wednesday, July 27, 2022
 
 

trusted_extensions(7)

Name

trusted_extensions - Solaris Trusted Extensions

Description

The Trusted Extensions feature of Oracle Solaris provides labels for local objects and processes, for zones and file systems, and for network communications. These labels are used to implement a Multilevel Security (MLS) policy that restricts the flow of information based on label relationships. In contrast to Discretionary Access Control (DAC) based on ownership, the MLS policy enforced by Trusted Extensions is an example of Mandatory Access Control (MAC).

By default, Trusted Extensions software is disabled. It is enabled and disabled (but not completely configured) by the labeladm(8) command, and is associated with labeld(8) services, identified by the FMRI pattern:

svc:/system/labeld:*

See Also

label_encodings(5), labels(7), labeladm(8), labeld(8)

Trusted Extensions Configuration and Administration

Trusted Extensions Label Administration

Trusted Extensions Developer’s Guide

History

Trusted Extensions was made available as an add-on for Solaris 10 11/06 (Update 3), and then was integrated fully into Solaris in the Solaris 10 4/08 (Update 5) release.

Prior to that, Multilevel Security for Solaris was provided by the separate Trusted Solaris product, and before that, the SunOS CMW and SunOS MLS products.

Support for a multilevel, labeled desktop environment was removed from Solaris in Oracle Solaris 11.4.0.