JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

Getting Started as a Trusted Extensions Administrator (Task Map)

How to Enter the Global Zone in Trusted Extensions

How to Exit the Global Zone in Trusted Extensions

Common Tasks in Trusted Extensions (Task Map)

How to Change the Password for root

How to Enforce a New Local User Password in a Labeled Zone

How to Regain Control of the Desktop's Current Focus

How to Obtain the Hexadecimal Equivalent for a Label

How to Obtain a Readable Label From Its Hexadecimal Form

How to Change Security Defaults in System Files

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

Common Tasks in Trusted Extensions (Task Map)

The following task map describes common administrative procedures in Trusted Extensions.

Task
Description
For Instructions
Change the password for root.
Specifies a new password for the root role.
Reflect a password change in a labeled zone.
Reboots the zone to update the zone that a password has changed.
Use the Secure Attention key combination.
Gets control of the mouse or keyboard. Also, tests whether the mouse or keyboard is trusted.
Determine the hexadecimal number for a label.
Displays the internal representation for a text label.
Determine the text representation for a label.
Displays the text representation for a hexadecimal label.
Allocate a device.
Enables users to allocate devices.

Uses a peripheral device to add information to or remove information from the system.

Change a system configuration file.
Changes default Trusted Extensions and Oracle Solaris security values.
Administer a system remotely.
Administers Trusted Extensions systems from a remote system.

How to Change the Password for root

Trusted Extensions provides a GUI for changing your password.

  1. Assume the root role.

    For the steps, see How to Enter the Global Zone in Trusted Extensions.

  2. Open the Trusted Path menu by clicking the trusted symbol in the trusted stripe.
  3. Choose Change Login Password.

    If separate passwords are created per zone, the menu can read Change Workspace Password.

  4. Change the password, and confirm the change.

How to Enforce a New Local User Password in a Labeled Zone

Under the following conditions, labeled zones must be rebooted:

Before You Begin

You must be assigned the Zone Security rights profile.

Troubleshooting

To automatically update user passwords for labeled zones, you must either configure LDAP or configure one naming service per zone. You can also configure both.

How to Regain Control of the Desktop's Current Focus

The “Secure Attention” key combination can be used to break a pointer grab or a keyboard grab by an untrusted application. The key combination can also be used to verify if a pointer or a keyboard has been grabbed by a trusted application. On a multiheaded system that has been spoofed to display more than one trusted stripe, this key combination warps the pointer to the authorized trusted stripe.

  1. To regain control of a Sun keyboard, use the following key combination.

    Press the keys simultaneously to regain control of the current desktop focus. On the Sun keyboard, the diamond is the Meta key.

    <Meta> <Stop>

    If the grab, such as a pointer, is not trusted, the pointer moves to the stripe. A trusted pointer does not move to the trusted stripe.

  2. If you are not using a Sun keyboard, use the following key combination.
    <Alt> <Break>

    Press the keys simultaneously to regain control of the current desktop focus on your laptop.

Example 9-1 Testing If the Password Prompt Can Be Trusted

On an x86 system that is using a Sun keyboard, the user has been prompted for a password. The cursor has been grabbed, and is in the password dialog box. To check that the prompt is trusted, the user presses the <Meta> <Stop> keys simultaneously. When the pointer remains in the dialog box, the user knows that the password prompt is trusted.

If the pointer had moved to the trusted stripe, the user would know that the password prompt could not be trusted, and contact the administrator.

Example 9-2 Forcing the Pointer to the Trusted Stripe

In this example, a user is not running any trusted processes but cannot see the mouse pointer. To bring the pointer to the center of the trusted stripe, the user presses the <Meta> <Stop> keys simultaneously.

How to Obtain the Hexadecimal Equivalent for a Label

This procedure provides an internal hexadecimal representation of a label. This representation is safe for storing in a public directory. For more information, see the atohexlabel(1M) man page.

Before You Begin

You must be in the Security Administrator role in the global zone. For details, see How to Enter the Global Zone in Trusted Extensions.

Example 9-3 Using the atohexlabel Command

When you pass a valid label in hexadecimal format, the command returns the argument.

$ atohexlabel 0x0004-08-68
0x0004-08-68

When you pass an administrative label, the command returns the argument.

$ atohexlabel admin_high
ADMIN_HIGH
atohexlabel admin_low
ADMIN_LOW

Troubleshooting

The error message atohexlabel parsing error found in <string> at position 0 indicates that the <string> argument that you passed to atohexlabel was not a valid label or clearance. Check your typing, and check that the label exists in your installed label_encodings file.

How to Obtain a Readable Label From Its Hexadecimal Form

This procedure provides a way to repair labels that are stored in internal databases. For more information, see the hextoalabel(1M) man page.

Before You Begin

You must be in the Security Administrator role in the global zone.

How to Change Security Defaults in System Files

Files in the /etc/security and /etc/default directories contain security values. For more information, see Chapter 3, Controlling Access to Systems (Tasks), in Oracle Solaris 11.1 Administration: Security Services.


Caution

Caution - Relax system security defaults only if site security policy allows you to.


Before You Begin

You are in the global zone and are assigned the solaris.admin.edit/filename authorization. By default, the root role has this authorization.