Index
A
- access
- See computer access
- remote systems, Remote Administration in Trusted Extensions (Tasks)
- access policy
- devices, Device Access Policies
- Discretionary Access Control (DAC)
- Trusted Extensions and the Oracle Solaris OS
- Differences Between Trusted Extensions and the Oracle Solaris OS
- Mandatory Access Control (MAC), Differences Between Trusted Extensions and the Oracle Solaris OS
- accessing
- administrative tools, Getting Started as a Trusted Extensions Administrator (Task Map)
- audit records by label, Audit Tasks in Trusted Extensions
- devices, Device Protection With Trusted Extensions Software
- global zone, How to Enter the Global Zone in Trusted Extensions
- home directories, Zones in Trusted Extensions
- labeled zones by users, How to Enable Users to Log In to a Labeled Zone
- printers, Labels, Printers, and Printing
- remote multilevel desktop, How to Configure a Trusted Extensions System With Xvnc for Remote Access
- ZFS dataset mounted in lower-level zone from higher-level zone, How to Share a ZFS Dataset From a Labeled Zone
- account locking, preventing for users who can assume roles, How to Prevent Account Locking for Users
- accounts
- See also roles
- See also users
- creating, Creating Roles and Users in Trusted Extensions
- planning, Planning User Security in Trusted Extensions
- accreditation checks, Trusted Extensions Accreditation Checks
- accreditation ranges, label_encodings file, Label Encodings File
- adding
- IPsec protections, How to Apply IPsec Protections in a Multilevel Trusted Extensions Network
- LDAP role with roleadd, How to Create the Security Administrator Role in Trusted Extensions
- local role with roleadd, How to Create the Security Administrator Role in Trusted Extensions
- local user with useradd, How to Create Users Who Can Assume Roles in Trusted Extensions
- logical interfaces, How to Add an IP Instance to a Labeled Zone
- multilevel dataset, How to Create and Share a Multilevel Dataset
- network databases to LDAP server, Populate the Oracle Directory Server Enterprise Edition
- nscd daemon to every labeled zone, How to Configure a Separate Name Service for Each Labeled Zone
- remote host templates, Creating Security Templates (Tasks)
- remote hosts, How to Connect a Trusted Extensions System to Other Trusted Extensions Systems
- roles, Creating Roles and Users in Trusted Extensions
- secondary zones, How to Create a Secondary Labeled Zone
- shared network interfaces, How to Share a Single IP Address With All Zones
- Trusted Extensions packages, Add Trusted Extensions Packages to an Oracle Solaris System
- users who can assume roles, How to Create Users Who Can Assume Roles in Trusted Extensions
- VNIC interfaces, How to Add a Virtual Network Interface to a Labeled Zone
- zone-specific nscd daemon, How to Configure a Separate Name Service for Each Labeled Zone
- Additional Trusted Extensions Configuration Tasks, Additional Trusted Extensions Configuration Tasks
- ADMIN_HIGH label
- body page labels and, How to Configure a Zone as a Single-Level Print Server
- devices and, Device Protection With Trusted Extensions Software
- global zone processes and zones, Global Zone Processes and Labeled Zones
- mlslabel and, mlslabel Property and Mounting Single-Level File Systems
- multilevel datasets and, No Privilege Overrides for MAC Read-Write Policy
- NFS-mounted files in global zone, Trusted Extensions Policy for Single-Level Datasets
- no localization, For International Customers of Trusted Extensions
- role clearance, How to Create a System Administrator Role
- roles and, Role Creation in Trusted Extensions
- top administrative label, Dominance Relationships Between Labels
- ADMIN_LOW label
- lowest label, Dominance Relationships Between Labels
- protecting administrative files, Password Protection
- limitations on unlabeled system mounts, Sharing and Mounting Files in the Global Zone
- mounting files and, Sharing and Mounting Files in the Global Zone
- administering
- account locking, How to Prevent Account Locking for Users
- assigning device authorizations, How to Assign Device Authorizations
- auditing in Trusted Extensions, Audit Management by Role in Trusted Extensions
- changing label of information, How to Enable a User to Change the Security Level of Data
- convenient authorizations for users, How to Create a Rights Profile for Convenient Authorizations
- device allocation, How to Assign Device Authorizations
- device authorizations, How to Create New Device Authorizations
- devices
- Managing Devices for Trusted Extensions (Tasks)
- Managing Devices in Trusted Extensions (Task Map)
- file systems
- mounting, How to NFS Mount Files in a Labeled Zone
- overview, Trusted Extensions Policies for Mounted File Systems
- troubleshooting, How to Troubleshoot Mount Failures in Trusted Extensions
files
- backing up with labels, How to Back Up Files in Trusted Extensions
- restoring with labels, How to Restore Files in Trusted Extensions
from the global zone, How to Enter the Global Zone in Trusted Extensions
- labeled IPsec, Configuring Labeled IPsec (Task Map)
- labeled printing, Managing Labeled Printing (Tasks)
- LDAP, Trusted Extensions and LDAP (Overview)
- mail, Multilevel Mail in Trusted Extensions (Overview)
- multilevel datasets, Results of Sharing and Mounting File Systems in Trusted Extensions
- multilevel ports, How to Create a Multilevel Port for a Zone
- printing, Managing Printing in Trusted Extensions (Tasks)
- quick reference for administrators, Quick Reference to Trusted Extensions Administration
- remote host templates, Creating Security Templates (Tasks)
- remotely, Remote Administration in Trusted Extensions (Tasks)
- routes with security attributes, How to Add Default Routes
- security templates
- How to Add a Host to a Security Template
- How to Add a Range of Hosts to a Security Template
- sharing file systems, How to Share File Systems From a Labeled Zone
- startup files for users, How to Configure Startup Files for Users in Trusted Extensions
- system files, How to Change Security Defaults in System Files
- third-party software, Software Management in Trusted Extensions
- trusted network, Managing Networks in Trusted Extensions (Tasks)
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user privileges, How to Restrict a User's Set of Privileges
- users
- Decisions to Make Before Creating Users in Trusted Extensions
- Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
- Managing Users and Rights (Task Map)
- zones, Managing Zones (Task Map)
- zones by using txzonemgr, Zone Administration Utilities in Trusted Extensions
- administrative labels, Dominance Relationships Between Labels
- administrative roles, See roles
- administrative tools
- accessing, Getting Started as a Trusted Extensions Administrator (Task Map)
- commands, Command Line Tools in Trusted Extensions
- configuration files, Configuration Files in Trusted Extensions
- description, Trusted Extensions Administration Tools
- Device Manager, Device Manager
- label builder, Label Builder in Trusted Extensions
- Labeled Zone Manager, txzonemgr Script
- Selection Manager, Selection Manager in Trusted Extensions
- txzonemgr script, txzonemgr Script
- Allocate Device authorization
- How to Create a Rights Profile for Convenient Authorizations
- Device Protection With Trusted Extensions Software
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- allocate error state, correcting, How to Revoke or Reclaim a Device in Trusted Extensions
- allocating, using Device Manager, Device Manager GUI
- allocating devices, for copying data, How to Copy Files to Portable Media in Trusted Extensions
- application security label, Labels for IPsec-Protected Exchanges
- applications
- enabling initial network contact between client and server, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- evaluating for security, Security Administrator Responsibilities for Trusted Programs
- trusted and trustworthy, Evaluating Software for Security
- assigning
- privileges to users, Security Attribute Assignment to Users in Trusted Extensions
- rights profiles, Security Attribute Assignment to Users in Trusted Extensions
- Assume Role menu item, How to Enter the Global Zone in Trusted Extensions
- assuming, roles, How to Enter the Global Zone in Trusted Extensions
- atohexlabel command, How to Obtain the Hexadecimal Equivalent for a Label
- audio devices, preventing remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions
- Audit Review profile, reviewing audit records, Audit Tasks in Trusted Extensions
- audit tokens for Trusted Extensions
- label token, label Token
- list of, Trusted Extensions Audit Tokens
- xatom token, xatom Token
- xcolormap token, xcolormap Token
- xcursor token, xcursor Token
- xfont token, xfont Token
- xgc token, xgc Token
- xpixmap token, xpixmap Token
- xproperty token, xproperty Token
- xselect token, xselect Token
- xwindow token, xwindow Token
- auditing in Trusted Extensions
- additional audit events, Trusted Extensions Audit Events
- additional audit policies, Trusted Extensions Audit Policy Options
- additional audit tokens, Trusted Extensions Audit Tokens
- additions to existing auditing commands, Extensions to Auditing Commands in Trusted Extensions
- differences from Oracle Solaris auditing, Trusted Extensions and Auditing
- planning, Planning for Auditing in Trusted Extensions
- reference, Trusted Extensions Auditing (Overview)
- roles for administering, Audit Management by Role in Trusted Extensions
- tasks, Audit Tasks in Trusted Extensions
- X audit classes, Trusted Extensions Audit Classes
- authorizations
- adding new device authorizations, How to Create New Device Authorizations
- Allocate Device
- Device Protection With Trusted Extensions Software
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- assigning, Security Attribute Assignment to Users in Trusted Extensions
- assigning device authorizations, How to Assign Device Authorizations
- authorizing a user or role to change label, How to Enable a User to Change the Security Level of Data
- Configure Device Attributes, How to Assign Device Authorizations
- convenient for users, How to Create a Rights Profile for Convenient Authorizations
- creating customized device authorizations, How to Create New Device Authorizations
- creating local and remote device authorizations, How to Create New Device Authorizations
- customizing for devices, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- granted, Trusted Extensions and Access Control
- profiles that include device allocation authorizations, How to Assign Device Authorizations
- Revoke or Reclaim Device
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- authorizing
- device allocation, How to Assign Device Authorizations
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)