JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

P

packages, Trusted Extensions feature, index iconAdd Trusted Extensions Packages to an Oracle Solaris System
panels, moving to bottom of screen, index iconHow to Move Desktop Panels to the Bottom of the Screen
passwords
assigning, index iconSecurity Attribute Assignment to Users in Trusted Extensions
Change Password menu item
index iconUnique Trusted Extensions Security Features
index iconHow to Change the Password for root
changing for root, index iconHow to Change the Password for root
changing in labeled zone, index iconHow to Enforce a New Local User Password in a Labeled Zone
changing user passwords, index iconUnique Trusted Extensions Security Features
providing when changing labels
index iconUnique Trusted Extensions Security Features
index iconUnique Trusted Extensions Security Features
index iconUnique Trusted Extensions Security Features
storage, index iconPassword Protection
testing if password prompt is trusted, index iconHow to Regain Control of the Desktop's Current Focus
planning
See also Trusted Extensions use
account creation, index iconPlanning User Security in Trusted Extensions
administration strategy, index iconPlanning Who Will Configure Trusted Extensions
auditing, index iconPlanning for Auditing in Trusted Extensions
hardware, index iconPlanning System Hardware and Capacity for Trusted Extensions
labels, index iconDevising a Label Strategy
laptop configuration, index iconPlanning for Multilevel Services
LDAP naming service, index iconPlanning for the LDAP Naming Service in Trusted Extensions
network, index iconPlanning Your Trusted Network
Trusted Extensions, index iconPlanning for Security in Trusted Extensions
Trusted Extensions configuration strategy, index iconForming an Install Team for Trusted Extensions
zones, index iconPlanning Your Labeled Zones in Trusted Extensions
policy.conf file
changing defaults, index iconHow to Change Security Defaults in System Files
changing Trusted Extensions keywords, index iconHow to Modify policy.conf Defaults
defaults, index iconpolicy.conf File Defaults in Trusted Extensions
how to edit, index iconHow to Modify policy.conf Defaults
preventing, See protecting
Print without Banner authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
Print without Label authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
printed output, See printing
printer output, See printing
printers, setting label range, index iconEffects of Label Range on a Device
printing
and label_encodings file, index iconLabel Encodings File
authorizations, index iconTrusted Extensions Print Interfaces (Reference)
authorizations for unlabeled output from a public system, index iconHow to Modify policy.conf Defaults
configuring for multilevel labeled output
index iconHow to Configure a Multilevel Print Server and Its Printers
index iconHow to Configure a Network Printer
configuring for print client, index iconHow to Enable a Trusted Extensions Client to Access a Printer
configuring labeled zone, index iconHow to Configure a Zone as a Single-Level Print Server
configuring labels and text, index icontsol_separator.ps Configuration File
configuring public print jobs, index iconHow to Assign a Label to an Unlabeled Print Server
in local language, index icontsol_separator.ps Configuration File
internationalizing labeled output, index icontsol_separator.ps Configuration File
labeling an Oracle Solaris print server, index iconHow to Assign a Label to an Unlabeled Print Server
localizing labeled output, index icontsol_separator.ps Configuration File
managing, index iconLabels, Printers, and Printing
PostScript, index iconPostScript Printing of Security Information
preventing labels on output, index iconHow to Remove Banner and Trailer Pages
public jobs from an Oracle Solaris print server, index iconHow to Assign a Label to an Unlabeled Print Server
restricting label range, index iconHow to Configure a Restricted Label Range for a Printer
using an Oracle Solaris print server, index iconHow to Assign a Label to an Unlabeled Print Server
without labeled banners and trailers, index iconHow to Create a Rights Profile for Convenient Authorizations
without page labels
index iconHow to Create a Rights Profile for Convenient Authorizations
index iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output
printouts, See printing
privileges
changing defaults for users, index iconSecurity Attribute Assignment to Users in Trusted Extensions
non-obvious reasons for requiring, index iconEvaluating Software for Security
removing proc_info from basic set, index iconHow to Modify policy.conf Defaults
restricting users', index iconHow to Restrict a User's Set of Privileges
when executing commands, index iconHow to Enter the Global Zone in Trusted Extensions
proc_info privilege, removing from basic set, index iconHow to Modify policy.conf Defaults
procedures, See tasks and task maps
processes
labels of, index iconWhat Labels Protect and Where Labels Appear
labels of user processes, index iconLabel Ranges
preventing users from seeing others' processes, index iconHow to Modify policy.conf Defaults
profiles, See rights profiles
programs, See applications
protecting
devices
index iconDevice Manager
index iconDevice Protection With Trusted Extensions Software
devices from remote allocation, index iconHow to Protect Nonallocatable Devices in Trusted Extensions
file systems by using non-proprietary names, index iconHow to Share File Systems From a Labeled Zone
files at lower labels from being accessed, index iconHow to Disable the Mounting of Lower-Level Files
information with labels, index iconWhat Labels Protect and Where Labels Appear
labeled hosts from access by arbitrary hosts, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
nonallocatable devices, index iconHow to Protect Nonallocatable Devices in Trusted Extensions
proxy server, starting and stopping LDAP, index iconQuick Reference for the LDAP Naming Service in Trusted Extensions
publications, security and UNIX, index iconAdditional Security References