R
- real UID of root, required for applications, Evaluating Software for Security
- rebooting
- activating labels, Log In to Trusted Extensions
- enabling login to labeled zone, How to Enable Users to Log In to a Labeled Zone
- Reducing Printing Restrictions in Trusted Extensions (Task Map), Reducing Printing Restrictions in Trusted Extensions (Task Map)
- regaining control of desktop focus, How to Regain Control of the Desktop's Current Focus
- regular users, See users
- relabeling data, eliminating IO, How to Create and Share a Multilevel Dataset
- relabeling information, How to Enable a User to Change the Security Level of Data
- remote administration
- defaults, Remote Administration in Trusted Extensions
- methods, Methods for Administering Remote Systems in Trusted Extensions
- remote host templates
- 0.0.0.0/0 wildcard assignment, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- adding systems to
- How to Add a Host to a Security Template
- How to Add a Range of Hosts to a Security Template
- assigning, Adding Hosts to Security Templates (Tasks)
- creating, Creating Security Templates (Tasks)
- entry for Sun Ray servers, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- remote hosts, using fallback mechanism in tnrhdb, Trusted Network Fallback Mechanism
- Remote Login authorization, How to Create a Rights Profile for Convenient Authorizations
- remote multilevel desktop, accessing, How to Configure a Trusted Extensions System With Xvnc for Remote Access
- remote systems, configuring for role assumption, Enable Remote Administration of a Remote Trusted Extensions System
- removing
- labels on printouts, How to Remove Banner and Trailer Pages
- zone-specific nscd daemon, How to Configure a Separate Name Service for Each Labeled Zone
- removing Trusted Extensions, See disabling
- repairing, labels in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
- requirements for Trusted Extensions
- Oracle Solaris installation options, Install an Oracle Solaris System Securely
- Oracle Solaris installed systems, Prepare an Installed Oracle Solaris System for Trusted Extensions
- restoring control of desktop focus, How to Regain Control of the Desktop's Current Focus
- restricting
- access to computer based on label, Effects of Label Range on a Device
- access to devices, Device Protection With Trusted Extensions Software
- access to global zone, Role Assumption in Trusted Extensions
- access to lower-level files, How to Disable the Mounting of Lower-Level Files
- access to printers with labels
- Differences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11
- Restricting Access to Printers and Print Job Information in Trusted Extensions
- mounts of lower-level files, How to Disable the Mounting of Lower-Level Files
- printer access with labels
- Differences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11
- Restricting Access to Printers and Print Job Information in Trusted Extensions
- printer label range, How to Configure a Restricted Label Range for a Printer
- remote access, Remote Administration in Trusted Extensions
- Revoke or Reclaim Device authorization
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- rights, See rights profiles
- rights profiles
- assigning, Security Attribute Assignment to Users in Trusted Extensions
- Convenient Authorizations, How to Create a Rights Profile for Convenient Authorizations
- with Allocate Device authorization, How to Assign Device Authorizations
- with device allocation authorizations, How to Assign Device Authorizations
- with new device authorizations, How to Create New Device Authorizations
- roadmaps
- Task Map: Choosing a Trusted Extensions Configuration, Task Map: Choosing a Trusted Extensions Configuration
- Task Map: Configuring Trusted Extensions to Your Site's Requirements, Task Map: Configuring Trusted Extensions to Meet Your Site's Requirements
- Task Map: Configuring Trusted Extensions With the Provided Defaults, Task Map: Configuring Trusted Extensions With the Provided Defaults
- Task Map: Preparing For and Enabling Trusted Extensions, Task Map: Preparing for and Enabling Trusted Extensions
- role workspace, global zone, Roles in Trusted Extensions
- roleadd command, How to Create the Security Administrator Role in Trusted Extensions
- roles
- adding LDAP role with roleadd, How to Create the Security Administrator Role in Trusted Extensions
- adding local role with roleadd, How to Create the Security Administrator Role in Trusted Extensions
- administering auditing, Role Responsibilities for Audit Administration
- assigning rights, Security Attribute Assignment to Users in Trusted Extensions
- assuming
- Roles in Trusted Extensions
- How to Enter the Global Zone in Trusted Extensions
- creating, Role Creation in Trusted Extensions
- creating Security Administrator, How to Create the Security Administrator Role in Trusted Extensions
- determining when to create, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- leaving role workspace, How to Exit the Global Zone in Trusted Extensions
- trusted application access, Administration Tools for Trusted Extensions
- verifying they work, How to Verify That the Trusted Extensions Roles Work
- workspaces, Roles in Trusted Extensions
- root passwords, required in Trusted Extensions, Prepare an Installed Oracle Solaris System for Trusted Extensions
- root role, adding device_clean script, How to Add a Device_Clean Script in Trusted Extensions
- root UID, required for applications, Evaluating Software for Security
- route command, Network Commands in Trusted Extensions
- routing, Overview of Routing in Trusted Extensions
- accreditation checks, Trusted Extensions Accreditation Checks
- commands in Trusted Extensions, Routing Commands in Trusted Extensions
- concepts, Administration of Routing in Trusted Extensions
- example of, Gateways in Trusted Extensions
- tables
- Routing Table Entries in Trusted Extensions
- Choosing Routers in Trusted Extensions
- using route command, How to Add Default Routes