JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

R

real UID of root, required for applications, index iconEvaluating Software for Security
rebooting
activating labels, index iconLog In to Trusted Extensions
enabling login to labeled zone, index iconHow to Enable Users to Log In to a Labeled Zone
Reducing Printing Restrictions in Trusted Extensions (Task Map), index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
regaining control of desktop focus, index iconHow to Regain Control of the Desktop's Current Focus
regular users, See users
relabeling data, eliminating IO, index iconHow to Create and Share a Multilevel Dataset
relabeling information, index iconHow to Enable a User to Change the Security Level of Data
remote administration
defaults, index iconRemote Administration in Trusted Extensions
methods, index iconMethods for Administering Remote Systems in Trusted Extensions
remote host templates
0.0.0.0/0 wildcard assignment, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
adding systems to
index iconHow to Add a Host to a Security Template
index iconHow to Add a Range of Hosts to a Security Template
assigning, index iconAdding Hosts to Security Templates (Tasks)
creating, index iconCreating Security Templates (Tasks)
entry for Sun Ray servers, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
remote hosts, using fallback mechanism in tnrhdb, index iconTrusted Network Fallback Mechanism
Remote Login authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
remote multilevel desktop, accessing, index iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
remote systems, configuring for role assumption, index iconEnable Remote Administration of a Remote Trusted Extensions System
removing
labels on printouts, index iconHow to Remove Banner and Trailer Pages
zone-specific nscd daemon, index iconHow to Configure a Separate Name Service for Each Labeled Zone
removing Trusted Extensions, See disabling
repairing, labels in internal databases, index iconHow to Obtain a Readable Label From Its Hexadecimal Form
requirements for Trusted Extensions
Oracle Solaris installation options, index iconInstall an Oracle Solaris System Securely
Oracle Solaris installed systems, index iconPrepare an Installed Oracle Solaris System for Trusted Extensions
restoring control of desktop focus, index iconHow to Regain Control of the Desktop's Current Focus
restricting
access to computer based on label, index iconEffects of Label Range on a Device
access to devices, index iconDevice Protection With Trusted Extensions Software
access to global zone, index iconRole Assumption in Trusted Extensions
access to lower-level files, index iconHow to Disable the Mounting of Lower-Level Files
access to printers with labels
index iconDifferences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11
index iconRestricting Access to Printers and Print Job Information in Trusted Extensions
mounts of lower-level files, index iconHow to Disable the Mounting of Lower-Level Files
printer access with labels
index iconDifferences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11
index iconRestricting Access to Printers and Print Job Information in Trusted Extensions
printer label range, index iconHow to Configure a Restricted Label Range for a Printer
remote access, index iconRemote Administration in Trusted Extensions
Revoke or Reclaim Device authorization
index iconHow to Assign Device Authorizations
index iconHow to Assign Device Authorizations
rights, See rights profiles
rights profiles
assigning, index iconSecurity Attribute Assignment to Users in Trusted Extensions
Convenient Authorizations, index iconHow to Create a Rights Profile for Convenient Authorizations
with Allocate Device authorization, index iconHow to Assign Device Authorizations
with device allocation authorizations, index iconHow to Assign Device Authorizations
with new device authorizations, index iconHow to Create New Device Authorizations
roadmaps
Task Map: Choosing a Trusted Extensions Configuration, index iconTask Map: Choosing a Trusted Extensions Configuration
Task Map: Configuring Trusted Extensions to Your Site's Requirements, index iconTask Map: Configuring Trusted Extensions to Meet Your Site's Requirements
Task Map: Configuring Trusted Extensions With the Provided Defaults, index iconTask Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Preparing For and Enabling Trusted Extensions, index iconTask Map: Preparing for and Enabling Trusted Extensions
role workspace, global zone, index iconRoles in Trusted Extensions
roleadd command, index iconHow to Create the Security Administrator Role in Trusted Extensions
roles
adding LDAP role with roleadd, index iconHow to Create the Security Administrator Role in Trusted Extensions
adding local role with roleadd, index iconHow to Create the Security Administrator Role in Trusted Extensions
administering auditing, index iconRole Responsibilities for Audit Administration
assigning rights, index iconSecurity Attribute Assignment to Users in Trusted Extensions
assuming
index iconRoles in Trusted Extensions
index iconHow to Enter the Global Zone in Trusted Extensions
creating, index iconRole Creation in Trusted Extensions
creating Security Administrator, index iconHow to Create the Security Administrator Role in Trusted Extensions
determining when to create, index iconSecure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
leaving role workspace, index iconHow to Exit the Global Zone in Trusted Extensions
trusted application access, index iconAdministration Tools for Trusted Extensions
verifying they work, index iconHow to Verify That the Trusted Extensions Roles Work
workspaces, index iconRoles in Trusted Extensions
root passwords, required in Trusted Extensions, index iconPrepare an Installed Oracle Solaris System for Trusted Extensions
root role, adding device_clean script, index iconHow to Add a Device_Clean Script in Trusted Extensions
root UID, required for applications, index iconEvaluating Software for Security
route command, index iconNetwork Commands in Trusted Extensions
routing, index iconOverview of Routing in Trusted Extensions
accreditation checks, index iconTrusted Extensions Accreditation Checks
commands in Trusted Extensions, index iconRouting Commands in Trusted Extensions
concepts, index iconAdministration of Routing in Trusted Extensions
example of, index iconGateways in Trusted Extensions
tables
index iconRouting Table Entries in Trusted Extensions
index iconChoosing Routers in Trusted Extensions
using route command, index iconHow to Add Default Routes