JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

S

scripts
getmounts, index iconHow to Display the Labels of Mounted Files
/usr/bin/txzonemgr, index iconHow to Display Ready or Running Zones
/usr/sbin/txzonemgr
index iconAdministration Tools for Trusted Extensions
index iconZone Administration Utilities in Trusted Extensions
secure attention, key combination, index iconHow to Regain Control of the Desktop's Current Focus
security
initial setup team, index iconInitial Setup Team Responsibilities
publications, index iconAdditional Security References
root password, index iconPrepare an Installed Oracle Solaris System for Trusted Extensions
site security policy, index iconSite Security Policy
Security Administrator role
administering printer security, index iconLabels, Printers, and Printing
administering users, index iconManaging Users and Rights (Task Map)
assigning authorizations to users, index iconHow to Create a Rights Profile for Convenient Authorizations
configuring a device, index iconHow to Configure a Device in Trusted Extensions
creating, index iconHow to Create the Security Administrator Role in Trusted Extensions
creating Convenient Authorizations rights profile, index iconHow to Create a Rights Profile for Convenient Authorizations
enabling unlabeled body pages from a public system, index iconHow to Modify policy.conf Defaults
enforcing security, index iconEnforcement of Device Security in Trusted Extensions
protecting nonallocatable devices, index iconHow to Protect Nonallocatable Devices in Trusted Extensions
security administrators, See Security Administrator role
security attributes, index iconRouting Table Entries in Trusted Extensions
modifying defaults for all users, index iconHow to Modify policy.conf Defaults
modifying user defaults, index iconHow to Modify Default User Label Attributes
setting for remote hosts, index iconCreating Security Templates (Tasks)
using in routing, index iconHow to Add Default Routes
security information
on printouts, index iconLabeled Printer Output
planning for Trusted Extensions, index iconResolving Additional Issues Before Enabling Trusted Extensions
security label set, remote host templates, index iconNetwork Security Attributes in Trusted Extensions
security mechanisms
extensible, index iconExtension of Oracle Solaris Security Features by Trusted Extensions
Oracle Solaris, index iconSecurity Mechanisms for Oracle Solaris Software
security policy
auditing, index iconTrusted Extensions Audit Policy Options
training users, index iconUsers and Security Requirements
users and devices, index iconEnforcement of Device Security in Trusted Extensions
security templates
See remote host templates
sel_config file
index iconsel_config File
index iconsel_config File
selecting, audit records by label, index iconAudit Tasks in Trusted Extensions
Selection Manager
configuring rules for selection confirmer, index iconsel_config File
default configuration, index iconRules When Changing the Level of Security for Data
Service Management Framework (SMF)
dpadm, index iconInstall the Oracle Directory Server Enterprise Edition
dsadm, index iconInstall the Oracle Directory Server Enterprise Edition
labeld service, index iconEnable Trusted Extensions and Reboot
session range, index iconLabel Ranges
sessions, failsafe, index iconHow to Log In to a Failsafe Session in Trusted Extensions
Setting Up Remote Administration in Trusted Extensions (Task Map), index iconConfiguring and Administering Remote Systems in Trusted Extensions (Task Map)
sharing
IP addresses, index iconHow to Assign Labels to Two Zone Workspaces
with Vino, index iconHow to Configure a Trusted Extensions System With Xvnc for Remote Access
ZFS dataset from labeled zone, index iconHow to Share a ZFS Dataset From a Labeled Zone
Shutdown authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
similarities
between Trusted Extensions and Oracle Solaris auditing, index iconTrusted Extensions and Auditing
between Trusted Extensions and Oracle Solaris OS, index iconSimilarities Between Trusted Extensions and the Oracle Solaris OS
single-label
login, index iconLabel Ranges
printing in a zone, index iconHow to Configure a Zone as a Single-Level Print Server
site security policy
common violations, index iconCommon Security Violations
personnel recommendations, index iconPersonnel Security Recommendations
physical access recommendations, index iconPhysical Security Recommendations
recommendations, index iconComputer Security Recommendations
tasks involved, index iconSite Security Policy
Trusted Extensions configuration decisions, index iconSite Security Policy and Trusted Extensions
understanding, index iconUnderstanding Your Site's Security Policy
snoop command
index iconNetwork Commands in Trusted Extensions
index iconHow to Debug the Trusted Extensions Network
software
administering third-party, index iconSoftware Management in Trusted Extensions
importing, index iconAdding Software to Trusted Extensions
solaris.print.admin, authorization, index iconTrusted Extensions Print Interfaces (Reference)
solaris.print.list, authorization, index iconTrusted Extensions Print Interfaces (Reference)
solaris.print.nobanner, authorization, index iconTrusted Extensions Print Interfaces (Reference)
solaris.print.nobanner authorization, index iconHow to Modify policy.conf Defaults
solaris.print.unlabeled, authorization, index iconTrusted Extensions Print Interfaces (Reference)
solaris.print.unlabeled authorization, index iconHow to Modify policy.conf Defaults
startup files, procedures for customizing, index iconHow to Configure Startup Files for Users in Trusted Extensions
Stop-A, enabling, index iconHow to Change Security Defaults in System Files
Sun Ray systems
0.0.0.0/32 address for client contact, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
enabling initial contact between client and server, index iconHow to Limit the Hosts That Can Be Contacted on the Trusted Network
LDAP servers, and, index iconConfiguring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
preventing users from seeing others' processes, index iconHow to Modify policy.conf Defaults
web site for documentation, index iconTask Map: Choosing a Trusted Extensions Configuration
System Administrator role
administering printers, index iconLabels, Printers, and Printing
creating, index iconHow to Create a System Administrator Role
reclaiming a device, index iconHow to Revoke or Reclaim a Device in Trusted Extensions
reviewing audit records, index iconAudit Tasks in Trusted Extensions
system files
editing, index iconHow to Change Security Defaults in System Files
label_encodings, index iconHow to Check and Install Your Label Encodings File
sel_config, index iconsel_config File
tsol_separator.ps, index iconHow to Enable Specific Users and Roles to Bypass Labeling Printed Output