C
- -c option, txzonemgr script, How to Create a Default Trusted Extensions System
- CD-ROM drives, accessing, Device Protection With Trusted Extensions Software
- Change Password menu item
- description, Unique Trusted Extensions Security Features
- using to change root password, How to Change the Password for root
- Change Workspace Label menu item
- description
- Unique Trusted Extensions Security Features
- Unique Trusted Extensions Security Features
- Unique Trusted Extensions Security Features
- changing
- IDLETIME keyword, How to Modify policy.conf Defaults
- labels by authorized users, How to Enable a User to Change the Security Level of Data
- rules for label changes, sel_config File
- security level of data, How to Enable a User to Change the Security Level of Data
- system security defaults, How to Change Security Defaults in System Files
- user privileges, How to Restrict a User's Set of Privileges
- checking
- label_encodings file, How to Check and Install Your Label Encodings File
- roles are working, How to Verify That the Trusted Extensions Roles Work
- checklists for initial setup team, Checklist for Configuring Trusted Extensions
- chk_encodings command, How to Check and Install Your Label Encodings File
- choosing, See selecting
- classification label component, Dominance Relationships Between Labels
- clearances, label overview, Labels in Trusted Extensions Software
- collecting information, for LDAP service, Collect Information for the Directory Server for LDAP
- colors, indicating label of workspace, What Labels Protect and Where Labels Appear
- commands
- executing with privilege, How to Enter the Global Zone in Trusted Extensions
- troubleshooting networking, How to Debug the Trusted Extensions Network
- commercial applications, evaluating, Security Administrator Responsibilities for Trusted Programs
- Common Tasks in Trusted Extensions (Task Map), Common Tasks in Trusted Extensions (Task Map)
- compartment label component, Dominance Relationships Between Labels
- component definitions, label_encodings file, Label Encodings File
- computer access
- administrator responsibilities, Information Protection
- restricting, Effects of Label Range on a Device
- configuration files
- copying, How to Copy Files to Portable Media in Trusted Extensions
- loading, How to Copy Files From Portable Media in Trusted Extensions
- Configure Device Attributes authorization, How to Assign Device Authorizations
- configuring
- access to remote Trusted Extensions, Remote Administration in Trusted Extensions (Tasks)
- authorizations for devices, How to Create New Device Authorizations
- by assuming a limited role or as root, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- devices, How to Configure a Device in Trusted Extensions
- labeled printing, Configuring Labeled Printing (Task Map)
- LDAP for Trusted Extensions, Configuring the Oracle Directory Server Enterprise Edition on a Trusted Extensions System
- LDAP proxy server for Trusted Extensions clients, Creating a Trusted Extensions Proxy for an Existing Oracle Directory Server Enterprise Edition
- logical interfaces, How to Add an IP Instance to a Labeled Zone
- network interfaces
- How to Share a Single IP Address With All Zones
- How to Connect a Trusted Extensions System to Other Trusted Extensions Systems
- routes with security attributes, How to Add Default Routes
- startup files for users, How to Configure Startup Files for Users in Trusted Extensions
- Trusted Extensions, Configuring Trusted Extensions (Tasks)
- Trusted Extensions labeled zones, Creating Labeled Zones
- trusted network, Managing Networks in Trusted Extensions (Tasks)
- VNICs, How to Add a Virtual Network Interface to a Labeled Zone
- Configuring an LDAP Proxy Server on a Trusted Extensions System (Task Map), Configuring an LDAP Proxy Server on a Trusted Extensions System (Task Map)
- Configuring Labeled IPsec (Task Map), Configuring Labeled IPsec (Task Map)
- Configuring Labeled Printing (Task Map), Configuring Labeled Printing (Task Map)
- Configuring LDAP on a Trusted Extensions Network (Task Map), Configuring LDAP on a Trusted Extensions Network (Task Map)
- configuring Trusted Extensions
- checklist for initial setup team, Checklist for Configuring Trusted Extensions
- initial procedures, Configuring Trusted Extensions (Tasks)
- labeled zones, Creating Labeled Zones
- remote access, Remote Administration in Trusted Extensions (Tasks)
- task maps, Configuration Roadmap for Trusted Extensions
- controlling, See restricting
- .copy_files file
- description, .copy_files and .link_files Files
- setting up for users
- How to Configure Startup Files for Users in Trusted Extensions
- How to Configure Startup Files for Users in Trusted Extensions
- creating
- accounts, Creating Roles and Users in Trusted Extensions
- accounts during or after configuration, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- authorizations for devices, How to Create New Device Authorizations
- home directories
- Creating Centralized Home Directories in Trusted Extensions
- Home Directory Creation in Trusted Extensions
- home directory server, How to Create the Home Directory Server in Trusted Extensions
- labeled zones, Creating Labeled Zones
- LDAP client, Make the Global Zone an LDAP Client in Trusted Extensions
- LDAP proxy server for Trusted Extensions clients, Create an LDAP Proxy Server
- LDAP role with roleadd, How to Create the Security Administrator Role in Trusted Extensions
- local role with roleadd, How to Create the Security Administrator Role in Trusted Extensions
- local user with useradd, How to Create Users Who Can Assume Roles in Trusted Extensions
- roles, Creating Roles and Users in Trusted Extensions
- users who can assume roles, How to Create Users Who Can Assume Roles in Trusted Extensions
- zones, Creating Labeled Zones
- Creating Labeled Zones, Creating Labeled Zones
- customizing
- device authorizations, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- label_encodings file, Label Encodings File
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user accounts, Customizing the User Environment for Security (Task Map)
- Customizing Device Authorizations in Trusted Extensions (Task Map), Customizing Device Authorizations in Trusted Extensions (Task Map)
- Customizing User Environment for Security (Task Map), Customizing the User Environment for Security (Task Map)
- cut and paste, and labels, Rules When Changing the Level of Security for Data
- cutting and pasting, configuring rules for label changes, sel_config File