D
- DAC, See discretionary access control (DAC)
- data, relabeling efficiently, How to Create and Share a Multilevel Dataset
- databases
- in LDAP, Using the LDAP Naming Service in Trusted Extensions
- trusted network, Network Configuration Databases in Trusted Extensions
- datasets, See ZFS
- deallocating, forcing, How to Revoke or Reclaim a Device in Trusted Extensions
- debugging, See troubleshooting
- deciding
- to configure by assuming a limited role or as root, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- to use an Oracle-supplied encodings file, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- decisions to make
- based on site security policy, Site Security Policy and Trusted Extensions
- before enabling Trusted Extensions, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- deleting, labeled zones, How to Remove Trusted Extensions From the System
- desktops
- accessing multilevel remotely, How to Configure a Trusted Extensions System With Xvnc for Remote Access
- logging in to a failsafe session, How to Log In to a Failsafe Session in Trusted Extensions
- moving panels to bottom of screen, How to Move Desktop Panels to the Bottom of the Screen
- using Vino to share, How to Configure a Trusted Extensions System With Xvnc for Remote Access
- workspace color changes, How to Enter the Global Zone in Trusted Extensions
- /dev/kmem kernel image file, security violation, Evaluating Software for Security
- developer responsibilities, Developer Responsibilities When Creating Trusted Programs
- device allocation
- authorizing, How to Assign Device Authorizations
- overview, Device Protection With Trusted Extensions Software
- profiles that include allocation authorizations, How to Assign Device Authorizations
- device-clean scripts
- adding to devices, How to Add a Device_Clean Script in Trusted Extensions
- requirements, Device-Clean Scripts
- Device Manager
- administrative tool, Administration Tools for Trusted Extensions
- description, Device Manager GUI
- use by administrators, How to Configure a Device in Trusted Extensions
- devices
- access policy, Device Access Policies
- accessing, Device Manager GUI
- adding customized authorizations, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- adding device_clean script, How to Add a Device_Clean Script in Trusted Extensions
- administering, Managing Devices for Trusted Extensions (Tasks)
- administering with Device Manager, How to Configure a Device in Trusted Extensions
- allocating, Device Protection With Trusted Extensions Software
- configuring devices, How to Configure a Device in Trusted Extensions
- creating new authorizations, How to Create New Device Authorizations
- in Trusted Extensions, Devices in Trusted Extensions (Overview)
- policy defaults, Device Access Policies
- preventing remote allocation of audio, How to Protect Nonallocatable Devices in Trusted Extensions
- protecting, Device Manager
- protecting nonallocatable, How to Protect Nonallocatable Devices in Trusted Extensions
- reclaiming, How to Revoke or Reclaim a Device in Trusted Extensions
- setting label range for nonallocatable, Effects of Label Range on a Device
- setting policy, Device Access Policies
- troubleshooting, How to Revoke or Reclaim a Device in Trusted Extensions
- using, Using Devices in Trusted Extensions (Task Map)
- differences
- administrative interfaces in Trusted Extensions, Administrative Interfaces in Trusted Extensions
- between Trusted Extensions and Oracle Solaris auditing, Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS, Differences Between Trusted Extensions and the Oracle Solaris OS
- defaults in Trusted Extensions, Tighter Security Defaults in Trusted Extensions
- extending Oracle Solaris interfaces, Oracle Solaris Interfaces Extended by Trusted Extensions
- limited options in Trusted Extensions, Limited Options in Trusted Extensions
- directories
- accessing lower-level, Zones in Trusted Extensions
- authorizing a user or role to change label of, How to Enable a User to Change the Security Level of Data
- for naming service setup, Populate the Oracle Directory Server Enterprise Edition
- mounting, How to Share File Systems From a Labeled Zone
- sharing, How to Share File Systems From a Labeled Zone
- disabling, Trusted Extensions, How to Remove Trusted Extensions From the System
- discretionary access control (DAC), Trusted Extensions and Access Control
- diskettes, accessing, Device Protection With Trusted Extensions Software
- displaying
- labels of file systems in labeled zone, How to Display the Labels of Mounted Files
- status of every zone, How to Display Ready or Running Zones
- DOI, remote host templates, Network Security Attributes in Trusted Extensions
- domain of interpretation (DOI), modifying, How to Configure a Different Domain of Interpretation
- dominance of labels, Dominance Relationships Between Labels
- Downgrade DragNDrop or CutPaste Info authorization, How to Create a Rights Profile for Convenient Authorizations
- Downgrade File Label authorization, How to Create a Rights Profile for Convenient Authorizations
- downgrading labels, configuring rules for selection confirmer, sel_config File
- dpadm service, Install the Oracle Directory Server Enterprise Edition
- DragNDrop or CutPaste without viewing contents authorization, How to Create a Rights Profile for Convenient Authorizations
- dsadm service, Install the Oracle Directory Server Enterprise Edition
- dtsession command, running updatehome, .copy_files and .link_files Files