Skip Navigation Links | |
Exit Print View | |
Trusted Extensions Configuration and Administration Oracle Solaris 11.1 Information Library |
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
6. Trusted Extensions Administration Concepts
7. Trusted Extensions Administration Tools
8. Security Requirements on a Trusted Extensions System (Overview)
9. Performing Common Tasks in Trusted Extensions
10. Users, Rights, and Roles in Trusted Extensions (Overview)
11. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
12. Remote Administration in Trusted Extensions (Tasks)
13. Managing Zones in Trusted Extensions
14. Managing and Mounting Files in Trusted Extensions
Mount Possibilities in Trusted Extensions
Trusted Extensions Policies for Mounted File Systems
Trusted Extensions Policy for Single-Level Datasets
Trusted Extensions Policy for Multilevel Datasets
No Privilege Overrides for MAC Read-Write Policy
Results of Sharing and Mounting File Systems in Trusted Extensions
Sharing and Mounting Files in the Global Zone
Sharing and Mounting Files in a Labeled Zone
mlslabel Property and Mounting Single-Level File Systems
Multilevel Datasets for Relabeling Files
Mounting Multilevel Datasets From Another System
NFS Server and Client Configuration in Trusted Extensions
Home Directory Creation in Trusted Extensions
Changes to the Automounter in Trusted Extensions
Trusted Extensions Software and NFS Protocol Versions
Backing Up, Sharing, and Mounting Labeled Files (Task Map)
How to Back Up Files in Trusted Extensions
How to Restore Files in Trusted Extensions
How to Share File Systems From a Labeled Zone
15. Trusted Networking (Overview)
16. Managing Networks in Trusted Extensions (Tasks)
17. Trusted Extensions and LDAP (Overview)
18. Multilevel Mail in Trusted Extensions (Overview)
19. Managing Labeled Printing (Tasks)
20. Devices in Trusted Extensions (Overview)
21. Managing Devices for Trusted Extensions (Tasks)
22. Trusted Extensions Auditing (Overview)
23. Software Management in Trusted Extensions
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Additional Security References
B. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
C. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Oracle Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
D. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Oracle Solaris Man Pages That Are Modified by Trusted Extensions
The following task map describes common tasks that are used to back up and restore data from labeled file systems, and to share and mount file systems that are labeled.
|
Before You Begin
You must be assigned the Media Backup rights profile. You are in the global zone.
The following commands preserve labels.
zfs send -r | -R filesystem@snap for major backups
For available methods, including sending the backup to a remote server, see Sending and Receiving ZFS Data in Oracle Solaris 11.1 Administration: ZFS File Systems.
/usr/sbin/tar cT for small backups
For details on the T option to the tar command, see the tar(1) man page.
A script that calls the zfs or tar backup commands
Before You Begin
You are in the root role in the global zone.
The following commands can restore labeled backups.
zfs receive -vF filesystem@snap for major restores
For available methods, including restoring backups from a remote server, see Sending and Receiving ZFS Data in Oracle Solaris 11.1 Administration: ZFS File Systems.
/usr/sbin/tar xT for small restores
For details on the T option to the tar command, see the tar(1) man page.
A script that calls the zfs or tar restore commands
To mount or share directories that originate in labeled zones, set the appropriate ZFS share properties on the file system, and then restart the zone to share the labeled directories.
Caution - Do not use proprietary names for shared file systems. The names of shared file systems are visible to every user. |
Before You Begin
You must be assigned the ZFS File System Management rights profile.
For details, see How to Add a Workspace at Your Minimum Label in Trusted Extensions User’s Guide.
# zfs create rpool/wdocs1
For example, the following set of commands shares a documentation file system for writers. The file system is shared read-write so that writers can modify their documents on this server. setuid programs are disallowed.
# zfs set share=name=wdocs1,path=/wdocs1,prot=nfs,setuid=off, exec=off,devices=off rpool/wdocs1 # zfs set sharenfs=on rpool/wdocs1
The command line is wrapped for display purposes.
In the global zone, run one of the following commands for each zone. Each zone can share its file systems in any of these ways. The actual sharing occurs when each zone is brought into the ready or running state.
# zoneadm -z zone-name ready
# zoneadm -z zone-name boot
# zoneadm -z zone-name reboot
In the root role in the global zone, run the following command:
# zfs get all rpool
For more information, see Querying ZFS File System Information in Oracle Solaris 11.1 Administration: ZFS File Systems
Example 14-1 Sharing the /export/share File System at the PUBLIC Label
For applications that run at the label PUBLIC, the system administrator enables users to read the documentation in the /export/reference file system of the public zone.
First, the administrator changes the workspace label to public workspace and opens a terminal window. In the window, the administrator sets selected share properties on the /reference file system. The following command is wrapped for display purposes.
# zfs set share=name=reference,path=/reference,prot=nfs, setuid=off,exec=off,devices=off,rdonly=on rpool/wdocs1
Then, the administrator shares the file system.
# zfs set sharenfs=on rpool/reference
The administrator leaves the public workspace and returns to the Trusted Path workspace. Because users are not allowed to log in to this file server, the administrator shares the file system by putting the zone in the ready state:
# zoneadm -z public ready
Users can access the shared file system once it is mounted on the users' systems.
In Trusted Extensions, a labeled zone manages the mounting of files in its zone. File systems from unlabeled and labeled hosts can be mounted on a Trusted Extensions labeled system. The system must have a route to the file server at the label of the mounting zone.
To mount the files read-write from a single-label host, the assigned label of the remote host must match the label of the mounting zone. Two remote host configurations are possible.
The untrusted remote host is assigned the same label as the mounting zone.
The trusted remote host is a multilevel server that includes the label of the mounting zone.
File systems that are mounted by a higher-level zone are read-only.
In Trusted Extensions, the auto_home configuration file is customized per zone. The file is named by zone name. For example, a system with a global zone and a public zone has two auto_home files, auto_home_global and auto_home_public.
Trusted Extensions uses the same mounting interfaces as Oracle Solaris:
By default, file systems are mounted at boot.
To mount file systems dynamically, use the mount command in the labeled zone.
To automount home directories, use the auto_home_zone-name files.
To automount other directories, use the standard automount maps.
Before You Begin
You must be on the client system, in the zone at the label of the files that you want to mount. Verify that the file system that you want to mount is shared. Unless you are using the automounter, you must be assigned the File System Management rights profile. To mount from lower-level servers, the zone on this client must be configured with the net_mac_aware privilege.
Most procedures include creating a workspace at a particular label. To create a workspace, see How to Add a Workspace at Your Minimum Label in Trusted Extensions User’s Guide.
In the labeled zone, use the mount command.
Before You Begin
You must be in the zone at the label of the file system that you want to mount. You must be the root role.
The address might be directly assigned, or indirectly assigned through a wildcard mechanism. The address can be in a labeled or unlabeled template.
The label must be consistent with the label at which you are trying to mount the files.
If the label is higher than the label of the mounted file system, then you cannot write to the mount even if the remote file system is exported with read/write permissions. You can only write to the mounted file system at the label of the mount.
To mount file systems from any of these servers, the server must be assigned to an unlabeled template.