Skip Navigation Links | |
Exit Print View | |
Trusted Extensions Configuration and Administration Oracle Solaris 11.1 Information Library |
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)
Initial Setup Team Responsibilities
Preparing an Oracle Solaris System and Adding Trusted Extensions
Install an Oracle Solaris System Securely
Prepare an Installed Oracle Solaris System for Trusted Extensions
Resolving Security Issues Before Enabling Trusted Extensions
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
Enabling the Trusted Extensions Service and Logging In
Enable Trusted Extensions and Reboot
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
6. Trusted Extensions Administration Concepts
7. Trusted Extensions Administration Tools
8. Security Requirements on a Trusted Extensions System (Overview)
9. Performing Common Tasks in Trusted Extensions
10. Users, Rights, and Roles in Trusted Extensions (Overview)
11. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
12. Remote Administration in Trusted Extensions (Tasks)
13. Managing Zones in Trusted Extensions
14. Managing and Mounting Files in Trusted Extensions
15. Trusted Networking (Overview)
16. Managing Networks in Trusted Extensions (Tasks)
17. Trusted Extensions and LDAP (Overview)
18. Multilevel Mail in Trusted Extensions (Overview)
19. Managing Labeled Printing (Tasks)
20. Devices in Trusted Extensions (Overview)
21. Managing Devices for Trusted Extensions (Tasks)
22. Trusted Extensions Auditing (Overview)
23. Software Management in Trusted Extensions
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Additional Security References
B. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
C. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Oracle Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
D. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Oracle Solaris Man Pages That Are Modified by Trusted Extensions
The choice of Oracle Solaris installation options can affect the use and security of Trusted Extensions:
To properly support Trusted Extensions, you must install the underlying Oracle Solaris OS securely. For Oracle Solaris installation choices that affect Trusted Extensions, see Install an Oracle Solaris System Securely.
If you have been using the Oracle Solaris OS, check your current configuration against the requirements for Trusted Extensions. For factors that affect Trusted Extensions, see Prepare an Installed Oracle Solaris System for Trusted Extensions.
This task applies to fresh installations of Oracle Solaris. If you are upgrading, see Prepare an Installed Oracle Solaris System for Trusted Extensions.
In Trusted Extensions, you use the root role, as well as roles that you create, to configure the system.
At the prompt, provide a password that is different from your user account password.
% su - Your password has expired. Create a new password. Enter new password: Type a password for root Retype the password: Retype the root password #
Assign a password of at least six alphanumeric characters. The password must be difficult to guess, thus reducing the chance of an adversary gaining unauthorized access by attempting to guess passwords.
Next Steps
Continue with Add Trusted Extensions Packages to an Oracle Solaris System.
This task applies to Oracle Solaris systems that have been in use, and on which you plan to run Trusted Extensions.
Before You Begin
You must be in the root role in the global zone.
The Trusted Extensions labeled brand is an exclusive brand of zones. Refer to the brands(5) and trusted_extensions(5) man pages.
Note - Users must not disclose their passwords to another person, as that person might then have access to the data of the user and will not be uniquely identified or accountable. Note that disclosure can be direct, through the user deliberately disclosing her/his password to another person, or indirect, for example, through writing it down, or choosing an insecure password. Oracle Solaris provides protection against insecure passwords, but cannot prevent a user from disclosing her or his password, or from writing it down.
Next Steps
Continue with Add Trusted Extensions Packages to an Oracle Solaris System.
Before You Begin
You have completed either Prepare an Installed Oracle Solaris System for Trusted Extensions or Install an Oracle Solaris System Securely.
You must be assigned the Software Installation rights profile.
% su - Enter Password: Type root password #
Use either the command line or the Package Manager GUI.
$ pkg install system/trusted/trusted-extensions
To install trusted locales, specify the short name for the locale. For example, the following command installs the Japanese locale:
$ pkg install system/trusted/locale/ja &
$ packagemanager &