JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions Configuration and Administration     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)

Initial Setup Team Responsibilities

Preparing an Oracle Solaris System and Adding Trusted Extensions

Install an Oracle Solaris System Securely

Prepare an Installed Oracle Solaris System for Trusted Extensions

Add Trusted Extensions Packages to an Oracle Solaris System

Resolving Security Issues Before Enabling Trusted Extensions

Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions

Enabling the Trusted Extensions Service and Logging In

Enable Trusted Extensions and Reboot

Log In to Trusted Extensions

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

6.  Trusted Extensions Administration Concepts

7.  Trusted Extensions Administration Tools

8.  Security Requirements on a Trusted Extensions System (Overview)

9.  Performing Common Tasks in Trusted Extensions

10.  Users, Rights, and Roles in Trusted Extensions (Overview)

11.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

12.  Remote Administration in Trusted Extensions (Tasks)

13.  Managing Zones in Trusted Extensions

14.  Managing and Mounting Files in Trusted Extensions

15.  Trusted Networking (Overview)

16.  Managing Networks in Trusted Extensions (Tasks)

17.  Trusted Extensions and LDAP (Overview)

18.  Multilevel Mail in Trusted Extensions (Overview)

19.  Managing Labeled Printing (Tasks)

20.  Devices in Trusted Extensions (Overview)

21.  Managing Devices for Trusted Extensions (Tasks)

22.  Trusted Extensions Auditing (Overview)

23.  Software Management in Trusted Extensions

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

Preparing an Oracle Solaris System and Adding Trusted Extensions

The choice of Oracle Solaris installation options can affect the use and security of Trusted Extensions:

Install an Oracle Solaris System Securely

This task applies to fresh installations of Oracle Solaris. If you are upgrading, see Prepare an Installed Oracle Solaris System for Trusted Extensions.

  1. When installing the Oracle Solaris OS, create a user account and the root role account.

    In Trusted Extensions, you use the root role, as well as roles that you create, to configure the system.

  2. When you first log in to Oracle Solaris, assign a password to the root role account.
    1. Open a terminal window.
    2. Assume the root role.

      At the prompt, provide a password that is different from your user account password.

      % su -
      Your password has expired. Create a new password.
      Enter new password: Type a password for root
      Retype the password: Retype the root password
      #

      Assign a password of at least six alphanumeric characters. The password must be difficult to guess, thus reducing the chance of an adversary gaining unauthorized access by attempting to guess passwords.

Next Steps

Continue with Add Trusted Extensions Packages to an Oracle Solaris System.

Prepare an Installed Oracle Solaris System for Trusted Extensions

This task applies to Oracle Solaris systems that have been in use, and on which you plan to run Trusted Extensions.

Before You Begin

You must be in the root role in the global zone.

  1. If non-global zones are installed on your system, remove them.

    The Trusted Extensions labeled brand is an exclusive brand of zones. Refer to the brands(5) and trusted_extensions(5) man pages.

  2. If your system does not have a root password, create one.

    Note - Users must not disclose their passwords to another person, as that person might then have access to the data of the user and will not be uniquely identified or accountable. Note that disclosure can be direct, through the user deliberately disclosing her/his password to another person, or indirect, for example, through writing it down, or choosing an insecure password. Oracle Solaris provides protection against insecure passwords, but cannot prevent a user from disclosing her or his password, or from writing it down.


Next Steps

Continue with Add Trusted Extensions Packages to an Oracle Solaris System.

Add Trusted Extensions Packages to an Oracle Solaris System

Before You Begin

You have completed either Prepare an Installed Oracle Solaris System for Trusted Extensions or Install an Oracle Solaris System Securely.

You must be assigned the Software Installation rights profile.

  1. After logging in as the initial user, assume the root role in a terminal window.
    % su -
    Enter Password: Type root password
    #
  2. Download and install the Trusted Extensions package.

    Use either the command line or the Package Manager GUI.

    • In the terminal window, use the pkg install command.
      $ pkg install system/trusted/trusted-extensions

      To install trusted locales, specify the short name for the locale. For example, the following command installs the Japanese locale:

      $ pkg install system/trusted/locale/ja &
    • In the terminal window, start the Package Manager GUI.
      $ packagemanager &
      1. Select the Trusted Extensions packages.
        1. Show the categories in the Desktop (GNOME) category.
        2. Select the Trusted Extensions category.
        3. In the list of packages, click the checkbox for trusted-extensions.
        4. (Optional) In the list of packages, click the checkbox for any locales that you want to install.
      2. To add the packages, click the Install/Update icon.