Skip Navigation Links | |
Exit Print View | |
Trusted Extensions Configuration and Administration Oracle Solaris 11.1 Information Library |
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)
4. Configuring Trusted Extensions (Tasks)
Setting Up the Global Zone in Trusted Extensions
How to Check and Install Your Label Encodings File
How to Configure an IPv6 CIPSO Network in Trusted Extensions
How to Configure a Different Domain of Interpretation
Configuring the Network Interfaces in Trusted Extensions
How to Share a Single IP Address With All Zones
How to Add an IP Instance to a Labeled Zone
How to Add a Virtual Network Interface to a Labeled Zone
How to Connect a Trusted Extensions System to Other Trusted Extensions Systems
How to Configure a Separate Name Service for Each Labeled Zone
Creating Roles and Users in Trusted Extensions
How to Create the Security Administrator Role in Trusted Extensions
How to Create a System Administrator Role
How to Create Users Who Can Assume Roles in Trusted Extensions
How to Verify That the Trusted Extensions Roles Work
How to Enable Users to Log In to a Labeled Zone
Creating Centralized Home Directories in Trusted Extensions
How to Create the Home Directory Server in Trusted Extensions
Troubleshooting Your Trusted Extensions Configuration
How to Move Desktop Panels to the Bottom of the Screen
Additional Trusted Extensions Configuration Tasks
How to Create a Secondary Labeled Zone
How to Create and Share a Multilevel Dataset
How to Copy Files to Portable Media in Trusted Extensions
How to Copy Files From Portable Media in Trusted Extensions
How to Remove Trusted Extensions From the System
5. Configuring LDAP for Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
6. Trusted Extensions Administration Concepts
7. Trusted Extensions Administration Tools
8. Security Requirements on a Trusted Extensions System (Overview)
9. Performing Common Tasks in Trusted Extensions
10. Users, Rights, and Roles in Trusted Extensions (Overview)
11. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
12. Remote Administration in Trusted Extensions (Tasks)
13. Managing Zones in Trusted Extensions
14. Managing and Mounting Files in Trusted Extensions
15. Trusted Networking (Overview)
16. Managing Networks in Trusted Extensions (Tasks)
17. Trusted Extensions and LDAP (Overview)
18. Multilevel Mail in Trusted Extensions (Overview)
19. Managing Labeled Printing (Tasks)
20. Devices in Trusted Extensions (Overview)
21. Managing Devices for Trusted Extensions (Tasks)
22. Trusted Extensions Auditing (Overview)
23. Software Management in Trusted Extensions
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Additional Security References
B. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
C. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Oracle Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
D. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Oracle Solaris Man Pages That Are Modified by Trusted Extensions
The instructions in this section configure labeled zones. You have the option of creating two labeled zones automatically or manually creating zones.
Note - If you plan to use LDAP, go to Chapter 5, Configuring LDAP for Trusted Extensions (Tasks). You must configure LDAP before you create labeled zones.
|
This procedure creates a working Trusted Extensions system with two labeled zones. Remote hosts have not been assigned to the system's security templates, so this system cannot communicate with any remote hosts.
Before You Begin
You have completed Log In to Trusted Extensions. You have assumed the root role.
# man txzonemgr
# /usr/sbin/txzonemgr -c
This command copies the Oracle Solaris OS and Trusted Extensions software to a zone, creates a snapshot of the zone, labels the original zone, then uses the snapshot to create a second labeled zone. The zones are booted.
The first labeled zone is based on the value of Default User Sensitivity Label in the label_encodings file.
The second labeled zone is based on the value of Default User Clearance in the label_encodings file.
This step can take about 20 minutes. To install the zones, the script uses the root password from the global zone for the labeled zones.
Next Steps
To use your Trusted Extensions configuration, go to How to Assign Labels to Two Zone Workspaces.
You do not have to create a zone for every label in your label_encodings file, but you can. The administrative GUIs enumerate the labels that can have zones created for them on this system. In this procedure, you create two labeled zones. If you are using the Trusted Extensions label_encodings file, you create the default Trusted Extensions configuration.
Before You Begin
You have completed Log In to Trusted Extensions. You have assumed the root role.
You have not created a zone yet.
# txzonemgr &
The script opens the Labeled Zone Manager dialog box. This zenity dialog box prompts you for the appropriate tasks, depending on the current state of your configuration.
To perform a task, you select the menu item, then press the Return key or click OK. When you are prompted for text, type the text then press the Return key or click OK.
Tip - To view the current state of zone completion, click Return to Main Menu in the Labeled Zone Manager. Or, you can click the Cancel button.
The first labeled zone is based on the value of Default User Sensitivity Label in the label_encodings file.
The second labeled zone is based on the value of Default User Clearance in the label_encodings file
If the public zone uses an exclusive IP stack, or if it has an IP address which is defined in DNS, use the hostname as defined in DNS. Otherwise, use the name of the system.
The root password was set at system installation. The input to this prompt will fail.
Then, verify that all services are configured by running the svcs -x command. If no messages display, all services are configured.
Type exit at the prompt, and choose Close window from the Zone Console.
In another window, the installation of the second zone completes. This zone is built from a snapshot, so it builds quickly.
# svcs -x #
If no messages display, all services are configured. The Labeled Zone Manager is visible.
Select Reboot, then click the Cancel button to return to the main screen. All zones are running. The unlabeled snapshot is not running.
Follow the prompts. The GUI steps you through zone creation.
After the zone is created and booted, you can return to the global zone to create more zones. These zones are created from a snapshot.
Example 4-2 Creating Another Labeled Zone
In this example, the administrator creates a restricted zone from the default label_encodings file.
First, the administrator opens the txzonemgr script in interactive mode.
# txzonemgr &
Then, the administrator navigates to the global zone and creates a zone with the name restricted.
Create a new zone:restricted
Then, the administrator applies the correct label.
Select label:CNF : RESTRICTED
From the list, the administrator selects the Clone option and then selects snapshot as the template for the new zone.
After the restricted zone is available, the administrator clicks Boot to boot the second zone.
To enable access to the restricted zone, the administrator changes the Default User Clearance value in the label_encodings file to CNF RESTRICTED.
This procedure creates two labeled workspaces and opens a labeled window in each labeled workspace. When this task is completed, you have a working, non-networked Trusted Extensions system.
Before You Begin
You have completed either How to Create a Default Trusted Extensions System or How to Create Labeled Zones Interactively.
You are the initial user.
The label of the PUBLIC workspace corresponds to the Default User Sensitivity Label.
You are in a PUBLIC workspace.
The window is labeled PUBLIC.
If you are using a site-specific label_encodings file, you are creating a workspace from the value of Default User Clearance.
You are in an INTERNAL workspace.
The window is labeled CONFIDENTIAL : INTERNAL USE ONLY.
Your system is ready to use. You have two user workspaces and a role workspace. In this configuration, the labeled zones use the same IP address as the global zone to communicate with other systems. They can do so because, by default, they share the IP address as an all-zones interface.
Next Steps
If you plan to have your Trusted Extensions system communicate with other systems, go to Configuring the Network Interfaces in Trusted Extensions.