Skip Navigation Links | |
Exit Print View | |
Trusted Extensions Configuration and Administration Oracle Solaris 11.1 Information Library |
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
6. Trusted Extensions Administration Concepts
7. Trusted Extensions Administration Tools
8. Security Requirements on a Trusted Extensions System (Overview)
9. Performing Common Tasks in Trusted Extensions
10. Users, Rights, and Roles in Trusted Extensions (Overview)
11. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
12. Remote Administration in Trusted Extensions (Tasks)
13. Managing Zones in Trusted Extensions
14. Managing and Mounting Files in Trusted Extensions
15. Trusted Networking (Overview)
16. Managing Networks in Trusted Extensions (Tasks)
17. Trusted Extensions and LDAP (Overview)
18. Multilevel Mail in Trusted Extensions (Overview)
19. Managing Labeled Printing (Tasks)
20. Devices in Trusted Extensions (Overview)
21. Managing Devices for Trusted Extensions (Tasks)
22. Trusted Extensions Auditing (Overview)
23. Software Management in Trusted Extensions
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Additional Security References
B. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
C. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Oracle Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
D. List of Trusted Extensions Man Pages
Oracle Solaris Man Pages That Are Modified by Trusted Extensions
The following man pages are relevant only on a system that is configured with Trusted Extensions. The description includes links to examples or explanations of these features in the Trusted Extensions document set.
Purpose and Links to Additional Information
Enables a device to be allocated by adding the device to device allocation databases. By default, removable devices are allocatable.
Converts a human-readable label to its internal text equivalent.
For an example, see How to Obtain the Hexadecimal Equivalent for a Label.
Compares binary labels.
Determines the bound of two labels.
Checks the label encodings file syntax.
For examples, see How to Debug a label_encodings File in Trusted Extensions Label Administration and Example 4-1.
Gets the file's label
Displays the label of the selected files or directories.
For an example, see How to Display the Labels of Mounted Files.
Gets the label of a file
Gets the zone pathname
Gets the label of a process
Gets the label range of a user
Gets zone ID from zone label
Gets zone label from zone ID
Gets zone label from zone name
Displays the root path of the zone that corresponds to the specified label.
Acquiring a Sensitivity Label in Trusted Extensions Developer’s Guide
Gets zone root pathname from zone root ID
Gets zone root pathname from zone label
Gets zone root pathname from zone name
Converts an internal text label to its human-readable equivalent
For an example, see How to Obtain a Readable Label From Its Hexadecimal Form.
Translates a binary label and clips the label to the specified width
Describes the label encodings file
Converts labels to human-readable strings
Describes Trusted Extensions label attributes
Is the Trusted Extensions network library
Is the Trusted Extensions library
Allocates and frees resources for a new label
Checks account limitations that are due to labels
For an example of its use, see How to Log In and Administer a Remote Trusted Extensions System.
Gets the label of a process
Prevents allocation of a device by removing its entry from device allocation databases
For an example, see How to Configure a Device in Trusted Extensions.
Is the selection rules for copy, cut, paste, and drag-and-drop operations
Moves a file to a zone with the corresponding sensitivity label
Relabels the selected item. Requires the solaris.label.file.downgrade or solaris.label.file.upgrade authorization. These authorizations are in the Object Label Management rights profile.
Parses human-readable strings to a label
Manages the trusted network databases. An alternative to the txzonmgr GUI for managing the trusted network. The list subcommand displays the security characteristics of network interfaces. tncfg provides more complete information than the tninfo command.
For many examples, see Chapter 16, Managing Networks in Trusted Extensions (Tasks).
Configures Trusted Extensions network parameters. You can also use the tncfg command.
For an example, see Example 12-1.
Executes the trusted network daemon when the LDAP naming service is enabled.
Displays kernel-level Trusted Extensions network information and statistics.
How to Debug the Trusted Extensions Network. You can also use the tncfg command and the txzonemgr GUI.
For a comparison with the tncfg command, see How to Troubleshoot Mount Failures in Trusted Extensions.
Introduces Trusted Extensions
Manages labeled zones and network interfaces. Command-line options enable automatic creation of two zones. This command accepts a configuration file as input and enables the deletion of zones. txzonemgr is a zenity (1) script.
See Creating Labeled Zones and Troubleshooting the Trusted Network (Task Map).
Is the configuration file for Trusted Extensions X Server Extension
Gets the host type from Trusted Extensions network information
Enables you to create a label builder GUI
For more information, see tgnome-selectlabel Utility in Trusted Extensions Developer’s Guide.
Updates the home directory copy and link files for the current label
See How to Configure Startup Files for Users in Trusted Extensions.
Gets the label attributes of an X client
Gets the label attributes of a window property
Gets the label of a window property
Gets the UID of a window property
Gets all label attributes of a window or a pixmap
Gets the label of a window, a pixmap, or a colormap
Gets the UID of a window or a pixmap
Gets the height of the screen stripe
Gets the ownership of the workstation
Determines if a window is created by a trusted client
Make this window a Trusted Path window
Sets polyinstantiation information
Sets the label of a window property
Sets the UID of a window property
Sets the label of a window or a pixmap
Sets the UID of a window, a pixmap, or a colormap
Sets the session high sensitivity label to the window server
Sets the session low sensitivity label to the window server
Sets the height of the screen stripe
Sets the ownership of the workstation