JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions User's Guide     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

1.  Introduction to Trusted Extensions

2.  Logging In to Trusted Extensions (Tasks)

3.  Working in Trusted Extensions (Tasks)

4.  Elements of Trusted Extensions (Reference)

Glossary

Index

Preface

The Trusted Extensions User's Guide is a guide to working in the Oracle Solaris operating system (Oracle Solaris OS) with the Trusted Extensions feature enabled.

Who Should Use This Guide

This guide is for all users of Trusted Extensions. As a prerequisite, you must be familiar with the Oracle Solaris OS and the open source GNOME desktop.

You must also be familiar with the security policy of your organization.

How the Trusted Extensions Guides Are Organized

The following table lists the topics that are covered in the Trusted Extensions guides and the audience for each guide.

Title of Guide
Topics
Audience
Describes the basic features of Trusted Extensions. This guide contains a glossary.
End users, administrators, developers
Part I describes how to prepare for, enable, and initially configure Trusted Extensions.

Part II describes how to administer a Trusted Extensions system. This guide contains a glossary.

Administrators, developers
Describes how to develop applications with Trusted Extensions.
Developers, administrators
Provides information about how to specify label components in the label encodings file.
Administrators
Describes the syntax used in the label encodings file. The syntax enforces the various rules for well-formed labels for a system.
Administrators

How This Guide Is Organized

Chapter 1, Introduction to Trusted Extensions describes the basic concepts that are implemented on an Oracle Solaris system with the Trusted Extensions feature.

Chapter 2, Logging In to Trusted Extensions (Tasks) presents procedures for accessing a system and for leaving a Trusted Extensions system.

Chapter 3, Working in Trusted Extensions (Tasks) describes how to use Trusted Extensions to perform your job.

Chapter 4, Elements of Trusted Extensions (Reference) explains the key elements in a system with the Trusted Extensions feature.

Glossary describes security terms that are used in Trusted Extensions.

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P-1 Typographic Conventions

Typeface
Description
Example
AaBbCc123
The names of commands, files, and directories, and onscreen computer output
Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123
What you type, contrasted with onscreen computer output
machine_name% su

Password:

aabbcc123
Placeholder: replace with a real name or value
The command to remove a file is rm filename.
AaBbCc123
Book titles, new terms, and terms to be emphasized
Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows UNIX system prompts and superuser prompts for shells that are included in the Oracle Solaris OS. In command examples, the shell prompt indicates whether the command should be executed by a regular user or a user with privileges.

Table P-2 Shell Prompts

Shell
Prompt
Bash shell, Korn shell, and Bourne shell
$
Bash shell, Korn shell, and Bourne shell for superuser
#
C shell
machine_name%
C shell for superuser
machine_name#