| Skip Navigation Links | |
| Exit Print View | |
|
Trusted Extensions Configuration and Administration Oracle Solaris 11 Information Library |
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding the Trusted Extensions Feature to Oracle Solaris (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
6. Trusted Extensions Administration Concepts
7. Trusted Extensions Administration Tools
8. Security Requirements on a Trusted Extensions System (Overview)
9. Performing Common Tasks in Trusted Extensions (Tasks)
10. Users, Rights, and Roles in Trusted Extensions (Overview)
11. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
12. Remote Administration in Trusted Extensions (Tasks)
13. Managing Zones in Trusted Extensions (Tasks)
14. Managing and Mounting Files in Trusted Extensions (Tasks)
15. Trusted Networking (Overview)
16. Managing Networks in Trusted Extensions (Tasks)
17. Trusted Extensions and LDAP (Overview)
18. Multilevel Mail in Trusted Extensions (Overview)
19. Managing Labeled Printing (Tasks)
20. Devices in Trusted Extensions (Overview)
21. Managing Devices for Trusted Extensions (Tasks)
22. Trusted Extensions Auditing (Overview)
23. Software Management in Trusted Extensions (Reference)
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Additional Security References
B. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
C. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Oracle Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
D. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Oracle Solaris Man Pages That Are Modified by Trusted Extensions
Add Trusted Extensions Packages to an Oracle Solaris System
How to Move Desktop Panels to the Bottom of the Screen
Security Attribute Assignment to Users in Trusted Extensions
How to Change the Password for root
How to Enforce a New Local User Password in a Labeled Zone
Unique Trusted Extensions Security Features
Unique Trusted Extensions Security Features
Password Protection
How to Regain Control of the Desktop's Current Focus
Planning User Security in Trusted Extensions
Devising an Administration Strategy for Trusted Extensions
Planning for Auditing in Trusted Extensions
Planning System Hardware and Capacity for Trusted Extensions
Devising a Label Strategy
Planning for Multilevel Services
Planning for the LDAP Naming Service in Trusted Extensions
Planning Your Trusted Network
Planning for Security in Trusted Extensions
Devising a Configuration Strategy for Trusted Extensions
Planning for Zones in Trusted Extensions
How to Change Security Defaults in System Files
How to Modify policy.conf Defaults
policy.conf File Defaults in Trusted Extensions
How to Modify policy.conf Defaults
How to Enable Users to Print PostScript Files in Trusted Extensions
PostScript Printing of Security Information
How to Create a Rights Profile for Convenient Authorizations
Effects of Label Range on a Device
Label Encodings File
How to Modify policy.conf Defaults
How to Configure a Multilevel Print Server and Its Printers
How to Enable a Trusted Extensions Client to Access a Printer
How to Configure a Zone As a Single-Level Print Server
How to Assign a Label to an Unlabeled Print Server
How to Assign a Label to an Unlabeled Print Server
Labels, Printers, and Printing
How to Enable Users to Print PostScript Files in Trusted Extensions
PostScript Printing of Security Information
How to Remove Labels From Printed Output
How to Assign a Label to an Unlabeled Print Server
How to Create a Rights Profile for Convenient Authorizations
How to Configure a Restricted Label Range for a Printer
How to Assign a Label to an Unlabeled Print Server
Security Attribute Assignment to Users in Trusted Extensions
Evaluating Software for Security
How to Modify policy.conf Defaults
How to Restrict a User's Set of Privileges
How to Enter the Global Zone in Trusted Extensions
How to Modify policy.conf Defaults
What Labels Protect and Where Labels Appear
Label Ranges
How to Modify policy.conf Defaults
How to Protect Nonallocatable Devices in Trusted Extensions
How to Share File Systems From a Labeled Zone
How to Disable the Mounting of Lower-Level Files
How to Limit the Hosts That Can Be Contacted on the Trusted Network
What Labels Protect and Where Labels Appear
How to Limit the Hosts That Can Be Contacted on the Trusted Network
How to Protect Nonallocatable Devices in Trusted Extensions
Using the LDAP Naming Service in Trusted Extensions
Additional Security References