Go to main content
Index
A
- access See
computer access- remote systems
Remote Administration in Trusted Extensions
- access policy
- Discretionary Access Control (DAC)
Differences Between Trusted Extensions and the Oracle Solaris OS
Trusted Extensions and the Oracle Solaris OS
- Mandatory Access Control (MAC)
Differences Between Trusted Extensions and the Oracle Solaris OS
- accessing
- home directories
Zones in Trusted Extensions
- labeled zones by users
How to Enable Users to Log In to a Labeled
Zone
- printers
Labels, Printers, and Printing
- remote desktop
How to Configure a Trusted Extensions System With Xvnc for Remote Access
- ZFS dataset mounted in lower-level zone from higher-level zone
Sharing and Mounting a ZFS Dataset From Labeled Zones
- account locking
- preventing for users who can assume roles
How to Prevent Account Locking
for Users
- account-policy SMF stencil
How to Modify policy.conf Defaults
Customizing the User Environment for Security
Security Attributes That Must Be Assigned to Users
policy.conf File Defaults in Trusted Extensions
How to Change Security Defaults in System
Files
Applications That Are Restricted to a Labeled Zone
- accounts
- See Also
roles - See Also
users
- creating
Creating Roles and Users in Trusted Extensions
- planning
Planning User Security in Trusted Extensions
- accreditation checks
Trusted Extensions Accreditation Checks
- accreditation ranges
- label_encodings file
Label Encodings File
- adding
- IPsec protections
How to Apply IPsec Protections in
a Multilevel Trusted Extensions Network
- LDAP role with roleadd
Creating the Security Administrator Role in LDAP
- local role with roleadd
How to Create the Security Administrator
Role in Trusted Extensions
- local user with useradd
Using the useradd Command to Create a Local User
- multilevel dataset
How to Create and Share a Multilevel Dataset
- network databases to LDAP server
Populate the LDAP Server With Trusted Extensions Data
- nscd daemon to every labeled zone
How to Configure a Separate Name Service for
Each Labeled Zone
- remote host templates
Creating Security Templates
- remote hosts
How to Connect a Trusted Extensions System to Other Trusted Extensions Systems
- roles
Creating Roles and Users in Trusted Extensions
- secondary zones
How to Create a Secondary Labeled Zone
- shared network interfaces
How to Share a Single IP Address With All Zones
- Trusted Extensions packages
Add Trusted Extensions Packages to an Oracle Solaris System
- users who can assume roles
How to Create Users Who Can Assume Roles in Trusted Extensions
- VNIC interfaces
How to Add a Virtual Network Interface to a
Labeled Zone
- zone-specific nscd daemon
How to Configure a Separate Name Service for
Each Labeled Zone
- Additional Trusted Extensions Configuration Tasks
Additional Trusted Extensions Configuration Tasks
- ADMIN_HIGH label
- body page labels and
How to Configure a Zone as a Single-Level
Print Server
- global zone processes and zones
Global Zone Processes and Labeled
Zones
- mlslabel and
mlslabel Property
and Mounting Single-Level File Systems
- multilevel datasets and
No Privilege Overrides for MAC Read-Write
Policy
- NFS-mounted files in global zone
Trusted Extensions Policy for Single-Level
Datasets
- no localization
For International Customers of Trusted Extensions
- role clearance
How to Create a System Administrator
Role
- roles and
Role Creation in Trusted Extensions
- top administrative label
Administrative Labels
- ADMIN_LOW label
- limitations on unlabeled system mounts
Sharing and Mounting Files
in the Global Zone
- lowest label
Administrative Labels
- mounting files and
Sharing and Mounting Files
in the Global Zone
- administering
- account locking
How to Prevent Account Locking
for Users
- auditing in Trusted Extensions
Auditing in Trusted Extensions
- changing label of information
How to Enable a User to Change the Security
Level of Data
- convenient authorizations for users
How to Create a Rights Profile for Convenient Authorizations
- file systems
- mounting
How to NFS Mount Files in a Labeled Zone
- overview
Trusted Extensions Policies for Mounted File
Systems
- troubleshooting
How to Troubleshoot Mount Failures in Trusted Extensions
- files
- backing up with labels
How to Back Up Files in Trusted Extensions
- restoring with labels
How to Restore Files in Trusted Extensions
- labeled IPsec
Configuring Labeled IPsec
- labeled printing
Managing Labeled Printing
- LDAP
Configuring LDAP for Trusted Extensions
- mail
About Multilevel Mail in Trusted Extensions
- multilevel datasets
Results of Sharing and Mounting File Systems in Trusted Extensions
- multilevel ports
Displaying Multilevel Ports on a System
- printing
Managing Printing in Trusted Extensions
- quick reference for administrators
Quick Reference to Trusted Extensions Administration
- remote host templates
Creating Security Templates
- remotely
Remote Administration in Trusted Extensions
- routes with security attributes
How to Add Default Routes
- security templates
How to Add a Range of Hosts to a Security
Template
How to Add a Host to a Security Template
- sharing file systems
How to Share File Systems From a Labeled Zone
- startup files for users
How to Configure Startup Files for Users in Trusted Extensions
- system files
How to Change Security Defaults in System
Files
- third-party software
Software Management in Trusted Extensions
- trusted network
Managing Networks in Trusted Extensions
- unlabeled printing
Reducing Printing Restrictions in Trusted Extensions
- user privileges
How to Restrict a User's Set of
Privileges
- users
Managing Users and Rights
Managing Users, Rights,
and Roles in Trusted Extensions
Decisions to Make Before Creating
Users in Trusted Extensions
- zones
Managing Zones
- zones by using txzonemgr
Zone Administration Utilities in Trusted Extensions
- administrative labels
Administrative Labels
- administrative roles See
roles
- administrative tools
- commands
Command Line Tools in Trusted Extensions
- configuration files
Configuration Files in Trusted Extensions
- description
Trusted Extensions Administration Tools
- Labeled Zone Manager
txzonemgr Script
- txzonemgr script
txzonemgr Script
- all-zones address
Oracle Solaris Man Pages That Are Modified by Trusted Extensions
How to Configure a Multilevel Print Server
and Its Printers
Network Commands in Trusted Extensions
Zones and IP Addresses in Trusted Extensions
Configuring the Network Interfaces in Trusted Extensions Task Map
Access to Labeled Zones
- Allocate Device authorization
How to Create a Rights Profile for Convenient Authorizations
- application security label
Labels for IPsec-Protected Exchanges
- applications
- enabling initial network contact between client and server
Making the Host Address 0.0.0.0/32 a Valid Initial Address
- evaluating for security
Security Administrator Responsibilities for
Trusted Programs
- trusted and trustworthy
Evaluating Software for Security
- ARMOR roles
Creating Roles and Users in Trusted Extensions Task Map
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- assigning
- privileges to users
Security Attribute Assignment to Users in Trusted Extensions
- rights profiles
Security Attribute Assignment to Users in Trusted Extensions
- atohexlabel command
How to Obtain the Hexadecimal Equivalent
for a Label
- auditing in Trusted Extensions
- differences from Oracle Solaris auditing
Trusted Extensions and Auditing
- planning
Planning for Auditing in Trusted Extensions
- reference
Trusted Extensions and Auditing
- roles for administering
Auditing in Trusted Extensions
- authorizations
- assigning
Security Attribute Assignment to Users in Trusted Extensions
- authorizing a user or role to change label
How to Enable a User to Change the Security
Level of Data
- convenient for users
How to Create a Rights Profile for Convenient Authorizations
- granted
Trusted Extensions and Access Control
- authorizing
- unlabeled printing
Reducing Printing Restrictions in Trusted Extensions
B
- backing up
- previous system before installation
Backing Up the System Before Enabling Trusted Extensions
- banner pages
- description of labeled
Labeled Banner and Trailer Pages
- difference from trailer page
Differences on a Trailer Page
- removing labels
How to Enable Specific Users and Roles to
Bypass Labeling Printed Output
- typical
Typical Banner Page of a Labeled Print
Job
- body pages
- ADMIN_HIGH label on
How to Configure a Zone as a Single-Level
Print Server
- description of labeled
Labeled Body Pages
- unlabeled
How to Enable Specific Users and Roles to
Bypass Labeling Printed Output
C
- .copy_files file
- setting up for users
Customizing Startup Files for Users
- .copy_files file
- setting up for users
How to Configure Startup Files for Users in Trusted Extensions
- .copy_files file
- description
.copy_files and .link_files Files
- changing
- IDLETIME keyword
Changing the System's Idle Settings
- labels by authorized users
How to Enable a User to Change the Security
Level of Data
- security level of data
How to Enable a User to Change the Security
Level of Data
- system security defaults
How to Change Security Defaults in System
Files
- user privileges
How to Restrict a User's Set of
Privileges
- checking
- label_encodings file
How to Check and Install Your Label Encodings
File
- roles are working
How to Verify That the Trusted Extensions Roles
Work
- checklists for initial setup team
Checklist for Configuring Trusted Extensions
- chk_encodings command
Checking label_encodings Syntax on the Command
Line
- choosing See
selecting
- classification label component
Dominance Relationships Between Labels
- clearances
- label overview
Labels in Trusted Extensions Software
- commands
- troubleshooting networking
How to Debug the Trusted Extensions Network
- commercial applications
- evaluating
Security Administrator Responsibilities for
Trusted Programs
- Common Tasks in Trusted Extensions (Task Map)
Performing Common Tasks in Trusted Extensions
- compartment label component
Dominance Relationships Between Labels
- component definitions
- label_encodings file
Label Encodings File
- configuring
- access to remote Trusted Extensions
Remote Administration in Trusted Extensions
- by assuming a limited role or as root
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- labeled printing
Configuring Labeled Printing
- LDAP for Trusted Extensions
Configuring LDAP on a Trusted Extensions System
- LDAP proxy server for Trusted Extensions clients
Configuring a Trusted Extensions LDAP Proxy Server
- network interfaces
How to Connect a Trusted Extensions System to Other Trusted Extensions Systems
How to Share a Single IP Address With All Zones
- routes with security attributes
How to Add Default Routes
- startup files for users
How to Configure Startup Files for Users in Trusted Extensions
- Trusted Extensions
Configuring Trusted Extensions
- Trusted Extensions labeled zones
Creating Labeled Zones
- trusted network
Managing Networks in Trusted Extensions
- VNICs
How to Add a Virtual Network Interface to a
Labeled Zone
- Configuring Labeled IPsec (Task Map)
Configuring Labeled IPsec
- Configuring Labeled Printing (Task Map)
Configuring Labeled Printing
- configuring Trusted Extensions
- checklist for initial setup team
Checklist for Configuring Trusted Extensions
- initial procedures
Configuring Trusted Extensions
- kernel zones
Creating Labeled Zones
- labeled zones
Creating Labeled Zones
- remote access
Remote Administration in Trusted Extensions
- task maps
Configuration Roadmap for Trusted Extensions
- controlling See
restricting
- creating
- accounts
Creating Roles and Users in Trusted Extensions
- accounts during or after configuration
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- home directories
Home Directory Creation in Trusted Extensions
Creating Centralized Home Directories
in Trusted Extensions
- home directory server
How to Create the Home Directory Server
in Trusted Extensions
- kernel zones
Creating Labeled Zones
- labeled zones
Creating Labeled Zones
- LDAP client
Make the Global Zone an LDAP Client in Trusted Extensions
- LDAP proxy server for Trusted Extensions clients
Configuring a Trusted Extensions LDAP Proxy Server
- LDAP role with roleadd
Creating the Security Administrator Role in LDAP
- local role with roleadd
How to Create the Security Administrator
Role in Trusted Extensions
- local user with useradd
Using the useradd Command to Create a Local User
- roles
Creating Roles and Users in Trusted Extensions
- users who can assume roles
How to Create Users Who Can Assume Roles in Trusted Extensions
- zones
Creating Labeled Zones
- Creating Labeled Zones
Creating Labeled Zones
- customizing
- label_encodings file
Label Encodings File
- unlabeled printing
Reducing Printing Restrictions in Trusted Extensions
- user accounts
Customizing the User Environment for Security
- Customizing User Environment for Security (Task Map)
Customizing the User Environment for Security
- cut and paste
- and labels
Rules When Changing the Level of Security for Data
D
- /dev/kmem kernel image file
- security violation
Evaluating Software for Security
- DAC See
discretionary access control (DAC)
- data
- relabeling efficiently
How to Create and Share a Multilevel Dataset
- database schema
- LDAP and Trusted Extensions, for
Trusted Extensions Database Schema for LDAP
- databases
- in LDAP from Trusted Extensions
Using the LDAP Naming Service in Trusted Extensions
- trusted network
Network Configuration Databases in Trusted Extensions
- datasets See
ZFS
- debugging See
troubleshooting
- deciding
- to configure by assuming a limited role or as root
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- to use an Oracle-supplied encodings file
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- decisions to make
- based on site security policy
Site Security Policy for Trusted Extensions
- before enabling Trusted Extensions
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- deleting
- labeled zones
How to Remove Trusted Extensions From the System
- developer responsibilities
Developer Responsibilities When Creating Trusted
Programs
- differences
- administrative interfaces in Trusted Extensions
Administrative Interfaces in Trusted Extensions
- between Trusted Extensions and Oracle Solaris auditing
Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS
Differences Between Trusted Extensions and the Oracle Solaris OS
- defaults in Trusted Extensions
Tighter Security Defaults in Trusted Extensions
- extending Oracle Solaris interfaces
Oracle Solaris Interfaces Extended by Trusted Extensions
- limited options in Trusted Extensions
Limited Options in Trusted Extensions
- directories
- accessing lower-level
Zones in Trusted Extensions
- authorizing a user or role to change label of
How to Enable a User to Change the Security
Level of Data
- for naming service setup
Populate the LDAP Server With Trusted Extensions Data
- mounting
How to Share File Systems From a Labeled Zone
- sharing
How to Share File Systems From a Labeled Zone
- disabling
- Trusted Extensions
How to Remove Trusted Extensions From the System
- discretionary access control (DAC)
Trusted Extensions and Access Control
- displaying
- labels of file systems in labeled zone
Displaying the Labels of File Systems in the restricted Zone
- status of every zone
How to Display Ready or Running Zones
- DOI
- remote host templates
Network Security Attributes in Trusted Extensions
- domain of interpretation (DOI)
- modifying
How to Configure a Different Domain of Interpretation
- dominance of labels
Dominance Relationships Between Labels
- Downgrade File Label authorization
How to Create a Rights Profile for Convenient Authorizations
E
- /etc/default/kbd file
- how to edit
How to Change Security Defaults in System
Files
- /etc/default/login file
- how to edit
How to Change Security Defaults in System
Files
- /etc/default/passwd file
- how to edit
How to Change Security Defaults in System
Files
- /etc/hosts file
How to Add Hosts to the System's
Known Network
- /etc/security/policy.conf file
- modifying
How to Modify policy.conf Defaults
- /etc/security/policy.conf file
- defaults
policy.conf File Defaults in Trusted Extensions
- how to edit
How to Change Security Defaults in System
Files
- /etc/security/tsol/label_encodings file
Label Encodings File
- /etc/system file
- modifying for IPv6 CIPSO network
How to Configure an IPv6 CIPSO Network in Trusted Extensions
- editing system files
How to Change Security Defaults in System
Files
- enabling
- DOI different from 1
How to Configure a Different Domain of Interpretation
- IPv6 CIPSO network
How to Configure an IPv6 CIPSO Network in Trusted Extensions
- keyboard shutdown
How to Change Security Defaults in System
Files
- labeld service
Installing and Enabling Trusted Extensions
- login to labeled zone
How to Enable Users to Log In to a Labeled
Zone
- Trusted Extensions feature
Installing and Enabling Trusted Extensions
- enabling Trusted Extensions
- /usr/sbin/labeladm
Trusted Extensions Administrative
Tools
- encodings file See
label_encodings file
- evaluating programs for security
Evaluating Software for Security
- exporting See
sharing
F
- fallback mechanism
- in security templates
Trusted Network Fallback Mechanism
- file systems
- mounting in global and labeled zones
Results of Sharing and Mounting File Systems in Trusted Extensions
- NFS mounts
Results of Sharing and Mounting File Systems in Trusted Extensions
- sharing
Trusted Extensions Policies for Mounted File
Systems
- sharing in global and labeled zones
Results of Sharing and Mounting File Systems in Trusted Extensions
- files
- .copy_files
How to Configure Startup Files for Users in Trusted Extensions
.copy_files and .link_files Files
- .link_files
How to Configure Startup Files for Users in Trusted Extensions
.copy_files and .link_files Files
- /etc/default/kbd
How to Change Security Defaults in System
Files
- /etc/default/login
How to Change Security Defaults in System
Files
- /etc/default/passwd
How to Change Security Defaults in System
Files
- /etc/security/policy.conf
How to Modify policy.conf Defaults
policy.conf File Defaults in Trusted Extensions
- /etc/security/tsol/label_encodings file
Label Encodings File
- /usr/lib/cups/filter/tsol_separator.ps
Labeled Printer Output
- /usr/sbin/txzonemgr
Zone Administration Utilities in Trusted Extensions
Trusted Extensions Administrative
Tools
- accessing from dominating labels
How to Display the Labels of Mounted
Files
- authorizing a user or role to change label of
How to Enable a User to Change the Security
Level of Data
- backing up with labels
How to Back Up Files in Trusted Extensions
- getmounts
How to Display the Labels of Mounted
Files
- loopback mounting
How to Loopback Mount a File That
Is Usually Not Visible in a Labeled Zone
- policy.conf
How to Change Security Defaults in System
Files
- preventing access from dominating labels
How to Disable the Mounting of Lower-Level
Files
- relabeling privileges
How to Enable Files to Be Relabeled From a
Labeled Zone
- restoring with labels
How to Restore Files in Trusted Extensions
- startup
How to Configure Startup Files for Users in Trusted Extensions
- files and file systems
- mounting
How to Share File Systems From a Labeled Zone
- naming
How to Share File Systems From a Labeled Zone
- sharing
How to Share File Systems From a Labeled Zone
- finding
- label equivalent in hexadecimal
How to Obtain the Hexadecimal Equivalent
for a Label
- label equivalent in text format
How to Obtain a Readable Label
From Its Hexadecimal Form
G
- gateways
- accreditation checks
Gateway Accreditation Checks
- example of
Gateways in Trusted Extensions
- gdm
- accessing multilevel remotely
How to Configure a Trusted Extensions System With Xvnc for Remote Access
- getmounts script
How to Display the Labels of Mounted
Files
- global zone
- difference from labeled zones
Zones in Trusted Extensions
H
- hardware planning
Planning System Hardware and Capacity for Trusted Extensions
- hextoalabel command
How to Obtain a Readable Label
From Its Hexadecimal Form
- home directories
- accessing
Zones in Trusted Extensions
- creating
Home Directory Creation in Trusted Extensions
Creating Centralized Home Directories
in Trusted Extensions
- creating server for
How to Create the Home Directory Server
in Trusted Extensions
- logging in and getting
How to Enable Users to Access Their
Remote Home Directories by Configuring the Automounter on Each Server
How to Enable Users to Access Their
Remote Home Directories at Every Label by Logging In to Each NFS Server
- host types
- networking
Host Type and Template Name in Security Templates
Trusted Extensions Data Packets
- remote host templates
Network Security Attributes in Trusted Extensions
- table of templates and protocols
Host Type and Template Name in Security Templates
- hosts
- adding to /etc/hosts file
How to Add Hosts to the System's
Known Network
- adding to security template
How to Add a Range of Hosts to a Security
Template
How to Add a Host to a Security Template
- assigning a template
Adding Hosts to Security Templates
- networking concepts
Trusted Network Communications
I
- IDLECMD keyword
- changing default
Changing the System's Idle Settings
- IDLETIME keyword
- changing default
Changing the System's Idle Settings
- IKE
- labels in tunnel mode
Labels and Accreditation in Tunnel Mode IPsec
- immutable zones
- Trusted Extensions and
Creating Labeled Zones
- importing
- software
Adding Software to Trusted Extensions
- initial setup team
- checklist for configuring Trusted Extensions
Checklist for Configuring Trusted Extensions
- inner label
Labels for IPsec-Protected Exchanges
- installing
- label_encodings file
How to Check and Install Your Label Encodings
File
Enable Trusted Extensions
- LDAP server on Trusted Extensions
Configuring LDAP on a Trusted Extensions System
- Oracle Solaris OS for Trusted Extensions
Adding the Trusted Extensions Feature to Oracle Solaris
- interfaces
- adding to security template
How to Add a Range of Hosts to a Security
Template
How to Add a Host to a Security Template
- verifying they are up
How to Verify That a System's Interfaces
Are Up
- internationalizing See
localizing
- IP addresses
- 0.0.0.0 host address
Trusted Extensions Host Address
and Fallback Mechanism Entries
- fallback mechanism in trusted networking
Trusted Network Fallback Mechanism
- ipadm command
Network Commands in Trusted Extensions
- IPsec
- label extensions
Label Extensions for IPsec Security Associations
- labels in tunnel mode
Labels and Accreditation in Tunnel Mode IPsec
- labels on trusted exchanges
Labels for IPsec-Protected Exchanges
- protections with label extensions
Confidentiality and Integrity Protections With
Label Extensions
- with Trusted Extensions labels
Administration of Labeled IPsec
- ipseckey command
Network Commands in Trusted Extensions
- ipTnetHost
Trusted Extensions Database Schema for LDAP
- ipTnetNumber
Trusted Extensions Database Schema for LDAP
- ipTnetTemplate
Trusted Extensions Database Schema for LDAP
- ipTnetTemplateName
Trusted Extensions Database Schema for LDAP
- IPv6
- entry in /etc/system file
How to Configure an IPv6 CIPSO Network in Trusted Extensions
- troubleshooting
How to Configure an IPv6 CIPSO Network in Trusted Extensions
K
- kernel zones
- Trusted Extensions and
Creating Labeled Zones
- keyboard shutdown
- enabling
How to Change Security Defaults in System
Files
- kmem kernel image file
Evaluating Software for Security
L
- .link_files file
- setting up for users
How to Configure Startup Files for Users in Trusted Extensions
- .link_files file
- description
.copy_files and .link_files Files
- label extensions
- IKE negotiations
Label Extensions for IKE
- IPsec SAs
Label Extensions for IPsec Security Associations
- label ranges
- restricting remote access
Remote Administration in Trusted Extensions
- label_encodings file
- checking
How to Check and Install Your Label Encodings
File
- contents
Label Encodings File
- installing
How to Check and Install Your Label Encodings
File
Enable Trusted Extensions
- localizing
For International Customers of Trusted Extensions
- modifying
How to Check and Install Your Label Encodings
File
Enable Trusted Extensions
- reference for labeled printing
Labeled Printer Output
- source of accreditation ranges
Label Encodings File
- labeladm command
Installing and Enabling Trusted Extensions- enabling Trusted Extensions
Installing and Enabling Trusted Extensions
- installing encodings file
Enable Trusted Extensions
Enable Trusted Extensions
- removing Trusted Extensions
How to Remove Trusted Extensions From the System
- labeld service
- disabling
How to Remove Trusted Extensions From the System
- enabling
Installing and Enabling Trusted Extensions
- labeled IPsec See
IPsec
- labeled multicast packets
Trusted Extensions Multicast Packets
- labeled printing
- banner pages
Labeled Banner and Trailer Pages
- body pages
Labeled Body Pages
- removing label
How to Create a Rights Profile for Convenient Authorizations
- without banner page
How to Create a Rights Profile for Convenient Authorizations
- Labeled Zone Manager See
txzonemgr script
- labeled zones See
zones
- labeling
- turning on labels
Log In to Trusted Extensions
- zones
How to Create Labeled Zones Interactively
- Labeling Hosts and Networks (Tasks)
Labeling Hosts and Networks
- labels See Also
label ranges- accreditation in tunnel mode
Labels and Accreditation in Tunnel Mode IPsec
- authorizing a user or role to change label of data
How to Enable a User to Change the Security
Level of Data
- classification component
Dominance Relationships Between Labels
- compartment component
Dominance Relationships Between Labels
- default in remote host templates
Network Security Attributes in Trusted Extensions
- described
Trusted Extensions and Access Control
- determining text equivalents
How to Obtain a Readable Label
From Its Hexadecimal Form
- displaying in hexadecimal
How to Obtain the Hexadecimal Equivalent
for a Label
- displaying labels of file systems in labeled zone
Displaying the Labels of File Systems in the restricted Zone
- dominance
Dominance Relationships Between Labels
- extensions for IKE SAs
Label Extensions for IKE
- extensions for IPsec SAs
Label Extensions for IPsec Security Associations
- of processes
What Labels Protect and Where Labels Appear
- of user processes
Session Range
- on IPsec exchanges
Labels for IPsec-Protected Exchanges
- on printouts
Labeled Printer Output
- overview
Labels in Trusted Extensions Software
- planning
Devising a Label Strategy
- printing without page labels
How to Enable Specific Users and Roles to
Bypass Labeling Printed Output
- relationships
Dominance Relationships Between Labels
- repairing in internal databases
How to Obtain a Readable Label
From Its Hexadecimal Form
- specifying for zones
How to Create Labeled Zones Interactively
- troubleshooting
How to Obtain a Readable Label
From Its Hexadecimal Form
- well-formed
Label Ranges
- laptops
- planning
Planning for Multilevel Services
- LDAP
- naming service for Trusted Extensions
Configuring LDAP for Trusted Extensions
- planning
Planning for the LDAP Naming Service in Trusted Extensions
- references
Quick Reference for the LDAP Directory Service in Trusted Extensions
- troubleshooting
How to Debug a Client's Connection
to the LDAP Server
- Trusted Extensions database schema
Trusted Extensions Database Schema for LDAP
- Trusted Extensions databases
Using the LDAP Naming Service in Trusted Extensions
- LDAP configuration
- creating client
Make the Global Zone an LDAP Client in Trusted Extensions
- for Trusted Extensions
Configuring LDAP on a Trusted Extensions System
- NFS servers, and
Configuring LDAP on a Trusted Extensions System
- LDAP server
- configuring multilevel port
Configure a Multilevel Port for the LDAP Server
- configuring proxy for Trusted Extensions clients
Configuring a Trusted Extensions LDAP Proxy Server
- creating proxy for Trusted Extensions clients
Configuring a Trusted Extensions LDAP Proxy Server
- limiting
- defined hosts on the network
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- localizing
- configuring labeled printouts
tsol_separator.ps Configuration
File
- LOFS
- mounting datasets in Trusted Extensions
Mount Possibilities in Trusted Extensions
- logging in
- to a home directory server
How to Enable Users to Access Their
Remote Home Directories by Configuring the Automounter on Each Server
How to Enable Users to Access Their
Remote Home Directories at Every Label by Logging In to Each NFS Server
- using ssh command
How to Log In and Administer a Remote Trusted Extensions System
- login
- by roles
Roles in Trusted Extensions
- remote
Enable Remote Administration of a Remote Trusted Extensions System
- logout
- requiring
Changing the System's Idle Settings
M
- MAC See
mandatory access control (MAC)
- mail
- administering
About Multilevel Mail in Trusted Extensions
- implementation in Trusted Extensions
Trusted Extensions Mail Features
- multilevel
Multilevel Mail Service
- man pages
- quick reference for Trusted Extensions administrators
List of Trusted Extensions Man Pages
- managing See
administering
- Managing Printing in Trusted Extensions (Task Map)
Managing Printing in Trusted Extensions
- Managing Users and Rights (Task Map)
Managing Users and Rights
- Managing Zones (Task Map)
Managing Zones
- mandatory access control (MAC)
- enforcing on the network
About the Trusted Network
- in Trusted Extensions
Trusted Extensions and Access Control
- maximum labels
- remote host templates
Network Security Attributes in Trusted Extensions
- minimum labels
- remote host templates
Network Security Attributes in Trusted Extensions
- MLPs See
multilevel ports (MLPs)
- mlslabel property
- ADMIN_HIGH label and
mlslabel Property
and Mounting Single-Level File Systems
- modifying
- label_encodings file
How to Check and Install Your Label Encodings
File
- mounting
- file systems
How to Share File Systems From a Labeled Zone
- files by loopback mounting
How to Loopback Mount a File That
Is Usually Not Visible in a Labeled Zone
- overview
Results of Sharing and Mounting File Systems in Trusted Extensions
- troubleshooting
How to Troubleshoot Mount Failures in Trusted Extensions
- ZFS dataset on labeled zone
How to Share a ZFS Dataset From
a Labeled Zone
- mounting datasets in Trusted Extensions
Mount Possibilities in Trusted Extensions
- multicast packets
Trusted Extensions Multicast Packets
- multilevel datasets
- creating
How to Create and Share a Multilevel Dataset
- overview
Multilevel Datasets for Relabeling Files
- multilevel mounts
- NFS protocol versions
Trusted Extensions Software and NFS Protocol
Versions
- multilevel ports (MLPs)
- administering
Displaying Multilevel Ports on a System
- example of NFSv3 MLP
Configuring a Private Multilevel Port for NFSv3 Over udp
- example of web proxy MLP
How to Create a Multilevel Port
for a Zone
- multilevel printing
- accessing by print client
How to Enable a Trusted Extensions Client to
Access a Printer
- configuring
How to Configure a Network Printer
How to Configure a Multilevel Print Server
and Its Printers
- multilevel server
- planning
Planning for Multilevel Services
N
- name service cache daemon See
nscd daemon
- names
- specifying for zones
How to Create Labeled Zones Interactively
- names of file systems
How to Share File Systems From a Labeled Zone
- naming
- zones
How to Create Labeled Zones Interactively
- naming services
- databases unique to Trusted Extensions
Using the LDAP Naming Service in Trusted Extensions
- LDAP
Configuring LDAP for Trusted Extensions
- net_mac_aware privilege
How to Disable the Mounting of Lower-Level
Files
- netstat command
How to Debug the Trusted Extensions Network
Network Commands in Trusted Extensions
- network
- See
trusted network - See
Trusted Extensions network
- network databases
- description
Network Configuration Databases in Trusted Extensions
- in LDAP
Configuring LDAP for Trusted Extensions
- network packets
Trusted Extensions Data Packets
- networking concepts
Trusted Network Communications
- NFS
- mounting datasets in Trusted Extensions
Mount Possibilities in Trusted Extensions
- NFS mounts
- accessing lower-level directories
NFS Server and Client Configuration in Trusted Extensions
- in global and labeled zones
Results of Sharing and Mounting File Systems in Trusted Extensions
- NFS servers
- LDAP servers, and
Configuring LDAP on a Trusted Extensions System
- nscd daemon
- adding to every labeled zone
How to Configure a Separate Name Service for
Each Labeled Zone
O
- Oracle Solaris OS
- differences from Trusted Extensions
Differences Between Trusted Extensions and the Oracle Solaris OS
- differences from Trusted Extensions auditing
Trusted Extensions and Auditing
- similarities with Trusted Extensions
Similarities Between Trusted Extensions and the Oracle Solaris OS
- similarities with Trusted Extensions auditing
Trusted Extensions and Auditing
P
- packages
- Trusted Extensions feature
Add Trusted Extensions Packages to an Oracle Solaris System
- passwords
- assigning
Security Attribute Assignment to Users in Trusted Extensions
- changing in labeled zone
How to Enforce a New Local User
Password in a Labeled Zone
- planning See Also
Trusted Extensions use- account creation
Planning User Security in Trusted Extensions
- administration strategy
Planning Who Will Configure Trusted Extensions
- auditing
Planning for Auditing in Trusted Extensions
- hardware
Planning System Hardware and Capacity for Trusted Extensions
- labels
Devising a Label Strategy
- laptop configuration
Planning for Multilevel Services
- LDAP naming service
Planning for the LDAP Naming Service in Trusted Extensions
- network
Planning Your Trusted Network
- Trusted Extensions
Planning for Security in Trusted Extensions
- Trusted Extensions configuration strategy
Forming an Install Team for Trusted Extensions
- zones
Planning Your Labeled Zones in Trusted Extensions
- policy.conf file
- changing defaults
How to Change Security Defaults in System
Files
- changing Trusted Extensions keywords
Changing the System's Idle Settings
- defaults
policy.conf File Defaults in Trusted Extensions
- how to edit
How to Modify policy.conf Defaults
- preventing See
protecting
- Print without Banner authorization
How to Create a Rights Profile for Convenient Authorizations
- Print without Label authorization
How to Create a Rights Profile for Convenient Authorizations
- printed output See
printing
- printer output See
printing
- printing
- and label_encodings file
Label Encodings File
- authorizations
Trusted Extensions Print Interfaces (Reference)
- authorizations for unlabeled output from a public system
Assigning Printing-Related Authorizations to All Users of a
System
- configuring for multilevel labeled output
How to Configure a Network Printer
How to Configure a Multilevel Print Server
and Its Printers
- configuring for print client
How to Enable a Trusted Extensions Client to
Access a Printer
- configuring labeled zone
How to Configure a Zone as a Single-Level
Print Server
- configuring labels and text
tsol_separator.ps Configuration
File
- configuring public print jobs
Sending Public Print Jobs to an Unlabeled Printer
- in local language
tsol_separator.ps Configuration
File
- internationalizing labeled output
tsol_separator.ps Configuration
File
- labeling an Oracle Solaris print server
How to Assign a Label to an Unlabeled Print
Server
- localizing labeled output
tsol_separator.ps Configuration
File
- managing
Labels, Printers, and Printing
- PostScript
PostScript Printing of Security Information
- preventing labels on output
How to Remove Banner and Trailer Pages
- public jobs from an Oracle Solaris print server
Sending Public Print Jobs to an Unlabeled Printer
- using an Oracle Solaris print server
How to Assign a Label to an Unlabeled Print
Server
- without labeled banners and trailers
How to Create a Rights Profile for Convenient Authorizations
- without page labels
How to Enable Specific Users and Roles to
Bypass Labeling Printed Output
How to Create a Rights Profile for Convenient Authorizations
- printouts See
printing
- privileges
- changing defaults for users
Security Attribute Assignment to Users in Trusted Extensions
- non-obvious reasons for requiring
Evaluating Software for Security
- removing proc_info from basic set
Modifying Every User's Basic Privilege Set
- restricting users'
How to Restrict a User's Set of
Privileges
- proc_info privilege
- removing from basic set
Modifying Every User's Basic Privilege Set
- procedures See
tasks and task maps
- processes
- labels of
What Labels Protect and Where Labels Appear
- labels of user processes
Session Range
- preventing users from seeing others' processes
Modifying Every User's Basic Privilege Set
- profiles See
rights profiles
- programs See
applications
- protecting
- file systems by using non-proprietary names
How to Share File Systems From a Labeled Zone
- files at lower labels from being accessed
How to Disable the Mounting of Lower-Level
Files
- information with labels
What Labels Protect and Where Labels Appear
- labeled hosts from access by arbitrary hosts
How to Limit the Hosts That Can Be Contacted on the Trusted Network
R
- real UID of root
- required for applications
Evaluating Software for Security
- rebooting
- activating labels
Log In to Trusted Extensions
- enabling login to labeled zone
How to Enable Users to Log In to a Labeled
Zone
- Reducing Printing Restrictions in Trusted Extensions (Task Map)
Reducing Printing Restrictions in Trusted Extensions
- regular users See
users
- relabeling data
- eliminating IO
How to Create and Share a Multilevel Dataset
- relabeling information
How to Enable a User to Change the Security
Level of Data
- remote administration
- defaults
Remote Administration in Trusted Extensions
- methods
Methods for Administering Remote Systems in Trusted Extensions
- remote desktop
- accessing
How to Configure a Trusted Extensions System With Xvnc for Remote Access
- remote host templates
- 0.0.0.0/0 wildcard assignment
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- adding systems to
How to Add a Range of Hosts to a Security
Template
How to Add a Host to a Security Template
- assigning
Adding Hosts to Security Templates
- creating
Creating Security Templates
- entry for Sun Ray servers
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- remote hosts
- using fallback mechanism in tnrhdb
Trusted Network Fallback Mechanism
- Remote Login authorization
How to Create a Rights Profile for Convenient Authorizations
- remote systems
- configuring for role assumption
Enable Remote Administration of a Remote Trusted Extensions System
- removing
- labels on printouts
How to Remove Banner and Trailer Pages
- zone-specific nscd daemon
Removing a Name Service Cache From Each Labeled Zone
- removing Trusted Extensions See
disabling
- repairing
- labels in internal databases
How to Obtain a Readable Label
From Its Hexadecimal Form
- restricting
- access to lower-level files
How to Disable the Mounting of Lower-Level
Files
- access to printers with labels
Restricting Access to Printers and Print
Job Information in Trusted Extensions
Differences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11.4
- mounts of lower-level files
How to Disable the Mounting of Lower-Level
Files
- printer access with labels
Restricting Access to Printers and Print
Job Information in Trusted Extensions
Differences Between Trusted Extensions Printing in Oracle Solaris 10 and Oracle Solaris 11.4
- remote access
Remote Administration in Trusted Extensions
- rights See
rights profiles
- rights profiles
- assigning
Security Attribute Assignment to Users in Trusted Extensions
- Convenient Authorizations
How to Create a Rights Profile for Convenient Authorizations
- roadmaps
- Task Map: Choosing a Trusted Extensions Configuration
Task Map: Choosing a Trusted Extensions Configuration
- Task Map: Configuring Trusted Extensions to Your Site's Requirements
Task Map: Configuring Trusted Extensions to
Meet Your Site's Requirements
- Task Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Configuring Trusted Extensions With
the Provided Defaults
- Task Map: Preparing For and Enabling Trusted Extensions
Task Map: Preparing for and Enabling Trusted Extensions
- role workspace
- global zone
Roles in Trusted Extensions
- roleadd command
How to Create the Security Administrator
Role in Trusted Extensions
- roles
- adding LDAP role with roleadd
Creating the Security Administrator Role in LDAP
- adding local role with roleadd
How to Create the Security Administrator
Role in Trusted Extensions
- administering auditing
Auditing in Trusted Extensions
- assigning rights
Security Attribute Assignment to Users in Trusted Extensions
- assuming
Roles in Trusted Extensions
- creating
Role Creation in Trusted Extensions
- creating Security Administrator
How to Create the Security Administrator
Role in Trusted Extensions
- deciding if ARMOR
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- determining when to create
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- verifying they work
How to Verify That the Trusted Extensions Roles
Work
- workspaces
Roles in Trusted Extensions
- root UID
- required for applications
Evaluating Software for Security
- route command
Network Commands in Trusted Extensions
- routing
About Routing in Trusted Extensions- accreditation checks
Trusted Extensions Accreditation Checks
- commands in Trusted Extensions
Routing Commands in Trusted Extensions
- concepts
Administration of Routing in Trusted Extensions
- example of
Gateways in Trusted Extensions
- tables
Choosing Routers in Trusted Extensions
Routing Table Entries in Trusted Extensions
- using route command
How to Add Default Routes
S
- scripts
- /usr/bin/txzonemgr
How to Display Ready or Running Zones
- /usr/sbin/txzonemgr
Zone Administration Utilities in Trusted Extensions
Trusted Extensions Administrative
Tools
- getmounts
How to Display the Labels of Mounted
Files
- security
- initial setup team
Initial Setup Team Responsibilities
- site security policy at a labeled site
Site Security Policy for Trusted Extensions
- Security Administrator role
- administering printer security
Labels, Printers, and Printing
- administering users
Managing Users and Rights
- assigning authorizations to users
How to Create a Rights Profile for Convenient Authorizations
- creating
How to Create the Security Administrator
Role in Trusted Extensions
- creating Convenient Authorizations rights profile
How to Create a Rights Profile for Convenient Authorizations
- enabling unlabeled body pages from a public system
Assigning Printing-Related Authorizations to All Users of a
System
- security administrators See
Security Administrator role
- security attributes
Routing Table Entries in Trusted Extensions- modifying defaults for all users
How to Modify policy.conf Defaults
- modifying user defaults
How to Modify Default User Label Attributes
- setting for remote hosts
Creating Security Templates
- using in routing
How to Add Default Routes
- security information
- on printouts
Labeled Printer Output
- planning for Trusted Extensions
Resolving Additional Issues Before Enabling Trusted Extensions
- security label set
- remote host templates
Network Security Attributes in Trusted Extensions
- security mechanisms
- extensible
Extension of Oracle Solaris Security Features by Trusted Extensions
- Oracle Solaris
Security Mechanisms for Oracle Solaris Software
- security templates See
remote host templates
- session range
Session Range
- Setting Up Remote Administration in Trusted Extensions (Task Map)
Configuring and Administering Remote Systems in Trusted Extensions
- shared-IP address See
all-zones address
- sharing
- ZFS dataset from labeled zone
How to Share a ZFS Dataset From
a Labeled Zone
- Shutdown authorization
How to Create a Rights Profile for Convenient Authorizations
- similarities
- between Trusted Extensions and Oracle Solaris auditing
Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS
Similarities Between Trusted Extensions and the Oracle Solaris OS
- single-label
- login
Account Label Range
- printing in a zone
How to Configure a Zone as a Single-Level
Print Server
- site security policy
- tasks involved at a labeled site
Site Security Policy for Trusted Extensions
- understanding
Understanding Your Site's Security Policy
- snoop command
How to Debug the Trusted Extensions Network
Network Commands in Trusted Extensions
- software
- administering third-party
Software Management in Trusted Extensions
- importing
Adding Software to Trusted Extensions
- solaris.print.admin
- authorization
Trusted Extensions Print Interfaces (Reference)
- solaris.print.list
- authorization
Trusted Extensions Print Interfaces (Reference)
- solaris.print.nobanner
- authorization
Trusted Extensions Print Interfaces (Reference)
- solaris.print.nobanner authorization
Assigning Printing-Related Authorizations to All Users of a
System
- solaris.print.unlabeled
- authorization
Trusted Extensions Print Interfaces (Reference)
- solaris.print.unlabeled authorization
Assigning Printing-Related Authorizations to All Users of a
System
- startup files
- procedures for customizing
How to Configure Startup Files for Users in Trusted Extensions
- Stop-A
- enabling
How to Change Security Defaults in System
Files
- Sun Ray systems
- 0.0.0.0/32 address for client contact
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- System Administrator role
- administering printers
Labels, Printers, and Printing
- creating
How to Create a System Administrator
Role
- system files
- editing
How to Change Security Defaults in System
Files
- label_encodings
How to Check and Install Your Label Encodings
File
- tsol_separator.ps
How to Enable Specific Users and Roles to
Bypass Labeling Printed Output
T
- tasks and task maps
- Additional Trusted Extensions Configuration Tasks
Additional Trusted Extensions Configuration Tasks
- Common Tasks in Trusted Extensions Task Map)
Performing Common Tasks in Trusted Extensions
- Configuring Labeled IPsec (Task Map)
Configuring Labeled IPsec
- Configuring Labeled Printing (Task Map)
Configuring Labeled Printing
- Creating Labeled Zones
Creating Labeled Zones
- Customizing User Environment for Security (Task Map)
Customizing the User Environment for Security
- Labeling Hosts and Networks (Tasks)
Labeling Hosts and Networks
- Managing Printing in Trusted Extensions (Task Map)
Managing Printing in Trusted Extensions
- Managing Users and Rights
Managing Users and Rights
- Managing Zones (Task Map)
Managing Zones
- Reducing Printing Restrictions in Trusted Extensions (Task Map)
Reducing Printing Restrictions in Trusted Extensions
- Setting Up Remote Administration in Trusted Extensions (Task Map)
Configuring and Administering Remote Systems in Trusted Extensions
- Task Map: Choosing a Trusted Extensions Configuration
Task Map: Choosing a Trusted Extensions Configuration
- Task Map: Configuring Trusted Extensions to Your Site's Requirements
Task Map: Configuring Trusted Extensions to
Meet Your Site's Requirements
- Task Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Configuring Trusted Extensions With
the Provided Defaults
- Task Map: Preparing For and Enabling Trusted Extensions
Task Map: Preparing for and Enabling Trusted Extensions
- Troubleshooting the Trusted Network (Task Map)
Troubleshooting the Trusted Network
- Viewing Existing Security Templates (Tasks)
Viewing Existing Security Templates
- templates See
remote host templates
- text label equivalents
- determining
How to Obtain a Readable Label
From Its Hexadecimal Form
- tncfg command
- creating a multilevel port
How to Create a Multilevel Port
for a Zone
- description
Network Commands in Trusted Extensions
- modifying DOI value
How to Configure a Different Domain of Interpretation
- tnchkdb command
- description
Network Commands in Trusted Extensions
- tnctl command
- description
Network Commands in Trusted Extensions
- tnd command
- description
Network Commands in Trusted Extensions
- tninfo command
- description
Network Commands in Trusted Extensions
- using
How to Debug a Client's Connection
to the LDAP Server
- tnrhdb
- LDAP database schema
Trusted Extensions Database Schema for LDAP
- tnrhtp
- LDAP database schema
Trusted Extensions Database Schema for LDAP
- tools See
administrative tools
- trailer pages See
banner pages
- translation See
localizing
- troubleshooting
- IPv6 configuration
How to Configure an IPv6 CIPSO Network in Trusted Extensions
- LDAP
How to Debug a Client's Connection
to the LDAP Server
- mounted file systems
How to Troubleshoot Mount Failures in Trusted Extensions
- network
Troubleshooting the Trusted Network
- repairing labels in internal databases
How to Obtain a Readable Label
From Its Hexadecimal Form
- trusted network
How to Debug the Trusted Extensions Network
- verifying interface is up
How to Verify That a System's Interfaces
Are Up
- viewing ZFS dataset mounted in lower-level zone
Sharing and Mounting a ZFS Dataset From Labeled Zones
- Troubleshooting the Trusted Network (Task Map)
Troubleshooting the Trusted Network
- Trusted Extensions See Also
Trusted Extensions planning- adding
Add Trusted Extensions Packages to an Oracle Solaris System
- adding to Oracle Solaris
Installing and Enabling Trusted Extensions
- decisions to make before enabling
Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
- differences from Oracle Solaris administrator's perspective
Results of Enabling Trusted Extensions From an Administrator's
Perspective
- differences from Oracle Solaris auditing
Trusted Extensions and Auditing
- differences from Oracle Solaris OS
Differences Between Trusted Extensions and the Oracle Solaris OS
- disabling
How to Remove Trusted Extensions From the System
- enabling
Installing and Enabling Trusted Extensions
- IPsec protections
Labels for IPsec-Protected Exchanges
- man pages quick reference
List of Trusted Extensions Man Pages
- memory requirements
Planning System Hardware and Capacity for Trusted Extensions
- networking
Trusted Networking
- new features in this release
What's New in Trusted Extensions in Oracle Solaris 11.4
- planning configuration strategy
Forming an Install Team for Trusted Extensions
- planning for
Planning for Security in Trusted Extensions
- planning hardware
Planning System Hardware and Capacity for Trusted Extensions
- planning network
Planning Your Trusted Network
- preparing for
Resolving Security Issues Before Installing Trusted Extensions
- quick reference to administration
Quick Reference to Trusted Extensions Administration
- results before configuration
Results of Enabling Trusted Extensions From an Administrator's
Perspective
- similarities with Oracle Solaris auditing
Trusted Extensions and Auditing
- similarities with Oracle Solaris OS
Similarities Between Trusted Extensions and the Oracle Solaris OS
- two-role configuration strategy
Forming an Install Team for Trusted Extensions
- Trusted Extensions configuration
- adding network databases to LDAP server
Populate the LDAP Server With Trusted Extensions Data
- changing default DOI value
How to Configure a Different Domain of Interpretation
- databases for LDAP
Configuring LDAP on a Trusted Extensions System
- division of tasks
Initial Setup Team Responsibilities
- initial procedures
Configuring Trusted Extensions
- initial setup team responsibilities
Initial Setup Team Responsibilities
- labeled zones
Creating Labeled Zones
- LDAP
Configuring LDAP on a Trusted Extensions System
- reboot to activate labels
Log In to Trusted Extensions
- remote systems
Remote Administration in Trusted Extensions
- task maps
Configuration Roadmap for Trusted Extensions
- Trusted Extensions network
- adding zone-specific nscd daemon
How to Configure a Separate Name Service for
Each Labeled Zone
- enabling IPv6 for CIPSO packets
How to Configure an IPv6 CIPSO Network in Trusted Extensions
- planning
Planning Your Trusted Network
- removing zone-specific nscd daemon
Removing a Name Service Cache From Each Labeled Zone
- trusted network
- 0.0.0.0/0 wildcard address
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- 0.0.0.0 tnrhdb entry
How to Limit the Hosts That Can Be Contacted on the Trusted Network
- concepts
Trusted Networking
- default labeling
Trusted Extensions Accreditation Checks
- example of routing
Gateways in Trusted Extensions
- host types
Host Type and Template Name in Security Templates
- labels and MAC enforcement
About the Trusted Network
- using templates
Creating Security Templates
- trusted path attribute
- when available
Roles and Trusted Extensions
- trusted programs
- adding
Developer Responsibilities When Creating Trusted
Programs
- defined
Evaluating Software for Security
- trustworthy programs
Evaluating Software for Security
- tsol_separator.ps file
- configurable values
tsol_separator.ps Configuration
File
- customizing labeled printing
Labeled Printer Output
- txzonemgr script
How to Display Ready or Running Zones- –c option
How to Create a Default Trusted Extensions System
U
- /usr/lib/cups/filter/tsol_separator.ps file
Labeled Printer Output
- /usr/local/scripts/getmounts script
How to Display the Labels of Mounted
Files
- /usr/sbin/txzonemgr script
Zone Administration Utilities in Trusted Extensions
Trusted Extensions Administrative
Tools
How to Create a Default Trusted Extensions System
- unlabeled printing
- configuring
Reducing Printing Restrictions in Trusted Extensions
- updatehome command
.copy_files and .link_files Files
- Upgrade File Label authorization
How to Create a Rights Profile for Convenient Authorizations
- useradd command
Using the useradd Command to Create a Local User
- users
- accessing printers
Labels, Printers, and Printing
- adding local user with useradd
Using the useradd Command to Create a Local User
- assigning authorizations to
Security Attribute Assignment to Users in Trusted Extensions
- assigning labels
Security Attribute Assignment to Users in Trusted Extensions
- assigning passwords
Security Attribute Assignment to Users in Trusted Extensions
- assigning rights
Security Attribute Assignment to Users in Trusted Extensions
- assigning roles to
Security Attribute Assignment to Users in Trusted Extensions
- authorizations for
How to Create a Rights Profile for Convenient Authorizations
- changing default privileges
Security Attribute Assignment to Users in Trusted Extensions
- creating
Administrator Responsibilities
for Users
- creating initial users
How to Create Users Who Can Assume Roles in Trusted Extensions
- customizing environment
Customizing the User Environment for Security
- labels of processes
Session Range
- modifying security defaults
How to Modify Default User Label Attributes
- modifying security defaults for all users
How to Modify policy.conf Defaults
- planning for
Decisions to Make Before Creating
Users in Trusted Extensions
- preventing account locking
How to Prevent Account Locking
for Users
- preventing from seeing others' processes
Modifying Every User's Basic Privilege Set
- printing
Labels, Printers, and Printing
- removing some privileges
How to Restrict a User's Set of
Privileges
- session range
Session Range
- setting up skeleton directories
How to Configure Startup Files for Users in Trusted Extensions
- startup files
How to Configure Startup Files for Users in Trusted Extensions
- using .copy_files file
How to Configure Startup Files for Users in Trusted Extensions
- using .link_files file
How to Configure Startup Files for Users in Trusted Extensions
V
- verifying
- interface is up
How to Verify That a System's Interfaces
Are Up
- label_encodings file
How to Check and Install Your Label Encodings
File
- roles are working
How to Verify That the Trusted Extensions Roles
Work
- viewing See
accessing
- virtual network computing (VNC) See
Xvnc systems running Trusted Extensions
W
- well-formed labels
Label Ranges
- wildcard address See
fallback mechanism
- wire label
Labels for IPsec-Protected Exchanges
- workspaces
- global zone
Roles in Trusted Extensions
X
- Xvnc
- accessing multilevel remotely
How to Configure a Trusted Extensions System With Xvnc for Remote Access
- Xvnc systems running Trusted Extensions
- remote access to
How to Configure a Trusted Extensions System With Xvnc for Remote Access
Methods for Administering Remote Systems in Trusted Extensions
Z
- zenity script
How to Create a Default Trusted Extensions System
- ZFS
- adding dataset to labeled zone
How to Share a ZFS Dataset From
a Labeled Zone
- fast zone creation method
Zone Creation in Trusted Extensions
- mounting dataset read-write on labeled zone
How to Share a ZFS Dataset From
a Labeled Zone
- mounting datasets in Trusted Extensions
Mount Possibilities in Trusted Extensions
- multilevel datasets
Multilevel Datasets for Relabeling Files
How to Create and Share a Multilevel Dataset
- viewing mounted dataset read-only from higher-level zone
Sharing and Mounting a ZFS Dataset From Labeled Zones
- zones
- adding nscd daemon to each labeled zone
How to Configure a Separate Name Service for
Each Labeled Zone
- administering
Managing Zones
- creating MLP
How to Create a Multilevel Port
for a Zone
- creating MLP for NFSv3
Configuring a Private Multilevel Port for NFSv3 Over udp
- creating secondary
How to Create a Secondary Labeled Zone
- deciding creation method
Planning Your Labeled Zones in Trusted Extensions
- deleting
How to Remove Trusted Extensions From the System
- displaying labels of file systems
Displaying the Labels of File Systems in the restricted Zone
- displaying status
How to Display Ready or Running Zones
- enabling login to
How to Enable Users to Log In to a Labeled
Zone
- for isolating labeled services
How to Create a Secondary Labeled Zone
- global
Zones in Trusted Extensions
- global zone processes and
Global Zone Processes and Labeled
Zones
- immutable and Trusted Extensions
Creating Labeled Zones
- in Trusted Extensions
Managing Zones in Trusted Extensions
- kernel and Trusted Extensions
Creating Labeled Zones
- managing
Managing Zones in Trusted Extensions
- net_mac_aware privilege
How to NFS Mount Files in a Labeled Zone
- primary
Primary and Secondary Labeled
Zones
- removing nscd daemon from labeled zones
Removing a Name Service Cache From Each Labeled Zone
- secondary
Primary and Secondary Labeled
Zones
- specifying labels
How to Create Labeled Zones Interactively
- specifying names
How to Create Labeled Zones Interactively
- txzonemgr script
How to Create a Default Trusted Extensions System