Document Information
Preface
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Tasks)
A. Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
B. Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
D. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
E. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
|
IndexA
- access policy
- devices, Device Access Policies
- Discretionary Access Control (DAC)
- Trusted Extensions Software and the Solaris OS
- Differences Between Trusted Extensions and the Solaris OS
- Mandatory Access Control (MAC), Differences Between Trusted Extensions and the Solaris OS
- access, See computer access
- accessing the X server, Labeled Zone Is Unable to Access the X Server
- accessing
- Admin Editor action, How to Edit Administrative Files in Trusted Extensions
- administrative tools, Getting Started as a Trusted Extensions Administrator (Task Map)
- audit records by label, Audit Tasks of the System Administrator
- devices, Device Protection With Trusted Extensions Software
- global zone, How to Enter the Global Zone in Trusted Extensions
- home directories, Zones in Trusted Extensions
- printers, Labels, Printers, and Printing
- remote multilevel desktop, How to Use Xvnc to Remotely Access a Trusted Extensions System
- Solaris Management Console, How to Administer the Local System With the Solaris Management Console
- trusted CDE actions, How to Start CDE Administrative Actions in Trusted Extensions
- ZFS dataset mounted in lower-level zone from higher-level zone, How to Share a ZFS Dataset From a Labeled Zone
- account locking, preventing, How to Prevent Account Locking for Users
- accounts
- See roles
- See also users
creating, Creating Roles and Users in Trusted Extensions
- planning, Planning User Security in Trusted Extensions
- accreditation checks, Trusted Extensions Accreditation Checks
- accreditation ranges, label_encodings file, Label Encodings File
- Action failed. Reconnect to Solaris Zone?, Labeled Zone Is Unable to Access the X Server
- actions
- See administrative actions
- See also individual actions by name
adding new Trusted CDE actions, Adding Trusted CDE Actions
- Admin Editor, How to Edit Administrative Files in Trusted Extensions
- Device Allocation Manager, Device Allocation Manager GUI
- list of trusted CDE, Trusted CDE Actions
- Name Service Switch, How to Debug the Trusted Extensions Network
- Print Manager, How to Suppress Banner and Trailer Pages for Specific Users
- restricted by rights profiles, Trusted Processes in the Window System
- use differences between CDE and Trusted CDE, Adding Trusted CDE Actions
- add_allocatable command, Command Line Tools in Trusted Extensions
- Add Allocatable Device action, Trusted CDE Actions
- adding
- default routes for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
- LDAP toolbox, Edit the LDAP Toolbox in the Solaris Management Console
- local role with roleadd, Create the Security Administrator Role in Trusted Extensions
- local user with useradd, Create Users Who Can Assume Roles in Trusted Extensions
- network databases to LDAP server, Populate the Sun Java System Directory Server
- nscd daemon to every labeled zone, Configure a Name Service Cache in Each Labeled Zone
- roles, Creating Roles and Users in Trusted Extensions
- shared network interfaces, Configure the Network Interfaces in Trusted Extensions
- Trusted Extensions to a Solaris system, Enable Solaris Trusted Extensions
- users by using lpaddent, Add an NIS User to the LDAP Server
- users who can assume roles, Create Users Who Can Assume Roles in Trusted Extensions
- zone-specific network interface, Add a Network Interface to Route an Existing Labeled Zone
- zone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone
- Additional Trusted Extensions Configuration Tasks, Additional Trusted Extensions Configuration Tasks
- addresses
- sharing between global and labeled zones, Specify Two IP Addresses for the System by Using a CDE Action
- specifying one IP address per system
- Configure the Network Interfaces in Trusted Extensions
- Specify One IP Address for the System by Using a CDE Action
- Admin Editor action, Trusted CDE Actions
- opening, How to Edit Administrative Files in Trusted Extensions
- ADMIN_HIGH label, Dominance Relationships Between Labels
- ADMIN_LOW label
- lowest label, Dominance Relationships Between Labels
- protecting administrative files, Password Protection
- Administering Trusted Extensions Remotely (Task Map), Administering Trusted Extensions Remotely (Task Map)
- administering
- account locking, How to Prevent Account Locking for Users
- assigning device authorizations, How to Assign Device Authorizations
- audio device to play music, How to Configure an Audio Player Program for Use in Trusted CDE
- auditing in Trusted Extensions, Audit Management by Role in Trusted Extensions
- changing label of information, How to Enable a User to Change the Security Level of Data
- convenient authorizations for users, How to Create a Rights Profile for Convenient Authorizations
- device allocation, How to Assign Device Authorizations
- device authorizations, How to Create New Device Authorizations
- devices
- Managing Devices for Trusted Extensions (Tasks)
- Managing Devices in Trusted Extensions (Task Map)
- file systems
- mounting, How to NFS Mount Files in a Labeled Zone
- overview, Sharing and Mounting Files in Trusted Extensions
- troubleshooting, How to Troubleshoot Mount Failures in Trusted Extensions
files
- backing up, How to Back Up Files in Trusted Extensions
- restoring, How to Restore Files in Trusted Extensions
from the global zone, How to Enter the Global Zone in Trusted Extensions
- hiding labels from users, How to Hide Labels From a User
- labeled printing, Managing Labeled Printing (Tasks)
- LDAP, Trusted Extensions and LDAP (Overview)
- mail, Multilevel Mail in Trusted Extensions (Overview)
- multilevel ports, How to Compare Trusted Network Database Information With the Kernel Cache
- network in Trusted Extensions, Managing Networks in Trusted Extensions (Tasks)
- network of users, Managing Users and Rights With the Solaris Management Console (Task Map)
- PostScript printing, How to Enable Users to Print PostScript Files in Trusted Extensions
- printing in Trusted Extensions, Managing Printing in Trusted Extensions (Task Map)
- printing interoperability with Trusted Solaris 8, Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
- quick reference for administrators, Quick Reference to Trusted Extensions Administration
- remote host database, How to Assign a Security Template to a Host or a Group of Hosts
- remote host templates, How to Construct a Remote Host Template
- remotely by a role, Enable Remote Login by a Role in Trusted Extensions
- remotely from command line, How to Log In Remotely From the Command Line in Trusted Extensions
- remotely with dtappsession, How to Remotely Administer Trusted Extensions With dtappsession
- remotely with Solaris Management Console
- How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
- How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
- remotely, Remote Administration in Trusted Extensions (Tasks)
- routes with security attributes, How to Configure Routes With Security Attributes
- serial line for login, How to Configure a Serial Line for Logins
- sharing file systems, How to Share Directories From a Labeled Zone
- startup files for users, How to Configure Startup Files for Users in Trusted Extensions
- system files, How to Change Security Defaults in System Files
- third-party software, Software Management in Trusted Extensions (Tasks)
- timeout when relabeling information, How to Lengthen the Timeout When Relabeling Information
- trusted network databases, Configuring Trusted Network Databases (Task Map)
- trusted networking, Managing Networks in Trusted Extensions (Tasks)
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user privileges, How to Restrict a User's Set of Privileges
- users
- Decisions to Make Before Creating Users in Trusted Extensions
- Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
- zones from Trusted JDS, Zone Administration Utilities in Trusted Extensions
- zones, Managing Zones (Task Map)
- administrative actions
- See also actions
- accessing, How to Edit Administrative Files in Trusted Extensions
- Check Encodings, Check and Install Your Label Encodings File
- Clone Zone, Use the Clone Zone Method in Trusted Extensions
- Configure Zone, Specify Zone Names and Zone Labels by Using a CDE Action
- Copy Zone, Use the Copy Zone Method in Trusted Extensions
- Create LDAP Client, Make the Global Zone an LDAP Client in Trusted Extensions
- in CDE, Trusted CDE Actions
- in Trusted_Extensions folder, How to Start CDE Administrative Actions in Trusted Extensions
- Initialize Zone for LDAP, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- Install Zone, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- list of trusted CDE, Trusted CDE Actions
- naming services, Using the LDAP Naming Service in Trusted Extensions
- Share Logical Interface, Specify Two IP Addresses for the System by Using a CDE Action
- Share Physical Interface, Specify One IP Address for the System by Using a CDE Action
- Shut Down Zone, Customize a Booted Zone in Trusted Extensions
- Start Zone, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- starting remotely
- How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
- How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
- trusted, Trusted Processes in the Window System
- Zone Terminal Console
- Customize the Labeled Zone
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- administrative labels, Dominance Relationships Between Labels
- Administrative Roles tool, Trusted Extensions Tools in the Solaris Management Console
- administrative roles, See roles
- administrative tools
- accessing, Getting Started as a Trusted Extensions Administrator (Task Map)
- commands, Command Line Tools in Trusted Extensions
- description, Trusted Extensions Administration Tools
- Device Allocation Manager, Device Allocation Manager
- in Trusted_Extensions folder, How to Start CDE Administrative Actions in Trusted Extensions
- label builder, Label Builder in Trusted Extensions
- Labeled Zone Manager, txzonemgr Script
- Solaris Management Console
- Solaris Management Console Tools
- How to Administer the Local System With the Solaris Management Console
- Trusted CDE actions, Trusted CDE Actions
- txzonemgr script, txzonemgr Script
- allocate command, Command Line Tools in Trusted Extensions
- Allocate Device authorization
- How to Create a Rights Profile for Convenient Authorizations
- Device Protection With Trusted Extensions Software
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- allocate error state, correcting, How to Revoke or Reclaim a Device in Trusted Extensions
- allocating devices
- for copying data, How to Copy Files to Portable Media in Trusted Extensions
- tape drive, How to Copy Files From Portable Media in Trusted Extensions
- allocating, using Device Allocation Manager, Device Allocation Manager GUI
- Always Print Banner checkbox, How to Suppress Banner and Trailer Pages for Specific Users
- applications
- evaluating for security, Security Administrator Responsibilities for Trusted Programs
- installing, Managing Software in Trusted Extensions (Tasks)
- trusted and trustworthy, Evaluating Software for Security
- assigning
- editor as the trusted editor, How to Assign the Editor of Your Choice as the Trusted Editor
- privileges to users, Security Attribute Assignment to Users in Trusted Extensions
- rights profiles, Security Attribute Assignment to Users in Trusted Extensions
- Associating Network Interfaces With Zones by Using CDE Actions (Task Map), Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
- Assume Role menu item, How to Enter the Global Zone in Trusted Extensions
- assuming, roles, How to Enter the Global Zone in Trusted Extensions
- atohexlabel command
- Command Line Tools in Trusted Extensions
- How to Obtain the Hexadecimal Equivalent for a Label
- audio devices
- automatically starting an audio player, How to Configure an Audio Player Program for Use in Trusted CDE
- preventing remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions
- audit_class file, action for editing, Trusted CDE Actions
- Audit Classes action, Trusted CDE Actions
- audit classes for Trusted Extensions, list of new X audit classes, Trusted Extensions Audit Classes
- Audit Control action, Trusted CDE Actions
- audit_control file, action for editing, Trusted CDE Actions
- audit_event file, Trusted CDE Actions
- Audit Events action, Trusted CDE Actions
- audit events for Trusted Extensions, list of, Trusted Extensions Audit Events
- audit planning, Planning for Auditing in Trusted Extensions
- audit policy in Trusted Extensions, Trusted Extensions Audit Policy Options
- audit records in Trusted Extensions, policy, Trusted Extensions Audit Policy Options
- Audit Review profile, reviewing audit records, Audit Tasks of the System Administrator
- Audit Startup action, Trusted CDE Actions
- audit_startup command, action for editing, Trusted CDE Actions
- Audit Tasks of the System Administrator, Audit Tasks of the System Administrator
- audit tokens for Trusted Extensions
- label token, label Token
- list of, Trusted Extensions Audit Tokens
- xatom token, xatom Token
- xclient token, xclient Token
- xcolormap token, xcolormap Token
- xcursor token, xcursor Token
- xfont token, xfont Token
- xgc token, xgc Token
- xpixmap token, xpixmap Token
- xproperty token, xproperty Token
- xselect token, xselect Token
- xwindow token, xwindow Token
- auditconfig command, Command Line Tools in Trusted Extensions
- auditing in Trusted Extensions
- additional audit events, Trusted Extensions Audit Events
- additional audit policies, Trusted Extensions Audit Policy Options
- additional audit tokens, Trusted Extensions Audit Tokens
- additions to existing auditing commands, Extensions to Auditing Commands in Trusted Extensions
- differences from Solaris auditing, Trusted Extensions and Auditing
- reference, Trusted Extensions Auditing (Overview)
- roles for administering, Audit Management by Role in Trusted Extensions
- security administrator tasks, Audit Tasks of the Security Administrator
- system administrator tasks, Audit Tasks of the System Administrator
- tasks, Audit Tasks in Trusted Extensions
- X audit classes, Trusted Extensions Audit Classes
- auditing, planning, Planning for Auditing in Trusted Extensions
- auditreduce command, Command Line Tools in Trusted Extensions
- authorizations
- adding new device authorizations, How to Create New Device Authorizations
- Allocate Device
- Device Protection With Trusted Extensions Software
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- assigning device authorizations, How to Assign Device Authorizations
- assigning, Security Attribute Assignment to Users in Trusted Extensions
- authorizing a user or role to change label, How to Enable a User to Change the Security Level of Data
- Configure Device Attributes, How to Assign Device Authorizations
- convenient for users, How to Create a Rights Profile for Convenient Authorizations
- creating customized device authorizations, How to Create New Device Authorizations
- creating local and remote device authorizations, How to Create New Device Authorizations
- customizing for devices, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- granted, Trusted Extensions and Access Control
- Print Postscript, PostScript Printing of Security Information
- Print PostScript, How to Enable Users to Print PostScript Files in Trusted Extensions
- profiles that include device allocation authorizations, How to Assign Device Authorizations
- Revoke or Reclaim Device
- How to Assign Device Authorizations
- How to Assign Device Authorizations
- solaris.print.nobanner, How to Suppress Banner and Trailer Pages for Specific Users
- solaris.print.ps, How to Enable Users to Print PostScript Files in Trusted Extensions
- authorizing
- device allocation, How to Assign Device Authorizations
- PostScript printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- automount command, Command Line Tools in Trusted Extensions
|