Solaris Trusted Extensions Administrator's Procedures
Previous Next

B

Backing Up, Sharing, and Mounting Labeled Files (Task Map), Backing Up, Sharing, and Mounting Labeled Files (Task Map)
backing up, previous system before installation, Backing Up the System Before Enabling Trusted Extensions
banner pages
description of labeled, Labeled Banner and Trailer Pages
difference from trailer page, Labeled Banner and Trailer Pages
printing without labels, How to Suppress Banner and Trailer Pages for Specific Users
typical, Labeled Banner and Trailer Pages
body pages
description of labeled, Labeled Body Pages
unlabeled for all users, How to Remove Page Labels From All Print Jobs
unlabeled for specific users, How to Enable Specific Users to Suppress Page Labels
booting
zones
Boot the Labeled Zone
Install, Initialize, and Boot a Labeled Zone by Using CDE Actions

C

Cannot reach global zone, Labeled Zone Is Unable to Access the X Server
CD-ROM drives
accessing, Device Protection With Trusted Extensions Software
playing music automatically, How to Configure an Audio Player Program for Use in Trusted CDE
CDE actions, See actions
Change Password menu item
description, Trusted Extensions Security Features
using to change root password, How to Change the Password for root
changing
IDLETIME keyword, How to Modify policy.conf Defaults
labels by authorized users, How to Enable a User to Change the Security Level of Data
rules for label changes, sel_config File
security level of data, How to Enable a User to Change the Security Level of Data
Selection Confirmer defaults, sel_config File
system security defaults, How to Change Security Defaults in System Files
user privileges, How to Restrict a User's Set of Privileges
Check Encodings action
Check and Install Your Label Encodings File
Trusted CDE Actions
Check TN Files action, Trusted CDE Actions
checking
label_encodings file, Check and Install Your Label Encodings File
roles are working, Verify That the Trusted Extensions Roles Work
checklists for initial setup team, Checklist for Configuring Trusted Extensions
chk_encodings command
Check and Install Your Label Encodings File
Command Line Tools in Trusted Extensions
action for invoking, Trusted CDE Actions
choosing, See selecting
classification label component, Dominance Relationships Between Labels
clearances, label overview, Labels in Trusted Extensions Software
Clone Zone action
Trusted CDE Actions
Use the Clone Zone Method in Trusted Extensions
collecting information
before enabling Trusted Extensions, Collect System Information Before Enabling Trusted Extensions
for LDAP service, Collect Information for the Directory Server for LDAP
planning Trusted Extensions configuration, Collecting Information Before Enabling Trusted Extensions
colors, indicating label of workspace, What Labels Protect and Where Labels Appear
commands
executing with privilege, How to Enter the Global Zone in Trusted Extensions
troubleshooting networking, How to Debug the Trusted Extensions Network
trusted_edit trusted editor, How to Edit Administrative Files in Trusted Extensions
commercial applications, evaluating, Security Administrator Responsibilities for Trusted Programs
Common Tasks in Trusted Extensions (Task Map), Common Tasks in Trusted Extensions (Task Map)
compartment label component, Dominance Relationships Between Labels
component definitions, label_encodings file, Label Encodings File
computer access
administrator responsibilities, Information Protection
restricting, Effects of Label Range on a Device
Computers and Networks tool set, Trusted Extensions Tools in the Solaris Management Console
Computers and Networks tool
adding known hosts
How to Add Hosts to the System's Known Network
How to Assign a Security Template to a Host or a Group of Hosts
modifying tnrhdb database, Configuring Trusted Network Databases (Task Map)
configuration files, copying, How to Copy Files to Portable Media in Trusted Extensions
Configure Device Attributes authorization, How to Assign Device Authorizations
Configure Selection Confirmation action, Trusted CDE Actions
Configure Zone action
Trusted CDE Actions
Specify Zone Names and Zone Labels by Using a CDE Action
Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
Configuring an LDAP Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
Configuring Labeled Printing (Task Map), Configuring Labeled Printing (Task Map)
Configuring Routes and Checking Network Information in Trusted Extensions (Task Map), Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
Configuring the Solaris Management Console for LDAP (Task Map), Configuring the Solaris Management Console for LDAP (Task Map)
configuring Trusted Extensions
checklist for install team, Checklist for Configuring Trusted Extensions
headless access, Configuring a Headless System With Trusted Extensions (Tasks)
initial procedures, Configuring Trusted Extensions (Tasks)
labeled zones
Creating Labeled Zones
Using CDE Actions to Install Zones in Trusted Extensions
task maps, Configuration Roadmap for Trusted Extensions
Configuring Trusted Network Databases (Task Map), Configuring Trusted Network Databases (Task Map)
configuring
access to headless Trusted Extensions, Configuring a Headless System With Trusted Extensions (Tasks)
as a role or as superuser?, Make System and Security Decisions Before Enabling Trusted Extensions
audio device to play music, How to Configure an Audio Player Program for Use in Trusted CDE
auditing, Audit Tasks of the Security Administrator
authorizations for devices, How to Create New Device Authorizations
devices, How to Configure a Device in Trusted Extensions
labeled printing, Configuring Labeled Printing (Task Map)
LDAP for Trusted Extensions, Configuring the Sun Java System Directory Server on a Trusted Extensions System
LDAP proxy server for Trusted Extensions clients, Creating a Trusted Extensions Proxy for an Existing Sun Java System Directory Server
network interfaces, Configure the Network Interfaces in Trusted Extensions
routes with security attributes, How to Configure Routes With Security Attributes
serial line for login, How to Configure a Serial Line for Logins
Solaris Management Console for LDAP, Configuring the Solaris Management Console for LDAP (Task Map)
startup files for users, How to Configure Startup Files for Users in Trusted Extensions
Trusted Extensions labeled zones
Creating Labeled Zones
Using CDE Actions to Install Zones in Trusted Extensions
Trusted Extensions software, Configuring Trusted Extensions (Tasks)
trusted network, Managing Networks in Trusted Extensions (Tasks)
console window, troubleshooting not opening, Cannot Open the Console Window in a Labeled Zone
controlling, See restricting
.copy_files file
description, .copy_files and .link_files Files
setting up for users
How to Configure Startup Files for Users in Trusted Extensions
How to Configure Startup Files for Users in Trusted Extensions
startup file, Command Line Tools in Trusted Extensions
Copy Zone action
Trusted CDE Actions
Use the Copy Zone Method in Trusted Extensions
Create a new zone menu item
Name and Label the Zone
Copy or Clone a Zone in Trusted Extensions
Create LDAP Client action
Make the Global Zone an LDAP Client in Trusted Extensions
Trusted CDE Actions
Creating Labeled Zones, Creating Labeled Zones
Creating the Labeled Zones by Using CDE Actions (Task Map), Creating Labeled Zones by Using CDE Actions (Task Map)
creating
accounts during or after configuration, Make System and Security Decisions Before Enabling Trusted Extensions
accounts, Creating Roles and Users in Trusted Extensions
authorizations for devices, How to Create New Device Authorizations
home directories
Creating Home Directories in Trusted Extensions
Home Directory Creation in Trusted Extensions
home directory server, Create the Home Directory Server in Trusted Extensions
labeled zones, Creating Labeled Zones
LDAP client, Make the Global Zone an LDAP Client in Trusted Extensions
LDAP proxy server for Trusted Extensions clients, Create an LDAP Proxy Server
LDAP toolbox, Edit the LDAP Toolbox in the Solaris Management Console
local role with roleadd, Create the Security Administrator Role in Trusted Extensions
local user with useradd, Create Users Who Can Assume Roles in Trusted Extensions
roles, Creating Roles and Users in Trusted Extensions
users who can assume roles, Create Users Who Can Assume Roles in Trusted Extensions
zones
Creating Labeled Zones
Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
credentials, registering LDAP with the Solaris Management Console, Register LDAP Credentials With the Solaris Management Console
Customizing Device Authorizations in Trusted Extensions (Task Map), Customizing Device Authorizations in Trusted Extensions (Task Map)
Customizing User Environment for Security (Task Map), Customizing the User Environment for Security (Task Map)
customizing
device authorizations, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
label_encodings file, Label Encodings File
unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
user accounts, Customizing the User Environment for Security (Task Map)
cut and paste, and labels, Rules When Changing the Level of Security for Data
cutting and pasting, configuring rules for label changes, sel_config File
Previous Next