Document Information
Preface
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Tasks)
A. Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
B. Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
D. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
E. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
Index
|
B
- Backing Up, Sharing, and Mounting Labeled Files (Task Map), Backing Up, Sharing, and Mounting Labeled Files (Task Map)
- backing up, previous system before installation, Backing Up the System Before Enabling Trusted Extensions
- banner pages
- description of labeled, Labeled Banner and Trailer Pages
- difference from trailer page, Labeled Banner and Trailer Pages
- printing without labels, How to Suppress Banner and Trailer Pages for Specific Users
- typical, Labeled Banner and Trailer Pages
- body pages
- description of labeled, Labeled Body Pages
- unlabeled for all users, How to Remove Page Labels From All Print Jobs
- unlabeled for specific users, How to Enable Specific Users to Suppress Page Labels
- booting
- zones
- Boot the Labeled Zone
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
C
- Cannot reach global zone, Labeled Zone Is Unable to Access the X Server
- CD-ROM drives
- accessing, Device Protection With Trusted Extensions Software
- playing music automatically, How to Configure an Audio Player Program for Use in Trusted CDE
- CDE actions, See actions
- Change Password menu item
- description, Trusted Extensions Security Features
- using to change root password, How to Change the Password for root
- changing
- IDLETIME keyword, How to Modify policy.conf Defaults
- labels by authorized users, How to Enable a User to Change the Security Level of Data
- rules for label changes, sel_config File
- security level of data, How to Enable a User to Change the Security Level of Data
- Selection Confirmer defaults, sel_config File
- system security defaults, How to Change Security Defaults in System Files
- user privileges, How to Restrict a User's Set of Privileges
- Check Encodings action
- Check and Install Your Label Encodings File
- Trusted CDE Actions
- Check TN Files action, Trusted CDE Actions
- checking
- label_encodings file, Check and Install Your Label Encodings File
- roles are working, Verify That the Trusted Extensions Roles Work
- checklists for initial setup team, Checklist for Configuring Trusted Extensions
- chk_encodings command
- Check and Install Your Label Encodings File
- Command Line Tools in Trusted Extensions
- action for invoking, Trusted CDE Actions
- choosing, See selecting
- classification label component, Dominance Relationships Between Labels
- clearances, label overview, Labels in Trusted Extensions Software
- Clone Zone action
- Trusted CDE Actions
- Use the Clone Zone Method in Trusted Extensions
- collecting information
- before enabling Trusted Extensions, Collect System Information Before Enabling Trusted Extensions
- for LDAP service, Collect Information for the Directory Server for LDAP
- planning Trusted Extensions configuration, Collecting Information Before Enabling Trusted Extensions
- colors, indicating label of workspace, What Labels Protect and Where Labels Appear
- commands
- executing with privilege, How to Enter the Global Zone in Trusted Extensions
- troubleshooting networking, How to Debug the Trusted Extensions Network
- trusted_edit trusted editor, How to Edit Administrative Files in Trusted Extensions
- commercial applications, evaluating, Security Administrator Responsibilities for Trusted Programs
- Common Tasks in Trusted Extensions (Task Map), Common Tasks in Trusted Extensions (Task Map)
- compartment label component, Dominance Relationships Between Labels
- component definitions, label_encodings file, Label Encodings File
- computer access
- administrator responsibilities, Information Protection
- restricting, Effects of Label Range on a Device
- Computers and Networks tool set, Trusted Extensions Tools in the Solaris Management Console
- Computers and Networks tool
- adding known hosts
- How to Add Hosts to the System's Known Network
- How to Assign a Security Template to a Host or a Group of Hosts
- modifying tnrhdb database, Configuring Trusted Network Databases (Task Map)
- configuration files, copying, How to Copy Files to Portable Media in Trusted Extensions
- Configure Device Attributes authorization, How to Assign Device Authorizations
- Configure Selection Confirmation action, Trusted CDE Actions
- Configure Zone action
- Trusted CDE Actions
- Specify Zone Names and Zone Labels by Using a CDE Action
- Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
- Configuring an LDAP Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
- Configuring Labeled Printing (Task Map), Configuring Labeled Printing (Task Map)
- Configuring Routes and Checking Network Information in Trusted Extensions (Task Map), Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
- Configuring the Solaris Management Console for LDAP (Task Map), Configuring the Solaris Management Console for LDAP (Task Map)
- configuring Trusted Extensions
- checklist for install team, Checklist for Configuring Trusted Extensions
- headless access, Configuring a Headless System With Trusted Extensions (Tasks)
- initial procedures, Configuring Trusted Extensions (Tasks)
- labeled zones
- Creating Labeled Zones
- Using CDE Actions to Install Zones in Trusted Extensions
- task maps, Configuration Roadmap for Trusted Extensions
- Configuring Trusted Network Databases (Task Map), Configuring Trusted Network Databases (Task Map)
- configuring
- access to headless Trusted Extensions, Configuring a Headless System With Trusted Extensions (Tasks)
- as a role or as superuser?, Make System and Security Decisions Before Enabling Trusted Extensions
- audio device to play music, How to Configure an Audio Player Program for Use in Trusted CDE
- auditing, Audit Tasks of the Security Administrator
- authorizations for devices, How to Create New Device Authorizations
- devices, How to Configure a Device in Trusted Extensions
- labeled printing, Configuring Labeled Printing (Task Map)
- LDAP for Trusted Extensions, Configuring the Sun Java System Directory Server on a Trusted Extensions System
- LDAP proxy server for Trusted Extensions clients, Creating a Trusted Extensions Proxy for an Existing Sun Java System Directory Server
- network interfaces, Configure the Network Interfaces in Trusted Extensions
- routes with security attributes, How to Configure Routes With Security Attributes
- serial line for login, How to Configure a Serial Line for Logins
- Solaris Management Console for LDAP, Configuring the Solaris Management Console for LDAP (Task Map)
- startup files for users, How to Configure Startup Files for Users in Trusted Extensions
- Trusted Extensions labeled zones
- Creating Labeled Zones
- Using CDE Actions to Install Zones in Trusted Extensions
- Trusted Extensions software, Configuring Trusted Extensions (Tasks)
- trusted network, Managing Networks in Trusted Extensions (Tasks)
- console window, troubleshooting not opening, Cannot Open the Console Window in a Labeled Zone
- controlling, See restricting
- .copy_files file
- description, .copy_files and .link_files Files
- setting up for users
- How to Configure Startup Files for Users in Trusted Extensions
- How to Configure Startup Files for Users in Trusted Extensions
- startup file, Command Line Tools in Trusted Extensions
- Copy Zone action
- Trusted CDE Actions
- Use the Copy Zone Method in Trusted Extensions
- Create a new zone menu item
- Name and Label the Zone
- Copy or Clone a Zone in Trusted Extensions
- Create LDAP Client action
- Make the Global Zone an LDAP Client in Trusted Extensions
- Trusted CDE Actions
- Creating Labeled Zones, Creating Labeled Zones
- Creating the Labeled Zones by Using CDE Actions (Task Map), Creating Labeled Zones by Using CDE Actions (Task Map)
- creating
- accounts during or after configuration, Make System and Security Decisions Before Enabling Trusted Extensions
- accounts, Creating Roles and Users in Trusted Extensions
- authorizations for devices, How to Create New Device Authorizations
- home directories
- Creating Home Directories in Trusted Extensions
- Home Directory Creation in Trusted Extensions
- home directory server, Create the Home Directory Server in Trusted Extensions
- labeled zones, Creating Labeled Zones
- LDAP client, Make the Global Zone an LDAP Client in Trusted Extensions
- LDAP proxy server for Trusted Extensions clients, Create an LDAP Proxy Server
- LDAP toolbox, Edit the LDAP Toolbox in the Solaris Management Console
- local role with roleadd, Create the Security Administrator Role in Trusted Extensions
- local user with useradd, Create Users Who Can Assume Roles in Trusted Extensions
- roles, Creating Roles and Users in Trusted Extensions
- users who can assume roles, Create Users Who Can Assume Roles in Trusted Extensions
- zones
- Creating Labeled Zones
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- credentials, registering LDAP with the Solaris Management Console, Register LDAP Credentials With the Solaris Management Console
- Customizing Device Authorizations in Trusted Extensions (Task Map), Customizing Device Authorizations in Trusted Extensions (Task Map)
- Customizing User Environment for Security (Task Map), Customizing the User Environment for Security (Task Map)
- customizing
- device authorizations, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- label_encodings file, Label Encodings File
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user accounts, Customizing the User Environment for Security (Task Map)
- cut and paste, and labels, Rules When Changing the Level of Security for Data
- cutting and pasting, configuring rules for label changes, sel_config File
|