Document Information
Preface
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Tasks)
A. Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
B. Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
D. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
E. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
Index
|
M
- MAC, See mandatory access control (MAC)
- mail
- administering, Multilevel Mail in Trusted Extensions (Overview)
- implementation in Trusted Extensions, Trusted Extensions Mail Features
- multilevel, Multilevel Mail Service
- man pages, quick reference for Trusted Extensions administrators, List of Trusted Extensions Man Pages
- Managing Devices in Trusted Extensions (Task Map), Managing Devices in Trusted Extensions (Task Map)
- Managing Printing in Trusted Extensions (Task Map), Managing Printing in Trusted Extensions (Task Map)
- Managing Software in Trusted Extensions (Tasks), Managing Software in Trusted Extensions (Tasks)
- Managing Trusted Networking (Task Map), Managing the Trusted Network (Task Map)
- Managing Users and Rights With the Solaris Management Console (Task Map), Managing Users and Rights With the Solaris Management Console (Task Map)
- Managing Zones (Task Map), Managing Zones (Task Map)
- managing, See administering
- mandatory access control (MAC)
- enforcing on the network, The Trusted Network
- in Trusted Extensions, Trusted Extensions and Access Control
- maximum labels, remote host templates, Network Security Attributes in Trusted Extensions
- media, copying files from removable, How to Copy Files From Portable Media in Trusted Extensions
- minimum labels, remote host templates, Network Security Attributes in Trusted Extensions
- MLPs, See multilevel ports (MLPs)
- modifying
- label_encodings file, Check and Install Your Label Encodings File
- sel_config file, sel_config File
- motd file, action for editing, Trusted CDE Actions
- mounting
- file systems, How to Share Directories From a Labeled Zone
- files by loopback mounting, How to Loopback Mount a File That Is Usually Not Visible in a Labeled Zone
- NFSv3 file systems, What's New in Trusted Extensions
- overview, NFS Mounts in Trusted Extensions
- troubleshooting, How to Troubleshoot Mount Failures in Trusted Extensions
- ZFS dataset on labeled zone, How to Share a ZFS Dataset From a Labeled Zone
- Mozilla, lengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Information
- multiheaded system, trusted stripe, Multiheaded Systems and the Trusted Extensions Desktop
- multilevel mounts, NFS protocol versions, Trusted Extensions Software and NFS Protocol Versions
- multilevel ports (MLPs)
- administering, How to Compare Trusted Network Database Information With the Kernel Cache
- example of NFSv3 MLP, How to Configure a Multilevel Port for NFSv3 Over udp
- example of web proxy MLP, How to Create a Multilevel Port for a Zone
- multilevel printing
- accessing by print client, How to Enable a Trusted Extensions Client to Access a Printer
- configuring, How to Configure a Multilevel Print Server and Its Printers
- multilevel server, planning, Planning for Multilevel Access
N
- name service cache daemon, See nscd daemon
- Name Service Switch action
- Trusted CDE Actions
- How to Debug the Trusted Extensions Network
- names of file systems, How to Share Directories From a Labeled Zone
- names
- specifying for zones
- Name and Label the Zone
- Specify Zone Names and Zone Labels by Using a CDE Action
- naming services
- actions for managing, Using the LDAP Naming Service in Trusted Extensions
- databases unique to Trusted Extensions, Using a Naming Service in Trusted Extensions
- LDAP, Trusted Extensions and LDAP (Overview)
- naming
- zones
- Name and Label the Zone
- Specify Zone Names and Zone Labels by Using a CDE Action
- net_mac_aware privilege, How to Disable the Mounting of Lower-Level Files
- netstat command
- Command Line Tools in Trusted Extensions
- Network Commands in Trusted Extensions
- How to Debug the Trusted Extensions Network
- network databases
- action for checking, Trusted CDE Actions
- description, Network Configuration Databases in Trusted Extensions
- in LDAP, Using a Naming Service in Trusted Extensions
- network packets, Trusted Extensions Data Packets
- network
- See Trusted Extensions network
- See trusted network
- networking concepts, Trusted Network Communications
- NFS mounts
- accessing lower-level directories, Access to NFS Mounted Directories in Trusted Extensions
- in global and labeled zones, NFS Mounts in Trusted Extensions
- No route available, Labeled Zone Is Unable to Access the X Server
- nonallocatable devices
- protecting, How to Protect Nonallocatable Devices in Trusted Extensions
- setting label range, Effects of Label Range on a Device
- nscd daemon, adding to every labeled zone, Configure a Name Service Cache in Each Labeled Zone
- nsswitch.conf file, action for editing, Trusted CDE Actions
O
P
- packages, accessing the media, How to Add a Software Package in Trusted Extensions
- passwords
- assigning, Security Attribute Assignment to Users in Trusted Extensions
- Change Password menu item
- Trusted Extensions Security Features
- How to Change the Password for root
- changing for root, How to Change the Password for root
- changing user passwords, Trusted Extensions Security Features
- storage, Password Protection
- testing if password prompt is trusted, How to Regain Control of the Desktop's Current Focus
- plabel command, Command Line Tools in Trusted Extensions
- planning
- See also Trusted Extensions use
- account creation, Planning User Security in Trusted Extensions
- administration strategy, Devising an Administration Strategy for Trusted Extensions
- auditing, Planning for Auditing in Trusted Extensions
- data migration, Backing Up the System Before Enabling Trusted Extensions
- hardware, Planning System Hardware and Capacity for Trusted Extensions
- labels, Devising a Label Strategy
- LDAP naming service, Planning for the LDAP Naming Service in Trusted Extensions
- network, Planning Your Trusted Network
- NFS server, Planning for Multilevel Access
- printing, Planning for Multilevel Access
- Trusted Extensions configuration strategy, Devising a Configuration Strategy for Trusted Extensions
- Trusted Extensions, Planning for Security in Trusted Extensions
- zones, Planning for Zones in Trusted Extensions
- policy.conf file, How to Change Security Defaults in System Files
- changing Trusted Extensions keywords, How to Modify policy.conf Defaults
- defaults, policy.conf File Defaults in Trusted Extensions
- how to edit, How to Modify policy.conf Defaults
- PostScript
- enabling to print, How to Enable Users to Print PostScript Files in Trusted Extensions
- printing restrictions in Trusted Extensions, PostScript Printing of Security Information
- Preparing to Create Zones by Using CDE Actions (Task Map), Preparing to Create Zones by Using CDE Actions (Task Map)
- preventing, See protecting
- Print Manager action, Always Print Banner checkbox, How to Suppress Banner and Trailer Pages for Specific Users
- Print PostScript authorization
- PostScript Printing of Security Information
- How to Enable Users to Print PostScript Files in Trusted Extensions
- Print Postscript authorization, How to Create a Rights Profile for Convenient Authorizations
- Print without Banner authorization
- How to Create a Rights Profile for Convenient Authorizations
- How to Suppress Banner and Trailer Pages for Specific Users
- Print without Label authorization, How to Create a Rights Profile for Convenient Authorizations
- printer output, See printing
- printers, setting label range, Effects of Label Range on a Device
- printing
- adding conversion filters, Additional Conversion Filters
- and label_encodings file, Label Encodings File
- authorizations for unlabeled output from a public system, How to Modify policy.conf Defaults
- configuring for multilevel labeled output, How to Configure a Multilevel Print Server and Its Printers
- configuring for print client, How to Enable a Trusted Extensions Client to Access a Printer
- configuring labeled zone, How to Configure a Zone for Single-Label Printing
- configuring labels and text, Labeled Banner and Trailer Pages
- configuring public print jobs, How to Assign a Label to an Unlabeled Print Server
- in local language, Labeled Banner and Trailer Pages
- internationalizing labeled output, Labeled Banner and Trailer Pages
- interoperability with Trusted Solaris 8, Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
- labeling a Solaris print server, How to Assign a Label to an Unlabeled Print Server
- localizing labeled output, Labeled Banner and Trailer Pages
- managing, Labels, Printers, and Printing
- model scripts, Printer Model Scripts
- planning, Planning for Multilevel Access
- PostScript files, How to Enable Users to Print PostScript Files in Trusted Extensions
- PostScript restrictions in Trusted Extensions, PostScript Printing of Security Information
- preventing labels on output, How to Remove Labels From Printed Output
- public jobs from a Solaris print server, How to Assign a Label to an Unlabeled Print Server
- removing PostScript restriction, How to Create a Rights Profile for Convenient Authorizations
- restricting label range, How to Configure a Restricted Label Range for a Printer
- using a Solaris print server, How to Assign a Label to an Unlabeled Print Server
- without labeled banners and trailers
- How to Create a Rights Profile for Convenient Authorizations
- How to Suppress Banner and Trailer Pages for Specific Users
- without page labels
- How to Create a Rights Profile for Convenient Authorizations
- How to Remove Page Labels From All Print Jobs
- privileges
- changing defaults for users, Security Attribute Assignment to Users in Trusted Extensions
- non-obvious reasons for requiring, Evaluating Software for Security
- removing proc_info from basic set, How to Modify policy.conf Defaults
- restricting users', How to Restrict a User's Set of Privileges
- when executing commands, How to Enter the Global Zone in Trusted Extensions
- proc_info privilege, removing from basic set, How to Modify policy.conf Defaults
- procedures, See tasks and task maps
- processes
- labels of user processes, Label Ranges
- labels of, What Labels Protect and Where Labels Appear
- preventing users from seeing others' processes, How to Modify policy.conf Defaults
- profiles, See rights profiles
- programs, See applications
- protecting
- devices from remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions
- devices
- Device Allocation Manager
- Device Protection With Trusted Extensions Software
- file systems by using non-proprietary names, How to Share Directories From a Labeled Zone
- files at lower labels from being accessed, How to Disable the Mounting of Lower-Level Files
- from access by arbitrary hosts, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- information with labels, What Labels Protect and Where Labels Appear
- labeled hosts from contact by arbitrary unlabeled hosts, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- nonallocatable devices, How to Protect Nonallocatable Devices in Trusted Extensions
- publications, security and UNIX, Additional Security References
|