Document Information
Preface
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Tasks)
A. Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
B. Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
D. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
E. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
Index
|
T
- tape devices
- accessing, Device Protection With Trusted Extensions Software
- allocating, How to Copy Files From Portable Media in Trusted Extensions
- tar command, Command Line Tools in Trusted Extensions
- Task Map: Configuring Trusted Extensions, Task Map: Configuring Trusted Extensions
- Task Map: Preparing a Solaris System for Trusted Extensions, Task Map: Preparing a Solaris System for Trusted Extensions
- Task Map: Preparing For and Enabling Trusted Extensions, Task Map: Preparing For and Enabling Trusted Extensions
- tasks and task maps
- Additional Trusted Extensions Configuration Tasks, Additional Trusted Extensions Configuration Tasks
- Administering Trusted Extensions Remotely (Task Map), Administering Trusted Extensions Remotely (Task Map)
- Associating Network Interfaces With Zones by Using CDE Actions (Task Map), Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
- Audit Tasks of the Security Administrator, Audit Tasks of the Security Administrator
- Audit Tasks of the System Administrator, Audit Tasks of the System Administrator
- Backing Up, Sharing, and Mounting Labeled Files (Task Map), Backing Up, Sharing, and Mounting Labeled Files (Task Map)
- Common Tasks in Trusted Extensions (Task Map), Common Tasks in Trusted Extensions (Task Map)
- Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
- Configuring an LDAP Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
- Configuring Labeled Printing (Task Map), Configuring Labeled Printing (Task Map)
- Configuring Routes and Checking Network Information in Trusted Extensions (Task Map), Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
- Configuring the Solaris Management Console for LDAP (Task Map), Configuring the Solaris Management Console for LDAP (Task Map)
- Configuring Trusted Network Databases (Task Map), Configuring Trusted Network Databases (Task Map)
- Creating Labeled Zones, Creating Labeled Zones
- Creating the Labeled Zones by Using CDE Actions (Task Map), Creating Labeled Zones by Using CDE Actions (Task Map)
- Customizing Device Authorizations in Trusted Extensions (Task Map), Customizing Device Authorizations in Trusted Extensions (Task Map)
- Customizing User Environment for Security (Task Map), Customizing the User Environment for Security (Task Map)
- Getting Started as a Trusted Extensions Administrator (Task Map), Getting Started as a Trusted Extensions Administrator (Task Map)
- Handling Devices in Trusted Extensions (Task Map), Handling Devices in Trusted Extensions (Task Map)
- Handling Other Tasks in the Solaris Management Console (Task Map), Handling Other Tasks in the Solaris Management Console (Task Map)
- Headless System Configuration in Trusted Extensions (Task Map), Headless System Configuration in Trusted Extensions (Task Map)
- Managing Devices in Trusted Extensions (Task Map), Managing Devices in Trusted Extensions (Task Map)
- Managing Printing in Trusted Extensions (Task Map), Managing Printing in Trusted Extensions (Task Map)
- Managing Software in Trusted Extensions (Tasks), Managing Software in Trusted Extensions (Tasks)
- Managing Trusted Networking (Task Map), Managing the Trusted Network (Task Map)
- Managing Users and Rights With the Solaris Management Console, Managing Users and Rights With the Solaris Management Console (Task Map)
- Managing Zones (Task Map), Managing Zones (Task Map)
- Preparing to Create Zones by Using CDE Actions (Task Map), Preparing to Create Zones by Using CDE Actions (Task Map)
- Reducing Printing Restrictions in Trusted Extensions (Task Map), Reducing Printing Restrictions in Trusted Extensions (Task Map)
- Troubleshooting the Trusted Network (Task Map), Troubleshooting the Trusted Network (Task Map)
- Using Devices in Trusted Extensions (Tasks Map), Using Devices in Trusted Extensions (Task Map)
- tcp_listen=true LDAP setting, Enable the Solaris Management Console to Accept Network Communications
- text label equivalents, determining, How to Obtain a Readable Label From Its Hexadecimal Form
- Thunderbird, lengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Information
- tnchkdb command
- action for checking, Trusted CDE Actions
- description, Network Commands in Trusted Extensions
- summary, Command Line Tools in Trusted Extensions
- tnctl command
- description, Network Commands in Trusted Extensions
- summary, Command Line Tools in Trusted Extensions
- updating kernel cache, How to Synchronize the Kernel Cache With Trusted Network Databases
- using, How to Synchronize the Kernel Cache With Trusted Network Databases
- tnd command
- description, Network Commands in Trusted Extensions
- summary, Command Line Tools in Trusted Extensions
- tninfo command
- description, Network Commands in Trusted Extensions
- summary, Command Line Tools in Trusted Extensions
- using
- How to Debug the Trusted Extensions Network
- How to Debug a Client Connection to the LDAP Server
- tnrhdb database
- 0.0.0.0 host address
- Trusted Network Fallback Mechanism
- How to Limit the Hosts That Can Be Contacted on the Trusted Network
- 0.0.0.0 wildcard address, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- action for checking, Trusted CDE Actions
- adding to, How to Assign a Security Template to a Host or a Group of Hosts
- configuring, Configuring Trusted Network Databases (Task Map)
- fallback mechanism
- Trusted Network Fallback Mechanism
- Configuring Trusted Network Databases (Task Map)
- tool for administering, Security Templates Tool
- wildcard address, Configuring Trusted Network Databases (Task Map)
- tnrhtp database
- action for checking, Trusted CDE Actions
- adding to, How to Construct a Remote Host Template
- tool for administering, Security Templates Tool
- toolboxes
- adding LDAP server to tsol_ldap.tbx, Edit the LDAP Toolbox in the Solaris Management Console
- defined, Solaris Management Console Tools
- loading in Trusted Extensions, Initialize the Solaris Management Console Server in Trusted Extensions
- Scope=LDAP, Register LDAP Credentials With the Solaris Management Console
- Tools subpanel, Device Allocation Manager, Device Allocation Manager GUI
- tools, See administrative tools
- trailer pages, See banner pages
- translation, See localizing
- Troubleshooting the Trusted Network (Task Map), Troubleshooting the Trusted Network (Task Map)
- troubleshooting
- accessing X server, Labeled Zone Is Unable to Access the X Server
- console window not opening, Cannot Open the Console Window in a Labeled Zone
- failed login, How to Log In to a Failsafe Session in Trusted Extensions
- Installation of these packages generated errors: SUNWpkgname
- Install the Labeled Zone
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- IPv6 configuration, Enable IPv6 Networking in Trusted Extensions
- LDAP, How to Debug a Client Connection to the LDAP Server
- mounted file systems, How to Troubleshoot Mount Failures in Trusted Extensions
- network, Troubleshooting the Trusted Network (Task Map)
- reclaiming a device, How to Revoke or Reclaim a Device in Trusted Extensions
- repairing labels in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
- Solaris Management Console
- Initialize the Solaris Management Console Server in Trusted Extensions
- Initialize the Solaris Management Console Server in Trusted Extensions
- Solaris release that supports the labeld service, Enable Solaris Trusted Extensions
- Trusted Extensions configuration, Troubleshooting Your Trusted Extensions Configuration
- Trusted Network Zones Properties, Specify Zone Names and Zone Labels by Using a CDE Action
- trusted network, How to Debug the Trusted Extensions Network
- verifying interface is up, How to Verify That a Host's Interfaces Are Up
- viewing ZFS dataset mounted in lower-level zone, How to Share a ZFS Dataset From a Labeled Zone
- trusted actions, in CDE, Trusted CDE Actions
- trusted applications, in a role workspace, Administration Tools for Trusted Extensions
- trusted_edit trusted editor, How to Edit Administrative Files in Trusted Extensions
- trusted editor
- assigning your favorite editor, How to Assign the Editor of Your Choice as the Trusted Editor
- starting, How to Edit Administrative Files in Trusted Extensions
- Trusted Extensions configuration
- adding network databases to LDAP server, Populate the Sun Java System Directory Server
- changing default DOI value, Configure the Domain of Interpretation
- databases for LDAP, Configuring the Sun Java System Directory Server on a Trusted Extensions System
- division of tasks, Initial Setup Team Responsibilities
- evaluated configuration, Understanding Your Site's Security Policy
- headless systems, Configuring a Headless System With Trusted Extensions (Tasks)
- initial procedures, Configuring Trusted Extensions (Tasks)
- initial setup team responsibilities, Initial Setup Team Responsibilities
- labeled zones
- Creating Labeled Zones
- Using CDE Actions to Install Zones in Trusted Extensions
- LDAP, Configuring the Sun Java System Directory Server on a Trusted Extensions System
- reboot to activate labels, Reboot and Log In to Trusted Extensions
- task maps, Configuration Roadmap for Trusted Extensions
- troubleshooting, Troubleshooting Your Trusted Extensions Configuration
- Trusted Extensions DOI, enabling DOI different from 1, What's New in Trusted Extensions
- Trusted_Extensions folder
- location, Administration Tools for Trusted Extensions
- using actions in, How to Start CDE Administrative Actions in Trusted Extensions
- using Admin Editor from, How to Edit Administrative Files in Trusted Extensions
- Trusted Extensions network
- adding zone-specific interface, Add a Network Interface to Route an Existing Labeled Zone
- adding zone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone
- enabling IPv6, Enable IPv6 Networking in Trusted Extensions
- planning, Planning Your Trusted Network
- removing zone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone
- specifying default routes for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
- specifying labeles for IP addresses, Specify Labels for Network Interfaces by Using the Solaris Management Console
- specifying labels for interfaces, Specify Labels for Network Interfaces by Using the Solaris Management Console
- Trusted Extensions requirements
- root password, Prepare an Installed Solaris System for Trusted Extensions
- Solaris installation, Install a Solaris System to Support Trusted Extensions
- Solaris installed systems, Prepare an Installed Solaris System for Trusted Extensions
- Trusted Extensions
- See also Trusted Extensions planning
- collecting information before enabling, Collect System Information Before Enabling Trusted Extensions
- decisions to make before enabling, Make System and Security Decisions Before Enabling Trusted Extensions
- differences from Solaris administrator's perspective, Results of Enabling Trusted Extensions From an Administrator's Perspective
- differences from Solaris auditing, Trusted Extensions and Auditing
- differences from Solaris OS, Differences Between Trusted Extensions and the Solaris OS
- disabling, How to Remove Trusted Extensions From the System
- enabling, Enable Solaris Trusted Extensions
- man pages quick reference, List of Trusted Extensions Man Pages
- memory requirements, Planning System Hardware and Capacity for Trusted Extensions
- planning configuration strategy, Devising a Configuration Strategy for Trusted Extensions
- planning for, Planning for Security in Trusted Extensions
- planning hardware, Planning System Hardware and Capacity for Trusted Extensions
- planning network, Planning Your Trusted Network
- preparing for
- Installing or Upgrading the Solaris OS for Trusted Extensions
- Collecting Information and Making Decisions Before Enabling Trusted Extensions
- quick reference to administration, Quick Reference to Trusted Extensions Administration
- results before configuration, Results of Enabling Trusted Extensions From an Administrator's Perspective
- separation of duty, Devising a Configuration Strategy for Trusted Extensions
- similarities with Solaris auditing, Trusted Extensions and Auditing
- similarities with Solaris OS, Similarities Between Trusted Extensions and the Solaris OS
- two-role configuration strategy, Devising a Configuration Strategy for Trusted Extensions
- trusted grab, key combination, How to Regain Control of the Desktop's Current Focus
- Trusted Network tools
- description, Trusted Extensions Tools in the Solaris Management Console
- using, How to Open the Trusted Networking Tools
- Trusted Network Zones tool
- assigning labels to named zones
- Name and Label the Zone
- Specify Zone Names and Zone Labels by Using a CDE Action
- configuring a multilevel port, How to Configure a Multilevel Port for NFSv3 Over udp
- configuring a multilevel print server, How to Configure a Multilevel Print Server and Its Printers
- creating a multilevel port, How to Create a Multilevel Port for a Zone
- description
- Trusted Extensions Tools in the Solaris Management Console
- Trusted Network Zones Tool
- troubleshooting, Specify Zone Names and Zone Labels by Using a CDE Action
- trusted network
- 0.0.0.0 tnrhdb entry, How to Limit the Hosts That Can Be Contacted on the Trusted Network
- action for setting default routes, Trusted CDE Actions
- administering with Solaris Management Console, Configuring Trusted Network Databases (Task Map)
- checking syntax of files, How to Check the Syntax of Trusted Network Databases
- concepts, Trusted Networking (Overview)
- default labeling, Trusted Extensions Accreditation Checks
- editing local files, Configuring Trusted Network Databases (Task Map)
- example of routing, Gateways in Trusted Extensions
- host types, Host Type and Template Name in Security Templates
- labels and MAC enforcement, The Trusted Network
- using templates, Configuring Trusted Network Databases (Task Map)
- trusted path attribute, when available, Roles and Trusted Extensions
- Trusted Path menu, Assume Role, How to Enter the Global Zone in Trusted Extensions
- trusted processes
- in the window system, Trusted Processes in the Window System
- starting actions, Trusted Processes in the Window System
- trusted programs
- adding, Developer Responsibilities When Creating Trusted Programs
- defined, Evaluating Software for Security
- trusted stripe
- on multiheaded system, Multiheaded Systems and the Trusted Extensions Desktop
- warping pointer to, How to Regain Control of the Desktop's Current Focus
- trustworthy programs, Evaluating Software for Security
- tsol_ldap.tbx file, Edit the LDAP Toolbox in the Solaris Management Console
- tsol_separator.ps file
- configurable values, Labeled Banner and Trailer Pages
- customizing labeled printing, Labeled Printer Output
- txzonemgr script
- Run the txzonemgr Script
- Labeled Zone Is Unable to Access the X Server
|