|
|||||||||||||||||||||||||||
Part I Initial Configuration of Trusted Extensions 1. Security Planning for Trusted Extensions 2. Configuration Roadmap for Trusted Extensions 3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) Part II Administration of Trusted Extensions 7. Trusted Extensions Administration Concepts 8. Trusted Extensions Administration Tools 9. Getting Started as a Trusted Extensions Administrator (Tasks) 10. Security Requirements on a Trusted Extensions System (Overview) 11. Administering Security Requirements in Trusted Extensions (Tasks) 12. Users, Rights, and Roles in Trusted Extensions (Overview) 13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks) Managing Users and Rights With the Solaris Management Console (Task Map) Handling Other Tasks in the Solaris Management Console (Task Map) 14. Remote Administration in Trusted Extensions (Tasks) 15. Trusted Extensions and LDAP (Overview) 16. Managing Zones in Trusted Extensions (Tasks) 17. Managing and Mounting Files in Trusted Extensions (Tasks) 18. Trusted Networking (Overview) 19. Managing Networks in Trusted Extensions (Tasks) 20. Multilevel Mail in Trusted Extensions (Overview) 21. Managing Labeled Printing (Tasks) 22. Devices in Trusted Extensions (Overview) 23. Managing Devices for Trusted Extensions (Tasks) 24. Trusted Extensions Auditing (Overview) 25. Software Management in Trusted Extensions (Tasks) Creating and Managing a Security Policy Site Security Policy and Trusted Extensions Computer Security Recommendations Physical Security Recommendations Personnel Security Recommendations Additional Security References B. Using CDE Actions to Install Zones in Trusted Extensions Associating Network Interfaces With Zones by Using CDE Actions (Task Map) Preparing to Create Zones by Using CDE Actions (Task Map) Creating Labeled Zones by Using CDE Actions (Task Map) C. Configuration Checklist for Trusted Extensions Checklist for Configuring Trusted Extensions D. Quick Reference to Trusted Extensions Administration Administrative Interfaces in Trusted Extensions Solaris Interfaces Extended by Trusted Extensions Tighter Security Defaults in Trusted Extensions Limited Options in Trusted Extensions E. List of Trusted Extensions Man Pages Trusted Extensions Man Pages in Alphabetical Order |
Customizing the User Environment for Security (Task Map)The following task map describes common tasks that you can perform when customizing a system for all users, or when customizing an individual user's account.
How to Modify Default User Label AttributesYou can modify the default user label attributes during the configuration of the first system. The changes must be copied to every Trusted Extensions host. Before You BeginYou must be in the Security Administrator role in the global zone. For details, see How to Enter the Global Zone in Trusted Extensions.
How to Modify policy.conf DefaultsChanging the policy.conf defaults in Trusted Extensions is similar to changing any security-relevant system file in the Solaris OS. In Trusted Extensions, you use a trusted editor to modify system files. Before You BeginYou must be in the Security Administrator role in the global zone. For details, see How to Enter the Global Zone in Trusted Extensions.
Example 13-1 Changing the System's Idle SettingsIn this example, the security administrator wants idle systems to return to the login screen. The default locks an idle system. Therefore, the Security Administrator role adds the IDLECMD keyword=value pair to the /etc/security/policy.conf file as follows: IDLECMD=LOGOUT The administrator also wants systems to be idle a shorter amount of time before logout. Therefore, the Security Administrator role adds the IDLETIME keyword=value pair to the policy.conf file as follows: IDLETIME=10 The system now logs out the user after the system is idle for 10 minutes. Example 13-2 Modifying Every User's Basic Privilege SetIn this example, the security administrator of a Sun RayTM installation does not want regular users to view the processes of other Sun Ray users. Therefore, on every system that is configured with Trusted Extensions, the administrator removes proc_info from the basic set of privileges. The PRIV_DEFAULT setting in the /etc/policy.conf file is modified as follows: PRIV_DEFAULT=basic,!proc_info Example 13-3 Hiding Labels on a SystemIn this example, the security administrator changes the default setting in a system's policy.conf file to hide labels. Any user on this system would not view labels, unless the user was specifically configured to be able to view labels. This setting is reasonable on a single-label system, or on a system that is available to the general public. # /etc/security/policy.conf … LABELVIEW=hidesl To configure a user to override this setting, see How to Hide Labels From a User. Example 13-4 Assigning Printing-Related Authorizations to All Users of a SystemIn this example, the security administrator enables a public kiosk computer to print without labels by typing the following in the computer's /etc/security/policy.conf file. At the next boot, print jobs by all users of this kiosk print without page labels. AUTHS_GRANTED= solaris.print.unlabeled Then, the administrator decides to save paper by removing banner and trailer pages. She first ensures that the Always Print Banners checkbox in the Print Manager is not selected. She then modifies the policy.conf entry to read the following and reboots. Now, all print jobs are unlabeled, and have no banner or trailer pages. AUTHS_GRANTED= solaris.print.unlabeled,solaris.print.nobanner How to Configure Startup Files for Users in Trusted ExtensionsUsers can put a .copy_files file and .link_files file into their home directory at the label that corresponds to their minimum sensitivity label. Users can also modify the existing .copy_files and .link_files files at the users' minimum label. This procedure is for the administrator role to automate the setup for a site. Before You BeginYou must be in the System Administrator role in the global zone. For details, see How to Enter the Global Zone in Trusted Extensions.
Example 13-5 Customizing Startup Files for UsersIn this example, the security administrator configures files for every user's home directory. The files are in place before any user logs in. The files are at the user's minimum label. At this site, the users' default shell is the C shell. The security administrator creates a .copy_files and a .link_files file in the trusted editor with the following contents: ## .copy_files for regular users ## Copy these files to my home directory in every zone .mailrc .mozilla .soffice :wq ## .link_files for regular users with C shells ## Link these files to my home directory in every zone .cshrc .login .Xdefaults .Xdefaults-hostname :wq ## .link_files for regular users with Korn shells # Link these files to my home directory in every zone .ksh .profile .Xdefaults .Xdefaults-hostname :wq In the shell initialization files, the administrator ensures that the users' print jobs go to a labeled printer. ## .cshrc file setenv PRINTER conf-printer1 setenv LPDEST conf-printer1 ## .ksh file export PRINTER conf-printer1 export LPDEST conf-printer1 The administrator modifies the .Xdefaults-home-directory-server file to force the dtterm command to source the .profile file for a new terminal. ## Xdefaults-HDserver Dtterm*LoginShell: true The customized files are copied to the appropriate skeleton directory. $ cp .copy_files .link_files .cshrc .login .profile \ .mailrc .Xdefaults .Xdefaults-home-directory-server \ /etc/skelC $ cp .copy_files .link_files .ksh .profile \ .mailrc .Xdefaults .Xdefaults-home-directory-server \ /etc/skelK TroubleshootingIf you create a .copy_files files at your lowest label, then log in to a higher zone to run the updatehome command and the command fails with an access error, try the following:
Unless you are using NFS mounts for home directories, the automounter in the higher-level zone should be loopback mounting from /zone/lower-level-zone/export/home/username to /zone/lower-level-zone/home/username. How to Lengthen the Timeout When Relabeling InformationIn Trusted Extensions, the Selection Manager mediates transfers of information between labels. The Selection Manager appears for drag-and-drop operations, and for cut-and-paste operations. Some applications require that you set a suitable timeout so that the Selection Manager has time to intervene. A value of two minutes is sufficient. Caution - Do not change the default timeout value on an unlabeled system. The operations fail with the longer timeout value. Before You BeginYou must be in the System Administrator role in the global zone. For details, see How to Enter the Global Zone in Trusted Extensions.
How to Log In to a Failsafe Session in Trusted ExtensionsIn Trusted Extensions, failsafe login is protected. If a regular user has customized shell initialization files and now cannot log in, you can use failsafe login to fix the user's files. Before You BeginYou must know the root password.
|
||||||||||||||||||||||||||
|