|
||||||||||||||||||||||
Part I Initial Configuration of Trusted Extensions 1. Security Planning for Trusted Extensions 2. Configuration Roadmap for Trusted Extensions 3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks) 4. Configuring Trusted Extensions (Tasks) Setting Up the Global Zone in Trusted Extensions Adding Network Interfaces and Routing to Labeled Zones Creating Home Directories in Trusted Extensions Adding Users and Hosts to an Existing Trusted Network Troubleshooting Your Trusted Extensions Configuration Additional Trusted Extensions Configuration Tasks 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) Part II Administration of Trusted Extensions 7. Trusted Extensions Administration Concepts 8. Trusted Extensions Administration Tools 9. Getting Started as a Trusted Extensions Administrator (Tasks) 10. Security Requirements on a Trusted Extensions System (Overview) 11. Administering Security Requirements in Trusted Extensions (Tasks) 12. Users, Rights, and Roles in Trusted Extensions (Overview) 13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks) 14. Remote Administration in Trusted Extensions (Tasks) 15. Trusted Extensions and LDAP (Overview) 16. Managing Zones in Trusted Extensions (Tasks) 17. Managing and Mounting Files in Trusted Extensions (Tasks) 18. Trusted Networking (Overview) 19. Managing Networks in Trusted Extensions (Tasks) 20. Multilevel Mail in Trusted Extensions (Overview) 21. Managing Labeled Printing (Tasks) 22. Devices in Trusted Extensions (Overview) 23. Managing Devices for Trusted Extensions (Tasks) 24. Trusted Extensions Auditing (Overview) 25. Software Management in Trusted Extensions (Tasks) Creating and Managing a Security Policy Site Security Policy and Trusted Extensions Computer Security Recommendations Physical Security Recommendations Personnel Security Recommendations Additional Security References B. Using CDE Actions to Install Zones in Trusted Extensions Associating Network Interfaces With Zones by Using CDE Actions (Task Map) Preparing to Create Zones by Using CDE Actions (Task Map) Creating Labeled Zones by Using CDE Actions (Task Map) C. Configuration Checklist for Trusted Extensions Checklist for Configuring Trusted Extensions D. Quick Reference to Trusted Extensions Administration Administrative Interfaces in Trusted Extensions Solaris Interfaces Extended by Trusted Extensions Tighter Security Defaults in Trusted Extensions Limited Options in Trusted Extensions E. List of Trusted Extensions Man Pages Trusted Extensions Man Pages in Alphabetical Order |
Creating Roles and Users in Trusted ExtensionsIf you are already using administrative roles, you might want to add a Security Administrator role. For sites that have not yet implemented roles, the procedure for creating them is similar to the procedure in the Solaris OS. Trusted Extensions adds the Security Administrator role and requires the use of the Solaris Management Console to administer a Trusted Extensions domain. If site security requires two people to create user and role accounts, create custom rights profiles and assign them to roles to enforce separation of duty.
Create Rights Profiles That Enforce Separation of DutySkip this procedure if separation of duty is not a site security requirement. If your site requires separation of duty, you must create these rights profiles and roles before you populate the LDAP server. This procedure creates rights profiles that have discrete capabilities to manage users. When you assign these profiles to distinct roles, two roles are required to create and configure users. One role can create users, but cannot assign security attributes. The other role can assign security attributes, but cannot create users. When you log in to the Solaris Management Console in a role that is assigned one of these profiles, only the appropriate tabs and fields are available to the role. Before You BeginYou must be superuser, in the root role, or in the Primary Administrator role. When you start this procedure, the Solaris Management Console must be closed.
Next StepsTo prevent the default profiles from being used, see Step 8 in Verify That the Trusted Extensions Roles Work after you verify that the custom profiles enforce separation of duty. Create the Security Administrator Role in Trusted ExtensionsRole creation in Trusted Extensions is identical to role creation in the Solaris OS. However, in Trusted Extensions, a Security Administrator role is required. To create a local Security Administrator role, you can also use the command-line interface, as in Example 4-6. Before You BeginYou must be superuser, in the root role, or in the Primary Administrator role. To create the role on the network, you must have completed Configuring the Solaris Management Console for LDAP (Task Map).
Example 4-6 Using the roleadd Command to Create a Local Security Administrator RoleIn this example, the root user adds the Security Administrator role to the local system by using the roleadd command. For details, see the roleadd(1M) man page. The root user consults Table 1-2 before creating the role. At this site, separation of duty is not required to create a user. # roleadd -c "Local Security Administrator" -d /export/home1 \ -u 110 -P "Information Security,User Security" -K lock_after_retries=no \ -K idletime=5 -K idlecmd=lock -K labelview=showsl \ -K min_label=ADMIN_LOW -K clearance=ADMIN_HIGH secadmin The root user provides an initial password for the role. # passwd -r files secadmin New Password: <Type password> Re-enter new Password: <Retype password> passwd: password successfully changed for secadmin # To assign the role to a local user, see Example 4-7. Create a Restricted System Administrator RoleSkip this procedure if separation of duty is not a site security requirement. In this procedure, you assign a more restrictive rights profile to the System Administrator role. Before You BeginYou must be superuser, in the root role, or in the Primary Administrator role. You have completed Create Rights Profiles That Enforce Separation of Duty. You are using the same toolbox that you used to create the rights profile.
Create Users Who Can Assume Roles in Trusted ExtensionsTo create a local user, you can use the command-line interface, as in Example 4-7, instead of the following procedure. Where site security policy permits, you can choose to create a user who can assume more than one administrative role. For secure user creation, the System Administrator role creates the user, and the Security Administrator role assigns security-relevant attributes, such as a password. Before You BeginYou must be superuser, in the root role, in the Security Administrator role, or in the Primary Administrator role. The Security Administrator role has the least amount of privilege that is required for user creation. The Solaris Management Console is displayed. For details, see Create the Security Administrator Role in Trusted Extensions.
Example 4-7 Using the useradd Command to Create a Local UserIn this example, the root user creates a local user who can assume the Security Administrator role. For details, see the useradd(1M) and atohexlabel(1M) man pages. First, the root user determines the hexadecimal format of the user's minimum label and clearance label. # atohexlabel public 0x0002-08-08 # atohexlabel -c "confidential restricted" 0x0004-08-78 Next, the root user consults Table 1-2, and then creates the user. # useradd -c "Local user for Security Admin" -d /export/home1 \ -K idletime=10 -K idlecmd=logout -K lock_after_retries=no -K min_label=0x0002-08-08 -K clearance=0x0004-08-78 -K labelview=showsl jandoe Then, the root user provides an initial password. # passwd -r files jandoe New Password: <Type password> Re-enter new Password: <Retype password> passwd: password successfully changed for jandoe # Finally, the root user adds the Security Administrator role to the user's definition. The role was created in Create the Security Administrator Role in Trusted Extensions. # usermod -R secadmin jandoe Verify That the Trusted Extensions Roles WorkTo verify each role, assume the role. Then, perform tasks that only that role can perform. Before You BeginIf you have configured DNS or routing, you must reboot after you create the roles and before you verify that the roles work.
Enable Users to Log In to a Labeled ZoneWhen the host is rebooted, the association between the devices and the underlying storage must be re-established. Before You BeginYou have created at least one labeled zone. That zone is not being used for cloning.
|
|||||||||||||||||||||
|