Document Information
Preface
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
txzonemgr Script
Trusted CDE Actions
Device Allocation Manager
Solaris Management Console Tools
Label Builder in Trusted Extensions
Command Line Tools in Trusted Extensions
Remote Administration in Trusted Extensions
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Tasks)
A. Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
B. Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
D. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
E. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
Index
|
Administration Tools for Trusted Extensions
Administration on a system that is configured with Trusted Extensions uses many of
the same tools that are available in the Solaris OS. Trusted Extensions
offers security-enhanced tools as well. Administration tools are available only to roles in a
role workspace. Within a role workspace, you can access commands, actions, applications, and scripts that
are trusted. The following table summarizes these administrative tools. Table 8-1 Trusted Extensions Administrative ToolsTool |
Description |
For More Information |
/usr/sbin/txzonemgr |
Provides a menu-based
wizard for creating, installing, initializing, and booting zones. This script replaces the Trusted
CDE actions that manage zones. The script also provides menu items for networking
options, name services options, and for clienting the global zone to an existing
LDAP server. txzonemgr uses the zenity command. |
See Creating Labeled Zones See also the zenity(1)
man page. |
In Trusted CDE, actions in the Trusted_Extensions folder in the Application Manager
folder |
Used to edit local files that the Solaris Management Console does not
manage, such as /etc/system. Some actions run scripts, such as the Install
Zone action. |
See Trusted CDE Actions and How to Start CDE Administrative Actions in Trusted Extensions. |
In Trusted CDE, Device Allocation Manager In Solaris Trusted Extensions
(JDS), Device Manager |
Used to administer the label ranges of devices, and to
allocate or deallocate devices. |
See Device Allocation Manager and Handling Devices in Trusted Extensions (Task Map). |
Solaris Management Console |
Used to configure users, roles,
rights, hosts, zones, and networks. This tool can update local files or LDAP
databases. This tool can also launch the dtappsession legacy application. |
For basic functionality, see Chapter 2, Working With the Solaris Management Console (Tasks), in System Administration Guide: Basic Administration.
For information that is specific to Trusted Extensions, see Solaris Management Console Tools. |
Solaris Management Console commands,
such as smuser and smtnzonecfg |
Is the command-line interface for the Solaris Management
Console. |
For a list, see Table 8-4. |
Label Builder |
Is also a user tool. Appears when
a program requires you to choose a label. |
For an example, see How to Modify a User's Label Range in the Solaris Management Console. |
Trusted Extensions
commands |
Used to perform tasks that are not covered by Solaris Management Console
tools or CDE actions. |
For the list of administrative commands, see Table 8-5. |
|