|
|||
Transition to the Solaris Trusted Extensions Release The Solaris Trusted Extensions Release Summary of Removed Trusted Solaris Features Differences Between Trusted Solaris 8 Software and Solaris Trusted Extensions Differences Between Solaris Express Developer Edition 5/07 Software and Solaris Trusted Extensions New Interfaces in Trusted Extensions Software A. Interface Changes in the Solaris Trusted Extensions Release |
Overview of Changes From Trusted Solaris SoftwareTrusted Extensions administrators assign labels to hosts, zones, devices, and users. Trusted Extensions applies these labels to resources such as files, processes, network packets, and windows. The basis for applying these labels is the host or zone with which the resources are associated. As in previous Trusted Solaris releases, the Solaris OS provides support for privileges, authorizations, and auditing. Trusted Extensions adds to the privileges, authorizations, rights profiles, audit classes, and audit events that the Solaris OS defines. As in previous releases, Trusted Extensions adds CDE actions to rights profiles. As in previous releases, the software provides a trusted windowing system, desktop, and administration tools that extend Solaris functionality. Printing is modified to handle labeled print jobs. Also, Trusted Extensions provides a trusted version of the Sun JavaTM Desktop System. This trusted version is called Solaris Trusted Extensions (JDS). Unlike Trusted Solaris software, Trusted Extensions is a configuration of the underlying Solaris OS. Trusted Extensions does not support the NIS+ naming service. LDAP is the recommended naming service for this release. Also, the root user in Trusted Extensions is identical to the root user in the Solaris OS. You can modify the root user as you can in the Solaris OS, that is, by turning the root user into a role. |
||
|