|
|
B
- Backing Up, Sharing, and Mounting Labeled Files (Task Map), Backing Up, Sharing, and Mounting Labeled Files (Task Map)
- backing up, previous system before installation, Backing Up the System Before Enabling Trusted Extensions
- banner pages
- description of labeled, Labeled Banner and Trailer Pages
- difference from trailer page, Labeled Banner and Trailer Pages
- printing without labels, How to Suppress Banner and Trailer Pages for Specific Users
- typical, Labeled Banner and Trailer Pages
- body pages
- description of labeled, Labeled Body Pages
- unlabeled for all users, How to Remove Page Labels From All Print Jobs
- unlabeled for specific users, How to Enable Specific Users to Suppress Page Labels
- booting
- zones
- Boot the Labeled Zone
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
C
- Cannot reach global zone, Labeled Zone Is Unable to Access the X Server
- CD-ROM drives
- accessing, Device Protection With Trusted Extensions Software
- playing music automatically, How to Configure an Audio Player Program for Use in Trusted CDE
- CDE actions, See actions
- Change Password menu item
- description, Trusted Extensions Security Features
- using to change root password, How to Change the Password for root
- changing
- IDLETIME keyword, How to Modify policy.conf Defaults
- labels by authorized users, How to Enable a User to Change the Security Level of Data
- rules for label changes, sel_config File
- security level of data, How to Enable a User to Change the Security Level of Data
- Selection Confirmer defaults, sel_config File
- system security defaults, How to Change Security Defaults in System Files
- user privileges, How to Restrict a User's Set of Privileges
- Check Encodings action
- Check and Install Your Label Encodings File
- Trusted CDE Actions
- Check TN Files action, Trusted CDE Actions
- checking
- label_encodings file, Check and Install Your Label Encodings File
- roles are working, Verify That the Trusted Extensions Roles Work
- checklists for initial setup team, Checklist for Configuring Trusted Extensions
- chk_encodings command
- Check and Install Your Label Encodings File
- Command Line Tools in Trusted Extensions
- action for invoking, Trusted CDE Actions
- choosing, See selecting
- classification label component, Dominance Relationships Between Labels
- clearances, label overview, Labels in Trusted Extensions Software
- Clone Zone action
- Trusted CDE Actions
- Use the Clone Zone Method in Trusted Extensions
- collecting information
- before enabling Trusted Extensions, Collect System Information Before Enabling Trusted Extensions
- for LDAP service, Collect Information for the Directory Server for LDAP
- planning Trusted Extensions configuration, Collecting Information Before Enabling Trusted Extensions
- colors, indicating label of workspace, What Labels Protect and Where Labels Appear
- commands
- executing with privilege, How to Enter the Global Zone in Trusted Extensions
- troubleshooting networking, How to Debug the Trusted Extensions Network
- trusted_edit trusted editor, How to Edit Administrative Files in Trusted Extensions
- commercial applications, evaluating, Security Administrator Responsibilities for Trusted Programs
- Common Tasks in Trusted Extensions (Task Map), Common Tasks in Trusted Extensions (Task Map)
- compartment label component, Dominance Relationships Between Labels
- component definitions, label_encodings file, Label Encodings File
- computer access
- administrator responsibilities, Information Protection
- restricting, Effects of Label Range on a Device
- Computers and Networks tool set, Trusted Extensions Tools in the Solaris Management Console
- Computers and Networks tool
- adding known hosts
- How to Add Hosts to the System's Known Network
- How to Assign a Security Template to a Host or a Group of Hosts
- modifying tnrhdb database, Configuring Trusted Network Databases (Task Map)
- configuration files, copying, How to Copy Files to Portable Media in Trusted Extensions
- Configure Device Attributes authorization, How to Assign Device Authorizations
- Configure Selection Confirmation action, Trusted CDE Actions
- Configure Zone action
- Trusted CDE Actions
- Specify Zone Names and Zone Labels by Using a CDE Action
- Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
- Configuring an LDAP Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
- Configuring Labeled Printing (Task Map), Configuring Labeled Printing (Task Map)
- Configuring Routes and Checking Network Information in Trusted Extensions (Task Map), Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
- Configuring the Solaris Management Console for LDAP (Task Map), Configuring the Solaris Management Console for LDAP (Task Map)
- configuring Trusted Extensions
- checklist for install team, Checklist for Configuring Trusted Extensions
- headless access, Configuring a Headless System With Trusted Extensions (Tasks)
- initial procedures, Configuring Trusted Extensions (Tasks)
- labeled zones
- Creating Labeled Zones
- Using CDE Actions to Install Zones in Trusted Extensions
- task maps, Configuration Roadmap for Trusted Extensions
- Configuring Trusted Network Databases (Task Map), Configuring Trusted Network Databases (Task Map)
- configuring
- access to headless Trusted Extensions, Configuring a Headless System With Trusted Extensions (Tasks)
- as a role or as superuser?, Make System and Security Decisions Before Enabling Trusted Extensions
- audio device to play music, How to Configure an Audio Player Program for Use in Trusted CDE
- auditing, Audit Tasks of the Security Administrator
- authorizations for devices, How to Create New Device Authorizations
- devices, How to Configure a Device in Trusted Extensions
- labeled printing, Configuring Labeled Printing (Task Map)
- LDAP for Trusted Extensions, Configuring the Sun Java System Directory Server on a Trusted Extensions System
- LDAP proxy server for Trusted Extensions clients, Creating a Trusted Extensions Proxy for an Existing Sun Java System Directory Server
- network interfaces, Configure the Network Interfaces in Trusted Extensions
- routes with security attributes, How to Configure Routes With Security Attributes
- serial line for login, How to Configure a Serial Line for Logins
- Solaris Management Console for LDAP, Configuring the Solaris Management Console for LDAP (Task Map)
- startup files for users, How to Configure Startup Files for Users in Trusted Extensions
- Trusted Extensions labeled zones
- Creating Labeled Zones
- Using CDE Actions to Install Zones in Trusted Extensions
- Trusted Extensions software, Configuring Trusted Extensions (Tasks)
- trusted network, Managing Networks in Trusted Extensions (Tasks)
- console window, troubleshooting not opening, Cannot Open the Console Window in a Labeled Zone
- controlling, See restricting
- .copy_files file
- description, .copy_files and .link_files Files
- setting up for users
- How to Configure Startup Files for Users in Trusted Extensions
- How to Configure Startup Files for Users in Trusted Extensions
- startup file, Command Line Tools in Trusted Extensions
- Copy Zone action
- Trusted CDE Actions
- Use the Copy Zone Method in Trusted Extensions
- Create a new zone menu item
- Name and Label the Zone
- Copy or Clone a Zone in Trusted Extensions
- Create LDAP Client action
- Make the Global Zone an LDAP Client in Trusted Extensions
- Trusted CDE Actions
- Creating Labeled Zones, Creating Labeled Zones
- Creating the Labeled Zones by Using CDE Actions (Task Map), Creating Labeled Zones by Using CDE Actions (Task Map)
- creating
- accounts during or after configuration, Make System and Security Decisions Before Enabling Trusted Extensions
- accounts, Creating Roles and Users in Trusted Extensions
- authorizations for devices, How to Create New Device Authorizations
- home directories
- Creating Home Directories in Trusted Extensions
- Home Directory Creation in Trusted Extensions
- home directory server, Create the Home Directory Server in Trusted Extensions
- labeled zones, Creating Labeled Zones
- LDAP client, Make the Global Zone an LDAP Client in Trusted Extensions
- LDAP proxy server for Trusted Extensions clients, Create an LDAP Proxy Server
- LDAP toolbox, Edit the LDAP Toolbox in the Solaris Management Console
- local role with roleadd, Create the Security Administrator Role in Trusted Extensions
- local user with useradd, Create Users Who Can Assume Roles in Trusted Extensions
- roles, Creating Roles and Users in Trusted Extensions
- users who can assume roles, Create Users Who Can Assume Roles in Trusted Extensions
- zones
- Creating Labeled Zones
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- credentials, registering LDAP with the Solaris Management Console, Register LDAP Credentials With the Solaris Management Console
- Customizing Device Authorizations in Trusted Extensions (Task Map), Customizing Device Authorizations in Trusted Extensions (Task Map)
- Customizing User Environment for Security (Task Map), Customizing the User Environment for Security (Task Map)
- customizing
- device authorizations, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- label_encodings file, Label Encodings File
- unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
- user accounts, Customizing the User Environment for Security (Task Map)
- cut and paste, and labels, Rules When Changing the Level of Security for Data
- cutting and pasting, configuring rules for label changes, sel_config File
|
|
|
|