Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

Solaris Trusted Extensions Administrator's Procedures
Previous Next

D

DAC, See discretionary access control (DAC)
databases
devices, Trusted CDE Actions
in LDAP, Using a Naming Service in Trusted Extensions
trusted network, Network Configuration Databases in Trusted Extensions
datasets, See ZFS
deallocate command, Command Line Tools in Trusted Extensions
deallocating, forcing, How to Revoke or Reclaim a Device in Trusted Extensions
debugging, See troubleshooting
deciding
to configure as a role or as superuser, Make System and Security Decisions Before Enabling Trusted Extensions
to use a Sun-supplied encodings file, Make System and Security Decisions Before Enabling Trusted Extensions
decisions to make
based on site security policy, Site Security Policy and Trusted Extensions
before enabling Trusted Extensions, Make System and Security Decisions Before Enabling Trusted Extensions
default routes, specifying for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
deleting, labeled zones, How to Remove Trusted Extensions From the System
desktops
accessing multilevel remotely, How to Use Xvnc to Remotely Access a Trusted Extensions System
logging in to a failsafe session, How to Log In to a Failsafe Session in Trusted Extensions
workspace color changes, How to Enter the Global Zone in Trusted Extensions
/dev/kmem kernel image file, security violation, Evaluating Software for Security
developer responsibilities, Developer Responsibilities When Creating Trusted Programs
Device Allocation Manager
administrative tool, Administration Tools for Trusted Extensions
description, Device Allocation Manager GUI
use by administrators, How to Configure a Device in Trusted Extensions
device allocation
authorizing, How to Assign Device Authorizations
overview, Device Protection With Trusted Extensions Software
preventing File Manager display, How to Prevent the File Manager From Displaying After Device Allocation
profiles that include allocation authorizations, How to Assign Device Authorizations
device-clean scripts
adding to devices, How to Add a Device_Clean Script in Trusted Extensions
requirements, Device-Clean Scripts
device databases, action for editing, Trusted CDE Actions
devices
access policy, Device Access Policies
accessing, Device Allocation Manager GUI
adding customized authorizations, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
adding device_clean script, How to Add a Device_Clean Script in Trusted Extensions
administering with Device Allocation Manager, How to Configure a Device in Trusted Extensions
administering, Managing Devices for Trusted Extensions (Tasks)
allocating, Device Protection With Trusted Extensions Software
automatically starting an audio player, How to Configure an Audio Player Program for Use in Trusted CDE
configuring devices, How to Configure a Device in Trusted Extensions
configuring serial line, How to Configure a Serial Line for Logins
creating new authorizations, How to Create New Device Authorizations
in Trusted Extensions, Devices in Trusted Extensions (Overview)
policy defaults, Device Access Policies
preventing remote allocation of audio, How to Protect Nonallocatable Devices in Trusted Extensions
protecting nonallocatable, How to Protect Nonallocatable Devices in Trusted Extensions
protecting, Device Allocation Manager
reclaiming, How to Revoke or Reclaim a Device in Trusted Extensions
setting label range for nonallocatable, Effects of Label Range on a Device
setting policy, Device Access Policies
setting up audio, How to Configure an Audio Player Program for Use in Trusted CDE
troubleshooting, How to Revoke or Reclaim a Device in Trusted Extensions
using, Using Devices in Trusted Extensions (Task Map)
dfstab file
action for editing, Trusted CDE Actions
for public zone, Access to NFS Mounted Directories in Trusted Extensions
differences
administrative interfaces in Trusted Extensions, Administrative Interfaces in Trusted Extensions
between Trusted Extensions and Solaris auditing, Trusted Extensions and Auditing
between Trusted Extensions and Solaris OS, Differences Between Trusted Extensions and the Solaris OS
defaults in Trusted Extensions, Tighter Security Defaults in Trusted Extensions
extending Solaris interfaces, Solaris Interfaces Extended by Trusted Extensions
limited options in Trusted Extensions, Limited Options in Trusted Extensions
directories
accessing lower-level, Zones in Trusted Extensions
authorizing a user or role to change label of, How to Enable a User to Change the Security Level of Data
for naming service setup, Populate the Sun Java System Directory Server
mounting, How to Share Directories From a Labeled Zone
sharing, How to Share Directories From a Labeled Zone
disabling, Trusted Extensions, How to Remove Trusted Extensions From the System
discretionary access control (DAC), Trusted Extensions and Access Control
diskettes, accessing, Device Protection With Trusted Extensions Software
displaying
labels of file systems in labeled zone, How to Display the Labels of Mounted Files
status of every zone, How to Display Ready or Running Zones
DOI, remote host templates, Network Security Attributes in Trusted Extensions
domain of interpretation (DOI), entry in /etc/system file, Configure the Domain of Interpretation
dominance of labels, Dominance Relationships Between Labels
Downgrade DragNDrop or CutPaste Info authorization, How to Create a Rights Profile for Convenient Authorizations
Downgrade File Label authorization, How to Create a Rights Profile for Convenient Authorizations
downgrading labels, configuring rules for selection confirmer, sel_config File
dpadm service, Install the Sun Java System Directory Server
DragNDrop or CutPaste without viewing contents authorization, How to Create a Rights Profile for Convenient Authorizations
dsadm service, Install the Sun Java System Directory Server
dtappsession command, Command Line Tools in Trusted Extensions
dtsession command, running updatehome, .copy_files and .link_files Files
dtterm terminal, forcing the sourcing of .profile, How to Configure Startup Files for Users in Trusted Extensions
dtwm command, Trusted Processes in the Window System

E

Edit Encodings action, Trusted CDE Actions
editing
system files, How to Change Security Defaults in System Files
using trusted editor, How to Edit Administrative Files in Trusted Extensions
enabling
DOI different from 1
Configure the Domain of Interpretation
What's New in Trusted Extensions
dpadm service, Install the Sun Java System Directory Server
dsadm service, Install the Sun Java System Directory Server
IPv6 network, Enable IPv6 Networking in Trusted Extensions
keyboard shutdown, How to Change Security Defaults in System Files
labeld service, Enable Solaris Trusted Extensions
LDAP administration from a client, Enable the Solaris Management Console to Accept Network Communications
login to labeled zone, Enable Users to Log In to a Labeled Zone
Trusted Extensions on a Solaris system, Enable Solaris Trusted Extensions
encodings file, See label_encodings file
error messages
troubleshooting
Enable Solaris Trusted Extensions
Labeled Zone Is Unable to Access the X Server
/etc/default/kbd file, how to edit, How to Change Security Defaults in System Files
/etc/default/login file, how to edit, How to Change Security Defaults in System Files
/etc/default/passwd file, how to edit, How to Change Security Defaults in System Files
/etc/default/print file, How to Enable Users to Print PostScript Files in Trusted Extensions
/etc/dfs/dfstab file for public zone, Access to NFS Mounted Directories in Trusted Extensions
/etc/dfs/dfstab file, Trusted CDE Actions
/etc/dt/config/sel_config file
sel_config File
sel_config File
/etc/hosts file
How to Add Hosts to the System's Known Network
How to Assign a Security Template to a Host or a Group of Hosts
/etc/motd file, action for editing, Trusted CDE Actions
/etc/nsswitch.conf file, Trusted CDE Actions
/etc/resolv.conf file, Trusted CDE Actions
/etc/rmmount.conf file
How to Configure an Audio Player Program for Use in Trusted CDE
How to Prevent the File Manager From Displaying After Device Allocation
/etc/security/audit_class file, Trusted CDE Actions
/etc/security/audit_control file, Trusted CDE Actions
/etc/security/audit_event file, Trusted CDE Actions
/etc/security/audit_startup file, Trusted CDE Actions
/etc/security/policy.conf file
policy.conf File Defaults in Trusted Extensions
How to Modify policy.conf Defaults
enabling PostScript printing, How to Enable Users to Print PostScript Files in Trusted Extensions
how to edit, How to Change Security Defaults in System Files
/etc/security/tsol/label_encodings file, Label Encodings File
/etc/system file
modifying for DOI different from 1, Configure the Domain of Interpretation
modifying for IPv6 network, Enable IPv6 Networking in Trusted Extensions
evaluating programs for security, Evaluating Software for Security
exporting, See sharing
Previous Next

 
 
  Published under the terms fo the Public Documentation License Version 1.01. Design by Interspire