On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com
How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy
Table of Contents
Document Information
Preface
Who Should Use This Book
Trusted Extensions and the Solaris Operating System
How the Solaris Trusted Extensions Books Are Organized
Related Books From Sun Microsystems
Books From Elsewhere
Related Third-Party Web Site References
Documentation, Support, and Training
Typographic Conventions
Shell Prompts in Command Examples
Initial Configuration of Trusted Extensions
Security Planning for Trusted Extensions
Planning for Security in Trusted Extensions
Results of Enabling Trusted Extensions From an Administrator's Perspective
Configuration Roadmap for Trusted Extensions
Task Map: Preparing a Solaris System for Trusted Extensions
Task Map: Preparing For and Enabling Trusted Extensions
Task Map: Configuring Trusted Extensions
Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
Initial Setup Team Responsibilities
Installing or Upgrading the Solaris OS for Trusted Extensions
Collecting Information and Making Decisions Before Enabling Trusted Extensions
Enabling the Solaris Trusted Extensions Service
Configuring Trusted Extensions (Tasks)
Setting Up the Global Zone in Trusted Extensions
Creating Labeled Zones
Adding Network Interfaces and Routing to Labeled Zones
Creating Roles and Users in Trusted Extensions
Creating Home Directories in Trusted Extensions
Adding Users and Hosts to an Existing Trusted Network
Troubleshooting Your Trusted Extensions Configuration
Additional Trusted Extensions Configuration Tasks
Configuring LDAP for Trusted Extensions (Tasks)
Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
Configuring the Sun Java System Directory Server on a Trusted Extensions System
Creating a Trusted Extensions Proxy for an Existing Sun Java System Directory Server
Configuring the Solaris Management Console for LDAP (Task Map)
Configuring a Headless System With Trusted Extensions (Tasks)
Headless System Configuration in Trusted Extensions (Task Map)
Administration of Trusted Extensions
Trusted Extensions Administration Concepts
Trusted Extensions Software and the Solaris OS
Basic Concepts of Trusted Extensions
Trusted Extensions Administration Tools
Administration Tools for Trusted Extensions
txzonemgr Script
Trusted CDE Actions
Device Allocation Manager
Solaris Management Console Tools
Label Builder in Trusted Extensions
Command Line Tools in Trusted Extensions
Remote Administration in Trusted Extensions
Getting Started as a Trusted Extensions Administrator (Tasks)
What's New in Trusted Extensions
Security Requirements When Administering Trusted Extensions
Getting Started as a Trusted Extensions Administrator (Task Map)
Security Requirements on a Trusted Extensions System (Overview)
Configurable Solaris Security Features
Security Requirements Enforcement
Rules When Changing the Level of Security for Data
Customization of Solaris Trusted Extensions (CDE)
Administering Security Requirements in Trusted Extensions (Tasks)
Common Tasks in Trusted Extensions (Task Map)
Users, Rights, and Roles in Trusted Extensions (Overview)
User Security Features in Trusted Extensions
Administrator Responsibilities for Users
Decisions to Make Before Creating Users in Trusted Extensions
Default User Security Attributes in Trusted Extensions
Configurable User Attributes in Trusted Extensions
Security Attributes That Must Be Assigned to Users
Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
Customizing the User Environment for Security (Task Map)
Managing Users and Rights With the Solaris Management Console (Task Map)
Handling Other Tasks in the Solaris Management Console (Task Map)
Remote Administration in Trusted Extensions (Tasks)
Secure Remote Administration in Trusted Extensions
Methods for Administering Remote Systems in Trusted Extensions
Remote Login by a Role in Trusted Extensions
Administering Trusted Extensions Remotely (Task Map)
Trusted Extensions and LDAP (Overview)
Using a Naming Service in Trusted Extensions
Using the LDAP Naming Service in Trusted Extensions
Managing Zones in Trusted Extensions (Tasks)
Zones in Trusted Extensions
Global Zone Processes and Labeled Zones
Zone Administration Utilities in Trusted Extensions
Managing Zones (Task Map)
Managing and Mounting Files in Trusted Extensions (Tasks)
Sharing and Mounting Files in Trusted Extensions
NFS Mounts in Trusted Extensions
Sharing Files From a Labeled Zone
Access to NFS Mounted Directories in Trusted Extensions
Trusted Extensions Software and NFS Protocol Versions
Backing Up, Sharing, and Mounting Labeled Files (Task Map)
Trusted Networking (Overview)
The Trusted Network
Network Security Attributes in Trusted Extensions
Trusted Network Fallback Mechanism
Overview of Routing in Trusted Extensions
Administration of Routing in Trusted Extensions
Managing Networks in Trusted Extensions (Tasks)
Managing the Trusted Network (Task Map)
Configuring Trusted Network Databases (Task Map)
Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
Troubleshooting the Trusted Network (Task Map)
Multilevel Mail in Trusted Extensions (Overview)
Multilevel Mail Service
Trusted Extensions Mail Features
Managing Labeled Printing (Tasks)
Labels, Printers, and Printing
Managing Printing in Trusted Extensions (Task Map)
Configuring Labeled Printing (Task Map)
Reducing Printing Restrictions in Trusted Extensions (Task Map)
Devices in Trusted Extensions (Overview)
Device Protection With Trusted Extensions Software
Device Allocation Manager GUI
Enforcement of Device Security in Trusted Extensions
Devices in Trusted Extensions (Reference)
Managing Devices for Trusted Extensions (Tasks)
Handling Devices in Trusted Extensions (Task Map)
Using Devices in Trusted Extensions (Task Map)
Managing Devices in Trusted Extensions (Task Map)
Customizing Device Authorizations in Trusted Extensions (Task Map)
Trusted Extensions Auditing (Overview)
Trusted Extensions and Auditing
Audit Management by Role in Trusted Extensions
Trusted Extensions Audit Reference
Software Management in Trusted Extensions (Tasks)
Adding Software to Trusted Extensions
Trusted Processes in the Window System
Managing Software in Trusted Extensions (Tasks)
Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
Index
Index
Index
Index
Index
Index
Index
Index
Index
Published under the terms fo the Public Documentation License Version 1.01.
Design by Interspire
x