Additional Trusted Extensions Configuration Tasks
The following two tasks enable you to transfer exact copies of configuration files
to every Trusted Extensions system at your site. The final task enables you
to remove Trusted Extensions customizations from a Solaris system.
How to Copy Files to Portable Media in Trusted Extensions
When copying to portable media, label the media with the sensitivity label of
the information.
Note - During Trusted Extensions configuration, superuser or an equivalent role copies administrative files to
and from portable media. Label the media with Trusted Path.
Before You Begin
To copy administrative files, you must be superuser or in a role
in the global zone.
- Allocate the appropriate device.
Use the Device Allocation Manager, and insert clean media. For details, see How to Allocate a Device in Trusted Extensions in Solaris Trusted Extensions User’s Guide.
In Solaris Trusted Extensions (CDE), a File Manager displays the contents of the portable media.
In Solaris Trusted Extensions (GNOME), a File Browser displays the contents.
In In this procedure, File Manager is used to refer to this
GUI.
- Open a second File Manager.
- Navigate to the folder that contains the files to be copied
For example, you might have copied files to an /export/clientfiles folder.
- For each file, do the following:
- Highlight the icon for the file.
- Drag the file to the File Manager for the portable media.
- Deallocate the device.
For details, see How to Deallocate a Device in Trusted Extensions in Solaris Trusted Extensions User’s Guide.
- On the File Manager for the portable media, choose Eject from the File
menu.
Note - Remember to physically affix a label to the media with the sensitivity label
of the copied files.
Example 4-9 Keeping Configuration Files Identical on All Systems
The system administrator wants to ensure that every machine is configured with the
same settings. So, on the first machine that is configured, she creates a
directory that cannot be deleted between reboots. In that directory, the administrator places
the files that should be identical or very similar on all systems.
For example, she copies the Trusted Extensions toolbox that the Solaris Management
Console uses for the LDAP scope, /var/sadm/smc/toolboxes/tsol_ldap/tsol_ldap.tbx. She has customized remote host templates in
the tnrhtp file, has a list of DNS servers, and audit configuration files.
She also modified the policy.conf file for her site. So, she copies the files
to the permanent directory.
# mkdir /export/commonfiles
# cp /etc/security/policy.conf \ /etc/security/audit_control \ /etc/security/audit_startup \ /etc/security/tsol/tnrhtp \ /etc/resolv.conf \ /etc/nsswitch.conf \ /export/commonfiles
She uses the Device Allocation Manager to allocate a diskette in the global
zone, and transfers the files to the diskette. On a separate diskette, labeled
ADMIN_HIGH, she puts the label_encodings file for the site.
When she copies the files onto a system, she modifies the dir:
entries in the /etc/security/audit_control file for that system.
How to Copy Files From Portable Media in Trusted Extensions
It is safe practice to rename the original Trusted Extensions file before replacing
the file. When configuring a system, the root role renames and copies administrative
files.
Before You Begin
To copy administrative files, you must be superuser or in a role in
the global zone.
- Allocate the appropriate device.
For details, see How to Allocate a Device in Trusted Extensions in Solaris Trusted Extensions User’s Guide.
In Solaris Trusted Extensions (CDE), a File Manager displays the contents of the portable media.
In Solaris Trusted Extensions (GNOME), a File Browser displays the contents.
In this procedure, File Manager is used to refer to this GUI.
- Insert the media that contains the administrative files.
- If the system has a file of the same name, copy the
original file to a new name.
For example, add .orig to the end of the original file:
# cp /etc/security/tsol/tnrhtp /etc/security/tsol/tnrhtp.orig
- Open a File Manager.
- Navigate to the desired destination directory, such as /etc/security/tsol
- For each file that you want to copy, do the following:
- In the File Manager for the mounted media, highlight the icon for the
file.
- Then, drag the file to the destination directory in the second File Manager.
- Deallocate the device.
For details, see How to Deallocate a Device in Trusted Extensions in Solaris Trusted Extensions User’s Guide.
- When prompted, eject and remove the media.
Example 4-10 Loading Audit Configuration Files in Trusted Extensions
In this example, roles are not yet configured on the system. The root
user needs to copy configuration files to portable media. The contents of the
media will then be copied to other systems. These files are to
be copied to each system that is configured with Trusted Extensions software.
The root user allocates the floppy_0 device in the Device Allocation Manager and
responds yes to the mount query. Then, the root user inserts the diskette
with the configuration files and copies them to the disk. The diskette is
labeled Trusted Path.
To read from the media, the root user allocates the device on the
receiving host, then downloads the contents.
If the configuration files are on a tape, the root user allocates
the mag_0 device. If the configuration files are on a CD-ROM, the root
user allocates the cdrom_0 device.
How to Remove Trusted Extensions From the System
To remove Trusted Extensions from your Solaris system, you perform specific steps to
remove Trusted Extensions customizations to the Solaris system.
- As in the Solaris OS, archive any data in the labeled zones
that you want to keep.
- Remove the labeled zones from the system.
For details, see How to Remove a Non-Global Zone in System Administration Guide: Virtualization Using the Solaris Operating System.
- Disable the Trusted Extensions service.
# svcadm disable labeld
- Run the bsmunconv command.
For the effect of this command, see the bsmunconv(1M) man page.
- (Optional) Reboot the system.
- Configure the system.
Various services might need to be configured for your Solaris system. Candidates include
auditing, basic networking, naming services, and file system mounts.