| Document Information Preface Part I Initial Configuration of Trusted Extensions 1.  Security Planning for Trusted Extensions 2.  Configuration Roadmap for Trusted Extensions 3.  Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks) 4.  Configuring Trusted Extensions (Tasks) 5.  Configuring LDAP for Trusted Extensions (Tasks) 6.  Configuring a Headless System With Trusted Extensions (Tasks) Part II Administration of Trusted Extensions 7.  Trusted Extensions Administration Concepts 8.  Trusted Extensions Administration Tools 9.  Getting Started as a Trusted Extensions Administrator (Tasks) 10.  Security Requirements on a Trusted Extensions System (Overview) 11.  Administering Security Requirements in Trusted Extensions (Tasks) 12.  Users, Rights, and Roles in Trusted Extensions (Overview) 13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks) 14.  Remote Administration in Trusted Extensions (Tasks) 15.  Trusted Extensions and LDAP (Overview) 16.  Managing Zones in Trusted Extensions (Tasks) 17.  Managing and Mounting Files in Trusted Extensions (Tasks) 18.  Trusted Networking (Overview) 19.  Managing Networks in Trusted Extensions (Tasks) 20.  Multilevel Mail in Trusted Extensions (Overview) 21.  Managing Labeled Printing (Tasks) 22.  Devices in Trusted Extensions (Overview) 23.  Managing Devices for Trusted Extensions (Tasks) 24.  Trusted Extensions Auditing (Overview) 25.  Software Management in Trusted Extensions (Tasks) A.  Site Security Policy Creating and Managing a Security Policy Site Security Policy and Trusted Extensions Computer Security Recommendations Physical Security Recommendations Personnel Security Recommendations Common Security Violations Additional Security References B.  Using CDE Actions to Install Zones in Trusted Extensions Associating Network Interfaces With Zones by Using CDE Actions (Task Map) Preparing to Create Zones by Using CDE Actions (Task Map) Creating Labeled Zones by Using CDE Actions (Task Map) C.  Configuration Checklist for Trusted Extensions Checklist for Configuring Trusted Extensions D.  Quick Reference to Trusted Extensions Administration Administrative Interfaces in Trusted Extensions Solaris Interfaces Extended by Trusted Extensions Tighter Security Defaults in Trusted Extensions Limited Options in Trusted Extensions E.  List of Trusted Extensions Man Pages Trusted Extensions Man Pages in Alphabetical Order Solaris Man Pages That Are Modified by Trusted Extensions Glossary Index |       	 
             U
unlabeled printing, configuring, Reducing Printing Restrictions in Trusted Extensions (Task Map) 
updatehome command
Command Line Tools in Trusted Extensions.copy_files and .link_files Files 
Upgrade DragNDrop or CutPaste Info authorization, How to Create a Rights Profile for Convenient Authorizations 
Upgrade File Label authorization, How to Create a Rights Profile for Convenient Authorizations 
upgrading labels, configuring rules for selection confirmer, sel_config File 
User Accounts tool, Trusted Extensions Tools in the Solaris Management Console 
useradd command, Create Users Who Can Assume Roles in Trusted Extensions 
users
accessing devices
Device Protection With Trusted Extensions SoftwareDevice Protection With Trusted Extensions Softwareaccessing printers, Labels, Printers, and Printingadding from NIS server, Add an NIS User to the LDAP Serveradding local user with useradd, Create Users Who Can Assume Roles in Trusted Extensionsassigning authorizations to, Security Attribute Assignment to Users in Trusted Extensionsassigning labels, Security Attribute Assignment to Users in Trusted Extensionsassigning passwords, Security Attribute Assignment to Users in Trusted Extensionsassigning rights, Security Attribute Assignment to Users in Trusted Extensionsassigning roles to, Security Attribute Assignment to Users in Trusted Extensionsauthorizations for, How to Create a Rights Profile for Convenient AuthorizationsChange Password menu item, Trusted Extensions Security Featureschanging default privileges, Security Attribute Assignment to Users in Trusted Extensionscreating initial users, Create Users Who Can Assume Roles in Trusted Extensionscreating, Administrator Responsibilities for Userscustomizing environment, Customizing the User Environment for Security (Task Map)deletion precautions, User Deletion Practiceslabels of processes, Label Rangeslengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Informationlogging in remotely to the global zone, How to Enable Specific Users to Log In Remotely to the Global Zone in Trusted Extensionslogging in to a failsafe session, How to Log In to a Failsafe Session in Trusted Extensionsmodifying security defaults for all users, How to Modify policy.conf Defaultsmodifying security defaults, How to Modify Default User Label Attributesplanning for, Decisions to Make Before Creating Users in Trusted Extensionspreventing account locking, How to Prevent Account Locking for Userspreventing from seeing others' processes, How to Modify policy.conf Defaultsprinting, Labels, Printers, and Printingremoving some privileges, How to Restrict a User's Set of Privilegesrequiring two roles to create user, Create Rights Profiles That Enforce Separation of Dutyrequiring two roles to create users, Create a Restricted System Administrator Rolerestoring control of desktop focus, How to Regain Control of the Desktop's Current Focussecurity precautions, Group Administrationsecurity training
Security Requirements EnforcementGroup AdministrationEnforcement of Device Security in Trusted Extensionssession range, Label Rangessetting up skeleton directories, How to Configure Startup Files for Users in Trusted Extensionsstartup files, How to Configure Startup Files for Users in Trusted Extensionsusing .copy_files file, How to Configure Startup Files for Users in Trusted Extensionsusing .link_files file, How to Configure Startup Files for Users in Trusted Extensionsusing devices, Using Devices in Trusted Extensions (Task Map) 
Using Devices in Trusted Extensions (Task Map), Using Devices in Trusted Extensions (Task Map) 
/usr/dt/bin/trusted_edit trusted editor, How to Edit Administrative Files in Trusted Extensions 
/usr/dt/config/sel_config file
sel_config Filesel_config File 
/usr/lib/lp/postscript/tsol_separator.ps file, labeling printer output, Labeled Printer Output 
/usr/local/scripts/getmounts script, How to Display the Labels of Mounted Files 
/usr/local/scripts/getzonelabels script, How to Display Ready or Running Zones 
/usr/sbin/txzonemgr script
Administration Tools for Trusted ExtensionsZone Administration Utilities in Trusted Extensions 
/usr/sbin/txzonemgr script
Run the txzonemgr ScriptLabeled Zone Is Unable to Access the X ServerCreating Labeled Zones by Using CDE Actions (Task Map) 
utadm command, default Sun Ray server configuration, How to Limit the Hosts That Can Be Contacted on the Trusted Network VWX
X audit classes, Trusted Extensions Audit Classes 
xatom audit token, xatom Token 
xc audit class, Trusted Extensions Audit Classes 
xclient audit token, xclient Token 
xcolormap audit token, xcolormap Token 
xcursor audit token, xcursor Token 
xfont audit token, xfont Token 
xgc audit token, xgc Token 
xp audit class, Trusted Extensions Audit Classes 
xpixmap audit token, xpixmap Token 
xproperty audit token, xproperty Token 
xs audit class, Trusted Extensions Audit Classes 
xselect audit token, xselect Token 
Xtsolusersession script, Trusted Processes in the Window System 
Xvnc systems running Trusted Extensions
remote access to
Methods for Administering Remote Systems in Trusted ExtensionsHow to Use Xvnc to Remotely Access a Trusted Extensions System 
xwindow audit token, xwindow Token 
xx audit class, Trusted Extensions Audit Classes Z
zenity script, Run the txzonemgr Script 
ZFS pools, creating for cloning zones, Create ZFS Pool for Cloning Zones 
ZFS
adding dataset to labeled zone, How to Share a ZFS Dataset From a Labeled Zonemounting dataset read-write on labeled zone, How to Share a ZFS Dataset From a Labeled Zoneunsupported but fast zone creation method, Zone Creation in Trusted Extensionsviewing mounted dataset read-only from higher-level zone, How to Share a ZFS Dataset From a Labeled Zone 
Zone Console, output, Boot the Labeled Zone 
/zone/public/etc/dfs/dfstab file, Access to NFS Mounted Directories in Trusted Extensions 
Zone Terminal Console action, Trusted CDE Actions
output
Customize the Labeled ZoneInstall, Initialize, and Boot a Labeled Zone by Using CDE Actionsusing, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions 
zones
action for cloning, Trusted CDE Actionsaction for configuring, Trusted CDE Actionsaction for copying, Trusted CDE Actionsaction for initializing, Trusted CDE Actionsaction for installing, Trusted CDE Actionsaction for restarting, Trusted CDE Actionsaction for sharing logical interface, Trusted CDE Actionsaction for sharing physical interface, Trusted CDE Actionsaction for shutting down, Trusted CDE Actionsaction for starting, Trusted CDE Actionsaction for viewing from console, Trusted CDE Actionsadding network interface, Add a Network Interface to Route an Existing Labeled Zoneadding nscd daemon to each labeled zone, Configure a Name Service Cache in Each Labeled Zoneadministering from Trusted JDS, Zone Administration Utilities in Trusted Extensionsadministering, Managing Zones (Task Map)associating zone names with labels
Name and Label the ZoneSpecify Zone Names and Zone Labels by Using a CDE Actionbooting
Boot the Labeled ZoneInstall, Initialize, and Boot a Labeled Zone by Using CDE Actionscreating MLP for NFSv3, How to Configure a Multilevel Port for NFSv3 Over udpcreating MLP, How to Create a Multilevel Port for a Zonecreating ZFS pool for cloning, Create ZFS Pool for Cloning Zonescreating, Install, Initialize, and Boot a Labeled Zone by Using CDE Actionscustomizing, Customize the Labeled Zonedeciding creation method, Planning for Zones in Trusted Extensionsdeleting, How to Remove Trusted Extensions From the Systemdisplaying labels of file systems, How to Display the Labels of Mounted Filesdisplaying status, How to Display Ready or Running Zonesenabling login to, Enable Users to Log In to a Labeled Zoneglobal, Zones in Trusted Extensionshalting, Customize the Labeled Zonein Trusted Extensions, Managing Zones in Trusted Extensions (Tasks)initializing for LDAP, Install, Initialize, and Boot a Labeled Zone by Using CDE Actionsinitializing, Install, Initialize, and Boot a Labeled Zone by Using CDE Actionsinstalling
Install the Labeled ZoneInstall, Initialize, and Boot a Labeled Zone by Using CDE Actionsisolating with default routes, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zonemanaging, Managing Zones in Trusted Extensions (Tasks)net_mac_aware privilege, How to NFS Mount Files in a Labeled Zoneremoving nscd daemon from labeled zones, Configure a Name Service Cache in Each Labeled Zoneshowing zone activity
Boot the Labeled ZoneCustomize the Labeled ZoneInstall, Initialize, and Boot a Labeled Zone by Using CDE Actionsshutting down, Customize a Booted Zone in Trusted Extensionsspecifying a shared IP address, Specify Two IP Addresses for the System by Using a CDE Actionspecifying default routes, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zonespecifying labels
Name and Label the ZoneSpecify Zone Names and Zone Labels by Using a CDE Actionspecifying names
Name and Label the ZoneSpecify Zone Names and Zone Labels by Using a CDE Actionspecifying one IP address for all zones
Configure the Network Interfaces in Trusted ExtensionsSpecify One IP Address for the System by Using a CDE Actionstarting, Install, Initialize, and Boot a Labeled Zone by Using CDE Actionstool for labeling, Trusted Network Zones Tooltroubleshooting access, Labeled Zone Is Unable to Access the X Servertroubleshooting installation, Install the Labeled Zonetxzonemgr script, Labeled Zone Is Unable to Access the X Server/usr/sbin/txzonemgr script
Run the txzonemgr ScriptCreating Labeled Zones by Using CDE Actions (Task Map)verifying status, Verify the Status of the Zone |