| Document Information Preface Part I Initial Configuration of Trusted Extensions 1.  Security Planning for Trusted Extensions 2.  Configuration Roadmap for Trusted Extensions 3.  Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks) 4.  Configuring Trusted Extensions (Tasks) 5.  Configuring LDAP for Trusted Extensions (Tasks) 6.  Configuring a Headless System With Trusted Extensions (Tasks) Part II Administration of Trusted Extensions 7.  Trusted Extensions Administration Concepts 8.  Trusted Extensions Administration Tools 9.  Getting Started as a Trusted Extensions Administrator (Tasks) 10.  Security Requirements on a Trusted Extensions System (Overview) 11.  Administering Security Requirements in Trusted Extensions (Tasks) 12.  Users, Rights, and Roles in Trusted Extensions (Overview) 13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks) 14.  Remote Administration in Trusted Extensions (Tasks) 15.  Trusted Extensions and LDAP (Overview) 16.  Managing Zones in Trusted Extensions (Tasks) 17.  Managing and Mounting Files in Trusted Extensions (Tasks) 18.  Trusted Networking (Overview) 19.  Managing Networks in Trusted Extensions (Tasks) 20.  Multilevel Mail in Trusted Extensions (Overview) 21.  Managing Labeled Printing (Tasks) 22.  Devices in Trusted Extensions (Overview) 23.  Managing Devices for Trusted Extensions (Tasks) 24.  Trusted Extensions Auditing (Overview) 25.  Software Management in Trusted Extensions (Tasks) A.  Site Security Policy Creating and Managing a Security Policy Site Security Policy and Trusted Extensions Computer Security Recommendations Physical Security Recommendations Personnel Security Recommendations Common Security Violations Additional Security References B.  Using CDE Actions to Install Zones in Trusted Extensions Associating Network Interfaces With Zones by Using CDE Actions (Task Map) Preparing to Create Zones by Using CDE Actions (Task Map) Creating Labeled Zones by Using CDE Actions (Task Map) C.  Configuration Checklist for Trusted Extensions Checklist for Configuring Trusted Extensions D.  Quick Reference to Trusted Extensions Administration Administrative Interfaces in Trusted Extensions Solaris Interfaces Extended by Trusted Extensions Tighter Security Defaults in Trusted Extensions Limited Options in Trusted Extensions E.  List of Trusted Extensions Man Pages Trusted Extensions Man Pages in Alphabetical Order Solaris Man Pages That Are Modified by Trusted Extensions Glossary |       	 
             IndexA
access policy
devices, Device Access PoliciesDiscretionary Access Control (DAC)
Trusted Extensions Software and the Solaris OSDifferences Between Trusted Extensions and the Solaris OSMandatory Access Control (MAC), Differences Between Trusted Extensions and the Solaris OS 
access, See computer access 
accessing the X server, Labeled Zone Is Unable to Access the X Server 
accessing
Admin Editor action, How to Edit Administrative Files in Trusted Extensionsadministrative tools, Getting Started as a Trusted Extensions Administrator (Task Map)audit records by label, Audit Tasks of the System Administratordevices, Device Protection With Trusted Extensions Softwareglobal zone, How to Enter the Global Zone in Trusted Extensionshome directories, Zones in Trusted Extensionsprinters, Labels, Printers, and Printingremote multilevel desktop, How to Use Xvnc to Remotely Access a Trusted Extensions SystemSolaris Management Console, How to Administer the Local System With the Solaris Management Consoletrusted CDE actions, How to Start CDE Administrative Actions in Trusted ExtensionsZFS dataset mounted in lower-level zone from higher-level zone, How to Share a ZFS Dataset From a Labeled Zone 
account locking, preventing, How to Prevent Account Locking for Users 
accounts
See roles
creating, Creating Roles and Users in Trusted ExtensionsSee also usersplanning, Planning User Security in Trusted Extensions 
accreditation checks, Trusted Extensions Accreditation Checks 
accreditation ranges, label_encodings file, Label Encodings File 
Action failed. Reconnect to Solaris Zone?, Labeled Zone Is Unable to Access the X Server 
actions
See administrative actions
adding new Trusted CDE actions, Adding Trusted CDE ActionsSee also individual actions by nameAdmin Editor, How to Edit Administrative Files in Trusted ExtensionsDevice Allocation Manager, Device Allocation Manager GUIlist of trusted CDE, Trusted CDE ActionsName Service Switch, How to Debug the Trusted Extensions NetworkPrint Manager, How to Suppress Banner and Trailer Pages for Specific Usersrestricted by rights profiles, Trusted Processes in the Window Systemuse differences between CDE and Trusted CDE, Adding Trusted CDE Actions 
add_allocatable command, Command Line Tools in Trusted Extensions 
Add Allocatable Device action, Trusted CDE Actions 
adding
default routes for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled ZoneLDAP toolbox, Edit the LDAP Toolbox in the Solaris Management Consolelocal role with roleadd, Create the Security Administrator Role in Trusted Extensionslocal user with useradd, Create Users Who Can Assume Roles in Trusted Extensionsnetwork databases to LDAP server, Populate the Sun Java System Directory Servernscd daemon to every labeled zone, Configure a Name Service Cache in Each Labeled Zoneroles, Creating Roles and Users in Trusted Extensionsshared network interfaces, Configure the Network Interfaces in Trusted ExtensionsTrusted Extensions to a Solaris system, Enable Solaris Trusted Extensionsusers by using lpaddent, Add an NIS User to the LDAP Serverusers who can assume roles, Create Users Who Can Assume Roles in Trusted Extensionszone-specific network interface, Add a Network Interface to Route an Existing Labeled Zonezone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone 
Additional Trusted Extensions Configuration Tasks, Additional Trusted Extensions Configuration Tasks 
addresses
sharing between global and labeled zones, Specify Two IP Addresses for the System by Using a CDE Actionspecifying one IP address per system
Configure the Network Interfaces in Trusted ExtensionsSpecify One IP Address for the System by Using a CDE Action 
Admin Editor action, Trusted CDE Actions
opening, How to Edit Administrative Files in Trusted Extensions 
ADMIN_HIGH label, Dominance Relationships Between Labels 
ADMIN_LOW label
lowest label, Dominance Relationships Between Labelsprotecting administrative files, Password Protection 
Administering Trusted Extensions Remotely (Task Map), Administering Trusted Extensions Remotely (Task Map) 
administering
account locking, How to Prevent Account Locking for Usersassigning device authorizations, How to Assign Device Authorizationsaudio device to play music, How to Configure an Audio Player Program for Use in Trusted CDEauditing in Trusted Extensions, Audit Management by Role in Trusted Extensionschanging label of information, How to Enable a User to Change the Security Level of Dataconvenient authorizations for users, How to Create a Rights Profile for Convenient Authorizationsdevice allocation, How to Assign Device Authorizationsdevice authorizations, How to Create New Device Authorizationsdevices
Managing Devices for Trusted Extensions (Tasks)Managing Devices in Trusted Extensions (Task Map)file systems
filesmounting, How to NFS Mount Files in a Labeled Zoneoverview, Sharing and Mounting Files in Trusted Extensionstroubleshooting, How to Troubleshoot Mount Failures in Trusted Extensions 
from the global zone, How to Enter the Global Zone in Trusted Extensionsbacking up, How to Back Up Files in Trusted Extensionsrestoring, How to Restore Files in Trusted Extensionshiding labels from users, How to Hide Labels From a Userlabeled printing, Managing Labeled Printing (Tasks)LDAP, Trusted Extensions and LDAP (Overview)mail, Multilevel Mail in Trusted Extensions (Overview)multilevel ports, How to Compare Trusted Network Database Information With the Kernel Cachenetwork in Trusted Extensions, Managing Networks in Trusted Extensions (Tasks)network of users, Managing Users and Rights With the Solaris Management Console (Task Map)PostScript printing, How to Enable Users to Print PostScript Files in Trusted Extensionsprinting in Trusted Extensions, Managing Printing in Trusted Extensions (Task Map)printing interoperability with Trusted Solaris 8, Interoperability of Trusted Extensions With Trusted Solaris 8 Printingquick reference for administrators, Quick Reference to Trusted Extensions Administrationremote host database, How to Assign a Security Template to a Host or a Group of Hostsremote host templates, How to Construct a Remote Host Templateremotely by a role, Enable Remote Login by a Role in Trusted Extensionsremotely from command line, How to Log In Remotely From the Command Line in Trusted Extensionsremotely with dtappsession, How to Remotely Administer Trusted Extensions With dtappsessionremotely with Solaris Management Console
How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions SystemHow to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled Systemremotely, Remote Administration in Trusted Extensions (Tasks)routes with security attributes, How to Configure Routes With Security Attributesserial line for login, How to Configure a Serial Line for Loginssharing file systems, How to Share Directories From a Labeled Zonestartup files for users, How to Configure Startup Files for Users in Trusted Extensionssystem files, How to Change Security Defaults in System Filesthird-party software, Software Management in Trusted Extensions (Tasks)timeout when relabeling information, How to Lengthen the Timeout When Relabeling Informationtrusted network databases, Configuring Trusted Network Databases (Task Map)trusted networking, Managing Networks in Trusted Extensions (Tasks)unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)user privileges, How to Restrict a User's Set of Privilegesusers
Decisions to Make Before Creating Users in Trusted ExtensionsManaging Users, Rights, and Roles in Trusted Extensions (Tasks)zones from Trusted JDS, Zone Administration Utilities in Trusted Extensionszones, Managing Zones (Task Map) 
administrative actions
See also actionsaccessing, How to Edit Administrative Files in Trusted ExtensionsCheck Encodings, Check and Install Your Label Encodings FileClone Zone, Use the Clone Zone Method in Trusted ExtensionsConfigure Zone, Specify Zone Names and Zone Labels by Using a CDE ActionCopy Zone, Use the Copy Zone Method in Trusted ExtensionsCreate LDAP Client, Make the Global Zone an LDAP Client in Trusted Extensionsin CDE, Trusted CDE Actionsin Trusted_Extensions folder, How to Start CDE Administrative Actions in Trusted ExtensionsInitialize Zone for LDAP, Install, Initialize, and Boot a Labeled Zone by Using CDE ActionsInstall Zone, Install, Initialize, and Boot a Labeled Zone by Using CDE Actionslist of trusted CDE, Trusted CDE Actionsnaming services, Using the LDAP Naming Service in Trusted ExtensionsShare Logical Interface, Specify Two IP Addresses for the System by Using a CDE ActionShare Physical Interface, Specify One IP Address for the System by Using a CDE ActionShut Down Zone, Customize a Booted Zone in Trusted ExtensionsStart Zone, Install, Initialize, and Boot a Labeled Zone by Using CDE Actionsstarting remotely
How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions SystemHow to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled Systemtrusted, Trusted Processes in the Window SystemZone Terminal Console
Customize the Labeled ZoneInstall, Initialize, and Boot a Labeled Zone by Using CDE ActionsInstall, Initialize, and Boot a Labeled Zone by Using CDE Actions 
administrative labels, Dominance Relationships Between Labels 
Administrative Roles tool, Trusted Extensions Tools in the Solaris Management Console 
administrative roles, See roles 
administrative tools
accessing, Getting Started as a Trusted Extensions Administrator (Task Map)commands, Command Line Tools in Trusted Extensionsdescription, Trusted Extensions Administration ToolsDevice Allocation Manager, Device Allocation Managerin Trusted_Extensions folder, How to Start CDE Administrative Actions in Trusted Extensionslabel builder, Label Builder in Trusted ExtensionsLabeled Zone Manager, txzonemgr ScriptSolaris Management Console
Solaris Management Console ToolsHow to Administer the Local System With the Solaris Management ConsoleTrusted CDE actions, Trusted CDE Actionstxzonemgr script, txzonemgr Script 
allocate command, Command Line Tools in Trusted Extensions 
Allocate Device authorization
How to Create a Rights Profile for Convenient AuthorizationsDevice Protection With Trusted Extensions SoftwareHow to Assign Device AuthorizationsHow to Assign Device Authorizations 
allocate error state, correcting, How to Revoke or Reclaim a Device in Trusted Extensions 
allocating devices
for copying data, How to Copy Files to Portable Media in Trusted Extensionstape drive, How to Copy Files From Portable Media in Trusted Extensions 
allocating, using Device Allocation Manager, Device Allocation Manager GUI 
Always Print Banner checkbox, How to Suppress Banner and Trailer Pages for Specific Users 
applications
evaluating for security, Security Administrator Responsibilities for Trusted Programsinstalling, Managing Software in Trusted Extensions (Tasks)trusted and trustworthy, Evaluating Software for Security 
assigning
editor as the trusted editor, How to Assign the Editor of Your Choice as the Trusted Editorprivileges to users, Security Attribute Assignment to Users in Trusted Extensionsrights profiles, Security Attribute Assignment to Users in Trusted Extensions 
Associating Network Interfaces With Zones by Using CDE Actions (Task Map), Associating Network Interfaces With Zones by Using CDE Actions (Task Map) 
Assume Role menu item, How to Enter the Global Zone in Trusted Extensions 
assuming, roles, How to Enter the Global Zone in Trusted Extensions 
atohexlabel command
Command Line Tools in Trusted ExtensionsHow to Obtain the Hexadecimal Equivalent for a Label 
audio devices
automatically starting an audio player, How to Configure an Audio Player Program for Use in Trusted CDEpreventing remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions 
audit_class file, action for editing, Trusted CDE Actions 
Audit Classes action, Trusted CDE Actions 
audit classes for Trusted Extensions, list of new X audit classes, Trusted Extensions Audit Classes 
Audit Control action, Trusted CDE Actions 
audit_control file, action for editing, Trusted CDE Actions 
audit_event file, Trusted CDE Actions 
Audit Events action, Trusted CDE Actions 
audit events for Trusted Extensions, list of, Trusted Extensions Audit Events 
audit planning, Planning for Auditing in Trusted Extensions 
audit policy in Trusted Extensions, Trusted Extensions Audit Policy Options 
audit records in Trusted Extensions, policy, Trusted Extensions Audit Policy Options 
Audit Review profile, reviewing audit records, Audit Tasks of the System Administrator 
Audit Startup action, Trusted CDE Actions 
audit_startup command, action for editing, Trusted CDE Actions 
Audit Tasks of the System Administrator, Audit Tasks of the System Administrator 
audit tokens for Trusted Extensions
label token, label Tokenlist of, Trusted Extensions Audit Tokensxatom token, xatom Tokenxclient token, xclient Tokenxcolormap token, xcolormap Tokenxcursor token, xcursor Tokenxfont token, xfont Tokenxgc token, xgc Tokenxpixmap token, xpixmap Tokenxproperty token, xproperty Tokenxselect token, xselect Tokenxwindow token, xwindow Token 
auditconfig command, Command Line Tools in Trusted Extensions 
auditing in Trusted Extensions
additional audit events, Trusted Extensions Audit Eventsadditional audit policies, Trusted Extensions Audit Policy Optionsadditional audit tokens, Trusted Extensions Audit Tokensadditions to existing auditing commands, Extensions to Auditing Commands in Trusted Extensionsdifferences from Solaris auditing, Trusted Extensions and Auditingreference, Trusted Extensions Auditing (Overview)roles for administering, Audit Management by Role in Trusted Extensionssecurity administrator tasks, Audit Tasks of the Security Administratorsystem administrator tasks, Audit Tasks of the System Administratortasks, Audit Tasks in Trusted ExtensionsX audit classes, Trusted Extensions Audit Classes 
auditing, planning, Planning for Auditing in Trusted Extensions 
auditreduce command, Command Line Tools in Trusted Extensions 
authorizations
adding new device authorizations, How to Create New Device AuthorizationsAllocate Device
Device Protection With Trusted Extensions SoftwareHow to Assign Device AuthorizationsHow to Assign Device Authorizationsassigning device authorizations, How to Assign Device Authorizationsassigning, Security Attribute Assignment to Users in Trusted Extensionsauthorizing a user or role to change label, How to Enable a User to Change the Security Level of DataConfigure Device Attributes, How to Assign Device Authorizationsconvenient for users, How to Create a Rights Profile for Convenient Authorizationscreating customized device authorizations, How to Create New Device Authorizationscreating local and remote device authorizations, How to Create New Device Authorizationscustomizing for devices, How to Add Site-Specific Authorizations to a Device in Trusted Extensionsgranted, Trusted Extensions and Access ControlPrint Postscript, PostScript Printing of Security InformationPrint PostScript, How to Enable Users to Print PostScript Files in Trusted Extensionsprofiles that include device allocation authorizations, How to Assign Device AuthorizationsRevoke or Reclaim Device
How to Assign Device AuthorizationsHow to Assign Device Authorizationssolaris.print.nobanner, How to Suppress Banner and Trailer Pages for Specific Userssolaris.print.ps, How to Enable Users to Print PostScript Files in Trusted Extensions 
authorizing
device allocation, How to Assign Device AuthorizationsPostScript printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map) 
automount command, Command Line Tools in Trusted Extensions |