Document Information 
Preface 
Part I Initial Configuration of Trusted Extensions 
1.  Security Planning for Trusted Extensions 
2.  Configuration Roadmap for Trusted Extensions 
3.  Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks) 
4.  Configuring Trusted Extensions (Tasks) 
5.  Configuring LDAP for Trusted Extensions (Tasks) 
6.  Configuring a Headless System With Trusted Extensions (Tasks) 
Part II Administration of Trusted Extensions 
7.  Trusted Extensions Administration Concepts 
8.  Trusted Extensions Administration Tools 
9.  Getting Started as a Trusted Extensions Administrator (Tasks) 
10.  Security Requirements on a Trusted Extensions System (Overview) 
11.  Administering Security Requirements in Trusted Extensions (Tasks) 
12.  Users, Rights, and Roles in Trusted Extensions (Overview) 
13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks) 
14.  Remote Administration in Trusted Extensions (Tasks) 
15.  Trusted Extensions and LDAP (Overview) 
16.  Managing Zones in Trusted Extensions (Tasks) 
17.  Managing and Mounting Files in Trusted Extensions (Tasks) 
18.  Trusted Networking (Overview) 
19.  Managing Networks in Trusted Extensions (Tasks) 
20.  Multilevel Mail in Trusted Extensions (Overview) 
21.  Managing Labeled Printing (Tasks) 
22.  Devices in Trusted Extensions (Overview) 
23.  Managing Devices for Trusted Extensions (Tasks) 
24.  Trusted Extensions Auditing (Overview) 
25.  Software Management in Trusted Extensions (Tasks) 
A.  Site Security Policy 
Creating and Managing a Security Policy 
Site Security Policy and Trusted Extensions 
Computer Security Recommendations 
Physical Security Recommendations 
Personnel Security Recommendations 
Common Security Violations 
Additional Security References 
B.  Using CDE Actions to Install Zones in Trusted Extensions 
Associating Network Interfaces With Zones by Using CDE Actions (Task Map) 
Preparing to Create Zones by Using CDE Actions (Task Map) 
Creating Labeled Zones by Using CDE Actions (Task Map) 
C.  Configuration Checklist for Trusted Extensions 
Checklist for Configuring Trusted Extensions 
D.  Quick Reference to Trusted Extensions Administration 
Administrative Interfaces in Trusted Extensions 
Solaris Interfaces Extended by Trusted Extensions 
Tighter Security Defaults in Trusted Extensions 
Limited Options in Trusted Extensions 
E.  List of Trusted Extensions Man Pages 
Trusted Extensions Man Pages in Alphabetical Order 
Solaris Man Pages That Are Modified by Trusted Extensions 
Glossary 
Index 
 | 
      
	       	 
             
How the Solaris Trusted Extensions Books Are Organized
The Solaris Trusted Extensions documentation set supplements the documentation for the Solaris
Express Community Edition release. Review both sets of documentation for a more
complete understanding of Solaris Trusted Extensions. The Solaris Trusted Extensions documentation set consists
of the following books. Book Title  | 
Topics  | 
Audience  | 
 
Solaris Trusted Extensions Transition Guide  | 
Obsolete. Provides an overview of the differences between
Trusted Solaris 8 software, Solaris Express Developer Edition 9/07  software, and Solaris
Trusted Extensions software. For this release, the What's New document for the Solaris OS provides
an overview of Trusted Extensions changes.  | 
All  | 
 
Solaris Trusted Extensions Reference Manual  | 
Obsolete. Provides Solaris Trusted Extensions man pages
for releases prior to the Solaris Express Developer Edition 9/07 release. For this release,
Trusted Extensions man pages are included with the Solaris man pages.  | 
All  | 
 
Solaris Trusted Extensions User’s Guide  | 
Describes the basic
features of Solaris Trusted Extensions. This book contains a glossary.  | 
End users, administrators,
developers  | 
 
Solaris Trusted Extensions Installation and Configuration  | 
Obsolete. Describes how to plan for, install, and configure Solaris Trusted Extensions
for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions.  | 
Administrators, developers  | 
 
Solaris Trusted Extensions Administrator’s Procedures  | 
For this
release, Part I describes how to prepare for, enable, and initially configure Trusted
Extensions. Part I replaces Solaris Trusted Extensions Installation and Configuration. Part II describes how to administer a Trusted Extensions
system. This book contains a glossary.  | 
Administrators, developers  | 
 
Solaris Trusted Extensions Developer’s Guide  | 
Describes how to develop applications with
Solaris Trusted Extensions.  | 
Developers, administrators  | 
 
Solaris Trusted Extensions Label Administration  | 
Provides information about how to specify label components in
the label encodings file.  | 
Administrators  | 
 
Compartmented Mode Workstation Labeling: Encodings Format  | 
Describes the syntax used in the label encodings file. The
syntax enforces the various rules for well-formed labels for a system.  | 
Administrators  | 
 
 
          
       |