Solaris Trusted Extensions adds information to the following Solaris man pages.
- Solaris Man Page
 
Trusted Extensions Modification
 
- allocate(1)
 
Adds options to support allocating a device in a zone and cleaning the device in a windowed environment
 
- auditconfig(1M)
 
Adds the window policy for labeled information
 
- audit_class(4)
 
Adds X server audit classes
 
- audit_event(4)
 
Adds audit events
 
- auditreduce(1M)
 
Adds a label selector
 
- auth_attr(4)
 
Adds label authorizations
 
- automount(1M)
 
Adds the capability to mount, and therefore view, lower-level home directories
 
- cancel(1)
 
Adds label restrictions to a user's ability to cancel a print job
 
- deallocate(1)
 
Adds options to support deallocating a device in a zone, cleaning the device in a windowed environment, and specifying the type of device to deallocate
 
- device_clean(5)
 
Is invoked by default in Trusted Extensions
 
- exec_attr(4)
 
Adds CDE actions as a type of profile object
 
- getpflags(2)
 
Recognizes the NET_MAC_AWARE and NET_MAC_AWARE_INHERIT process flags
 
- getsockopt(3SOCKET)
 
Gets the mandatory access control status, SO_MAC_EXEMPT, of the socket
 
- getsockopt(3XNET)
 
Gets the mandatory access control status, SO_MAC_EXEMPT, of the socket
 
- ifconfig(1M)
 
Adds the all-zones interface
 
- is_system_labeled(3C)
 
Determines whether the system is configured with Trusted Extensions
 
- ldaplist(1)
 
Adds Trusted Extensions network databases
 
- list_devices(1)
 
Adds attributes, such as labels, that are associated with a device
 
- lp(1)
 
Adds the -nolabels option
 
- lpadmin(1M)
 
Adds label restrictions to the administrator's ability to administer printing
 
- lpmove(1M)
 
Adds label restrictions to the administrator's ability to move a print job
 
- lpq(1B)
 
Adds label restrictions to the display of print queue information
 
- lprm(1B)
 
Adds label restrictions to the caller's ability to remove print requests
 
- lpsched(1M)
 
Adds label restrictions to the administrator's ability to stop and restart the print service
 
- lpstat(1)
 
Adds label restrictions to the display of the print service status
 
- netstat(1M)
 
Adds the -R option to display extended security attributes
 
- privileges(5)
 
Adds Trusted Extensions privileges, such as PRIV_FILE_DOWNGRADE_SL
 
- prof_attr(4)
 
Adds rights profiles, such as Object Label Management
 
- route(1M)
 
Adds the -secattr option to add extended security attributes to a route
 
- setpflags(2)
 
Sets the NET_MAC_AWARE per-process flag
 
- setsockopt(3SOCKET)
 
Sets the SO_MAC_EXEMPT option
 
- setsockopt(3XNET)
 
Sets the mandatory access control, SO_MAC_EXEMPT, on the socket 
 
- smexec(1M)
 
Adds options to support the CDE action type
 
- smrole(1M)
 
Adds options to support a role's label
 
- smuser(1M)
 
Adds options to support a user's label and other security attributes, such as permitted idle time
 
- socket.h(3HEAD)
 
Supports the SO_MAC_EXEMPT option for unlabeled peers
 
- tar(1)
 
Adds including labels in tar files and extracting files according to label
 
- tar.h(3HEAD)
 
Adds attribute types that are used in labeled tar files
 
- ucred_getlabel(3C)
 
Adds getting the label value on a user credential
 
- user_attr(4)
 
Adds user security attributes that are specific to Trusted Extensions