|
||||||||||||||||||||||||||||||||||||||||||||||
Part I Initial Configuration of Trusted Extensions 1. Security Planning for Trusted Extensions 2. Configuration Roadmap for Trusted Extensions 3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) Part II Administration of Trusted Extensions 7. Trusted Extensions Administration Concepts 8. Trusted Extensions Administration Tools 9. Getting Started as a Trusted Extensions Administrator (Tasks) 10. Security Requirements on a Trusted Extensions System (Overview) 11. Administering Security Requirements in Trusted Extensions (Tasks) 12. Users, Rights, and Roles in Trusted Extensions (Overview) 13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks) 14. Remote Administration in Trusted Extensions (Tasks) 15. Trusted Extensions and LDAP (Overview) 16. Managing Zones in Trusted Extensions (Tasks) 17. Managing and Mounting Files in Trusted Extensions (Tasks) 18. Trusted Networking (Overview) 19. Managing Networks in Trusted Extensions (Tasks) 20. Multilevel Mail in Trusted Extensions (Overview) 21. Managing Labeled Printing (Tasks) 22. Devices in Trusted Extensions (Overview) 23. Managing Devices for Trusted Extensions (Tasks) 24. Trusted Extensions Auditing (Overview) 25. Software Management in Trusted Extensions (Tasks) Creating and Managing a Security Policy Site Security Policy and Trusted Extensions Computer Security Recommendations Physical Security Recommendations Personnel Security Recommendations Additional Security References B. Using CDE Actions to Install Zones in Trusted Extensions Associating Network Interfaces With Zones by Using CDE Actions (Task Map) Preparing to Create Zones by Using CDE Actions (Task Map) Creating Labeled Zones by Using CDE Actions (Task Map) C. Configuration Checklist for Trusted Extensions Checklist for Configuring Trusted Extensions D. Quick Reference to Trusted Extensions Administration Administrative Interfaces in Trusted Extensions Solaris Interfaces Extended by Trusted Extensions Tighter Security Defaults in Trusted Extensions Limited Options in Trusted Extensions E. List of Trusted Extensions Man Pages Trusted Extensions Man Pages in Alphabetical Order |
Common Tasks in Trusted Extensions (Task Map)The following task map describes procedures that set up a working environment for administrators of Trusted Extensions.
How to Assign the Editor of Your Choice as the Trusted EditorThe trusted editor uses the value of the $EDITOR environment variable as its editor. Before You BeginYou must be in a role in the global zone.
Example 11-1 Specifying the Editor for the Trusted EditorThe Security Administrator role wants to use vi when editing system files. A user who has assumed the role modifies the .kshrc initialization file in the role's home directory. $ cd /home/secadmin $ vi .kshrc ## Interactive shell set -o vi ... export EDITOR=vi The next time that any user assumes the Security Administrator role, vi is the trusted editor. How to Change the Password for rootThe Security Administrator role is authorized to change any account's password at any time by using the Solaris Management Console. However, the Solaris Management Console cannot change the password of a system account. A system account is an account whose UID is below 100. root is a system account because its UID is 0.
Example 11-2 Changing the Password for a RoleAny user who can assume a role that is defined in LDAP can use the Trusted Path menu to change the password for the role. The password is then changed in LDAP for all users who attempt to assume the role. As in the Solaris OS, the Primary Administrator role can change the password for a role by using the Solaris Management Console. In Trusted Extensions, the Security Administrator role can change another role's password by using the Solaris Management Console. How to Regain Control of the Desktop's Current FocusThe “Secure Attention” key combination can be used to break a pointer grab or a keyboard grab by an untrusted application. The key combination can also be used to verify if a pointer or a keyboard has been grabbed by a trusted application. On a multiheaded system that has been spoofed to display more than one trusted stripe, this key combination warps the pointer to the authorized trusted stripe.
Example 11-3 Testing If the Password Prompt Can Be TrustedOn an x86 system that is using a Sun keyboard, the user has been prompted for a password. The cursor has been grabbed, and is in the password dialog box. To check that the prompt is trusted, the user presses the <Meta> <Stop> keys simultaneously. When the pointer remains in the dialog box, the user knows that the password prompt is trusted. If the pointer had moved to the trusted stripe, the user would know that the password prompt could not be trusted, and contact the administrator. Example 11-4 Forcing the Pointer to the Trusted StripeIn this example, a user is not running any trusted processes but cannot see the mouse pointer. To bring the pointer to the center of the trusted stripe, the user presses the <Meta> <Stop> keys simultaneously. How to Obtain the Hexadecimal Equivalent for a LabelThis procedure provides an internal hexadecimal representation of a label. This representation is safe for storing in a public directory. For more information, see the atohexlabel(1M) man page. Before You BeginYou must be in the Security Administrator role in the global zone. For details, see How to Enter the Global Zone in Trusted Extensions.
Example 11-5 Using the atohexlabel CommandWhen you pass a valid label in hexadecimal format, the command returns the argument. $ atohexlabel 0x0004-08-68 0x0004-08-68 When you pass an administrative label, the command returns the argument. $ atohexlabel admin_high ADMIN_HIGH atohexlabel admin_low ADMIN_LOW TroubleshootingThe error message atohexlabel parsing error found in <string> at position 0 indicates that the <string> argument that you passed to atohexlabel was not a valid label or clearance. Check your typing, and check that the label exists in your installed label_encodings file. How to Obtain a Readable Label From Its Hexadecimal FormThis procedure provides a way to repair labels that are stored in internal databases. For more information, see the hextoalabel(1M) man page. Before You BeginYou must be in the Security Administrator role in the global zone.
How to Change Security Defaults in System FilesIn Trusted Extensions, the security administrator changes or accesses default security settings on a system. Files in the /etc/security and /etc/default directories contain security settings. On a Solaris system, superuser can edit these files. For Solaris security information, see Chapter 3, Controlling Access to Systems (Tasks), in System Administration Guide: Security Services. Caution - Relax system security defaults only if site security policy allows you to. Before You BeginYou must be in the Security Administrator role in the global zone.
|
|||||||||||||||||||||||||||||||||||||||||||||
|