|
|||||||||||||||||||||||||||
Part I Initial Configuration of Trusted Extensions 1. Security Planning for Trusted Extensions 2. Configuration Roadmap for Trusted Extensions 3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) Part II Administration of Trusted Extensions 7. Trusted Extensions Administration Concepts 8. Trusted Extensions Administration Tools 9. Getting Started as a Trusted Extensions Administrator (Tasks) 10. Security Requirements on a Trusted Extensions System (Overview) 11. Administering Security Requirements in Trusted Extensions (Tasks) 12. Users, Rights, and Roles in Trusted Extensions (Overview) 13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks) 14. Remote Administration in Trusted Extensions (Tasks) 15. Trusted Extensions and LDAP (Overview) 16. Managing Zones in Trusted Extensions (Tasks) 17. Managing and Mounting Files in Trusted Extensions (Tasks) 18. Trusted Networking (Overview) 19. Managing Networks in Trusted Extensions (Tasks) 20. Multilevel Mail in Trusted Extensions (Overview) 21. Managing Labeled Printing (Tasks) 22. Devices in Trusted Extensions (Overview) 23. Managing Devices for Trusted Extensions (Tasks) 24. Trusted Extensions Auditing (Overview) 25. Software Management in Trusted Extensions (Tasks) Creating and Managing a Security Policy Site Security Policy and Trusted Extensions Computer Security Recommendations Physical Security Recommendations Personnel Security Recommendations Additional Security References B. Using CDE Actions to Install Zones in Trusted Extensions Associating Network Interfaces With Zones by Using CDE Actions (Task Map) Preparing to Create Zones by Using CDE Actions (Task Map) Creating Labeled Zones by Using CDE Actions (Task Map) C. Configuration Checklist for Trusted Extensions Checklist for Configuring Trusted Extensions D. Quick Reference to Trusted Extensions Administration Administrative Interfaces in Trusted Extensions Solaris Interfaces Extended by Trusted Extensions Tighter Security Defaults in Trusted Extensions Limited Options in Trusted Extensions E. List of Trusted Extensions Man Pages Trusted Extensions Man Pages in Alphabetical Order |
Headless System Configuration in Trusted Extensions (Task Map)On headless systems, a console is connected by means of a serial line to a terminal emulator window. The line is typically secured by the tip command. Depending on what type of second system is available, you can use one of the following methods to configure a headless system. The methods are listed from more secure to less secure in the following table. These instructions also apply to remote systems.
Note - Consult your security policy to determine which methods of remote administration are permissible at your site. Enable Remote Login by root User in Trusted ExtensionsAs in the Solaris OS, root can log in remotely from a labeled system when the CONSOLE entry is disabled. If you plan to administer a remote system by editing local files, use this procedure.
Next StepsTo log in as the root user from an unlabeled system, you must also complete Enable Remote Login From an Unlabeled System. To enable remote login by a role, continue with Enable Remote Login by a Role in Trusted Extensions. Enable Remote Login by a Role in Trusted ExtensionsFollow this procedure only if you must administer a headless system by using the rlogin or ssh command. Configuration errors can be debugged remotely. Before You BeginIf you are using local files to administer the remote system, you have completed Enable Remote Login by root User in Trusted Extensions. Then, as the root user, perform this task on both systems.
Example 6-1 Creating a Temporary Definition of a Trusted Extensions Host TypeIn this example, the administrator wants to start configuring a remote Trusted Extensions system before the host type definitions are set up. To do so, the administrator uses the tnctl command on the remote system to temporarily define the host type of the desktop system: remote-TX# tnctl -h desktop-TX:cipso Later, the administrator wants to reach the remote Trusted Extensions system from a desktop system that is not configured with Trusted Extensions. In this case, the administrator uses the tnctl command on the remote system to temporarily define the host type of the desktop system as an unlabeled system that runs at the ADMIN_LOW label: remote-TX# tnctl -h desktop-TX:admin_low Enable Remote Login From an Unlabeled SystemBefore You BeginThis procedure is not secure. You have relaxed PAM policy to allow remote role assumption, as described in Enable Remote Login by a Role in Trusted Extensions.
Use a Remote Solaris Management Console to Administer in the Files ScopeIf you are not using LDAP, and you want to use the Solaris Management Console on a remote system, you enable remote connection to the Console. This procedure is not sufficient to enable access for the LDAP scope. To enable access for the LDAP scope, you must complete all the procedures in Configuring the Solaris Management Console for LDAP (Task Map). Before You BeginBoth systems are labeled systems. You have completed the following procedures:
Enable the Remote Display of Administrative GUIsThe procedure for remote display on a desktop is identical to the procedure on a Solaris system that is not configured with Trusted Extensions. This procedure is placed here for convenience.
Use the rlogin or ssh Command to Log In and Administer a Headless System in Trusted ExtensionsThis procedure enables you to use the command line and the txzonemgr GUI to administer a headless system as superuser or as a role. Note - Remote login by using the rlogin command is less secure than remote login by using the ssh command. To use the Solaris Management Console to administer a remote system does not require you to use a remote login command. For the procedure, see How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System. Before You BeginYou have completed Enable Remote Login by a Role in Trusted Extensions. You are a user who is enabled to log in to the headless system with that same user name and user ID, and you can assume the same role on the headless system that you can assume on the desktop system.
Example 6-2 Configuring Labeled Zones on a Headless SystemIn this example, the administrator uses the txzonemgr GUI to configure labeled zones on a labeled headless system from a labeled desktop system. As in the Solaris OS, the administrator enables X server access to the desktop system by using the -X option to the ssh command. The user install1 is defined identically on both systems, and can assume the role remoterole. TXdesk1 $ xhost + TXnohead4 TXdesk1 $ whoami install1 TXdesk1 $ ssh -X -l install1 TXnohead4 Password: Ins1PwD1 TXnohead4 $ To reach the global zone, the administrator assumes the role remoterole. This role is defined identically on both systems. TXnohead4 # su - remoterole Password: abcd1EFG Then, the administrator starts the txzonemgr GUI. TXnohead4 $ /usr/sbin/txzonemgr & The Labeled Zone Manager runs on the headless system and displays on the desktop system. |
||||||||||||||||||||||||||
|