Document Information
Preface
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Tasks)
A. Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
B. Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
D. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
E. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
Index
|
Related Books From Sun Microsystems
The following books contain information that is useful when you prepare for and
run Solaris Trusted Extensions software. Solaris Express Installation Guide: Planning for Installation and Upgrade – Provides guidance on installing the Solaris OS Solaris Express Installation Guide: Custom JumpStart and Advanced Installations – Provides guidance on installation methods and configuration options Book Title |
Topics |
System Administration Guide: Basic Administration |
User accounts and
groups, server and client support, shutting down and booting a system, managing services,
and managing software (packages and patches) |
System Administration Guide: Advanced Administration |
Terminals and modems, system resources (disk quotas,
accounting, and crontabs), system processes, and troubleshooting Solaris software problems |
System Administration Guide: Devices and File Systems |
Removable media, disks and
devices, file systems, and backing up and restoring data |
System Administration Guide: IP Services |
TCP/IP network administration, IPv4 and
IPv6 address administration, DHCP, IPsec, IKE, Solaris IP filter, Mobile IP, IP network
multipathing (IPMP), and IPQoS |
System Administration Guide: Network Interfaces and Network Virtualization |
Networking stack, NIC driver property configuration, network interface configuration, administration
of VLANs and link aggregations, configuring WiFi wireless networking. |
System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP) |
DNS, NIS, and LDAP naming
and directory services, including transitioning from NIS to LDAP and transitioning from
NIS+ to LDAP |
System Administration Guide: Network Services |
Web cache servers, time-related services, network file systems (NFS and Autofs),
mail, SLP, and PPP |
System Administration Guide: Security Services |
Auditing, device management, file security, BART, Kerberos services, PAM, Solaris
Cryptographic Framework, privileges, RBAC, SASL, and Solaris Secure Shell |
System Administration Guide: Virtualization Using the Solaris Operating System |
Resource management features, which enable you
to control how applications use available system resources; zones software partitioning technology, which
virtualizes operating system services to create an isolated environment for running applications; and
virtualization using SunTM xVM hypervisor technology, which supports multiple operating system instances simultaneously |
Solaris CIFS Administration Guide |
Solaris
CIFS service, which enables you to configure a Solaris system to make CIFS
shares available to CIFS clients; and native identity mapping services, which enables you
to map user and group identities between Solaris systems and Windows systems |
Solaris ZFS Administration Guide |
ZFS storage
pool and file system creation and management, snapshots, clones, backups, using access control
lists (ACLs) to protect ZFS files, using ZFS on a Solaris system with
zones installed, emulated volumes, and troubleshooting and data recovery |
System Administration Guide: Solaris Printing |
Solaris printing topics and tasks,
using services, tools, protocols, and technologies to set up and administer printing
services and printers |
|