Document Information
Preface
Part I Initial Configuration of Trusted Extensions
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Solaris Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Part II Administration of Trusted Extensions
7. Trusted Extensions Administration Concepts
8. Trusted Extensions Administration Tools
Administration Tools for Trusted Extensions
txzonemgr Script
Device Allocation Manager
Solaris Management Console Tools
Label Builder in Trusted Extensions
Command Line Tools in Trusted Extensions
Remote Administration in Trusted Extensions
9. Getting Started as a Trusted Extensions Administrator (Tasks)
10. Security Requirements on a Trusted Extensions System (Overview)
11. Administering Security Requirements in Trusted Extensions (Tasks)
12. Users, Rights, and Roles in Trusted Extensions (Overview)
13. Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
14. Remote Administration in Trusted Extensions (Tasks)
15. Trusted Extensions and LDAP (Overview)
16. Managing Zones in Trusted Extensions (Tasks)
17. Managing and Mounting Files in Trusted Extensions (Tasks)
18. Trusted Networking (Overview)
19. Managing Networks in Trusted Extensions (Tasks)
20. Multilevel Mail in Trusted Extensions (Overview)
21. Managing Labeled Printing (Tasks)
22. Devices in Trusted Extensions (Overview)
23. Managing Devices for Trusted Extensions (Tasks)
24. Trusted Extensions Auditing (Overview)
25. Software Management in Trusted Extensions (Tasks)
A. Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
B. Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Preparing to Create Zones by Using CDE Actions (Task Map)
Creating Labeled Zones by Using CDE Actions (Task Map)
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
D. Quick Reference to Trusted Extensions Administration
Administrative Interfaces in Trusted Extensions
Solaris Interfaces Extended by Trusted Extensions
Tighter Security Defaults in Trusted Extensions
Limited Options in Trusted Extensions
E. List of Trusted Extensions Man Pages
Trusted Extensions Man Pages in Alphabetical Order
Solaris Man Pages That Are Modified by Trusted Extensions
Glossary
Index
|
Trusted CDE Actions
The following tables list the CDE actions that roles in Trusted Extensions
can run. These trusted CDE actions are available from the Trusted_Extensions folder. The Trusted_Extensions
folder is available from the Application Manager folder on the CDE desktop. Table 8-2 Administrative Actions in Trusted CDE, Their Purpose, and Associated Rights ProfilesAction Name |
Purpose
of Action |
Default Rights Profile |
Add Allocatable Device |
Creates devices by adding entries to device databases. See add_allocatable(1M). |
Device
Security |
Admin Editor |
Edits the specified file. See How to Edit Administrative Files in Trusted Extensions. |
Object Access Management |
Audit Classes |
Edits the audit_class file. See
audit_class(4). |
Audit Control |
Audit Control |
Edits the audit_control file. See audit_control(4). |
Audit Control |
Audit Events |
Edits the audit_event file. See
audit_event(4). |
Audit Control |
Audit Startup |
Edits the audit_startup.sh script. See audit_startup(1M). |
Audit Control |
Check Encodings |
Runs the chk_encodings command on
specified encodings file. See chk_encodings(1M). |
Object Label Management |
Check TN Files |
Runs the tnchkdb command on tnrhdb,
tnrhtp, and tnzonecfg databases. See tnchkdb(1M). |
Network Management |
Configure Selection Confirmation |
Edits /usr/dt/config/sel_config file. See sel_config(4). |
Object
Label Management |
Create LDAP Client |
Makes the global zone an LDAP client of an existing LDAP directory
service. |
Information Security |
Edit Encodings |
Edits the specified label_encodings file and runs the chk_encodings command. See chk_encodings(1M). |
Object
Label Management |
Name Service Switch |
Edits the nsswitch.conf file. See nsswitch.conf(4). |
Network Management |
Set DNS Servers |
Edits the resolv.conf file. See
resolv.conf(4). |
Network Management |
Set Daily Message |
Edits the /etc/motd file. At login, the contents of this file display
in the Last Login dialog box. |
Network Management |
Set Default Routes |
Specifies default static routes. |
Network Management |
Share Filesystem |
Edits the
dfstab file. Does not run the share command. See dfstab(4). |
File System Management |
The following actions are used by the initial setup team during zone creation.
Some of these actions can be used for maintenance and troubleshooting. Table 8-3 Installation Actions in Trusted CDE, Their Purpose, and Associated Rights ProfilesAction Name |
Purpose
of Action |
Default Rights Profile |
Clone Zone |
Creates a labeled zone from a ZFS snapshot of
an existing zone. |
Zone Management |
Copy Zone |
Creates a labeled zone from an existing zone. |
Zone Management |
Configure Zone |
Associates
a label with a zone name. |
Zone Management |
Initialize Zone for LDAP |
Initializes the zone for booting as
an LDAP client. |
Zone Management |
Install Zone |
Installs the system files that a labeled zone requires. |
Zone
Management |
Restart Zone |
Restarts a zone that has already been booted. |
Zone Management |
Share Logical Interface |
Sets up one interface
for the global zone and a separate interface for the labeled zones to
share. |
Network Management |
Share Physical Interface |
Sets up one interface that is shared by the global zone and
the labeled zones. |
Network Management |
Shut Down Zone |
Shuts down an installed zone. |
Zone Management |
Start Zone |
Boots an installed zone
and starts the services for that zone. |
Zone Management |
Zone Terminal Console |
Opens a console to view
processes in an installed zone. |
Zone Management |
|