|
|||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) Setting Up the Global Zone in Trusted Extensions Check and Install Your Label Encodings File Enable IPv6 Networking in Trusted Extensions Create ZFS Pool for Cloning Zones Reboot and Log In to Trusted Extensions Initialize the Solaris Management Console Server in Trusted Extensions Make the Global Zone an LDAP Client in Trusted Extensions Configure the Network Interfaces in Trusted Extensions Create Another Zone in Trusted Extensions Add a Network Interface to an Existing Labeled Zone Creating Roles and Users in Trusted Extensions Create the Security Administrator Role in Trusted Extensions Create Users Who Can Assume Roles in Trusted Extensions Creating Home Directories in Trusted Extensions Create the Home Directory Server in Trusted Extensions Enable Users to Access Their Home Directories in Trusted Extensions Adding Users and Hosts to an Existing Trusted Network Add an NIS User to the LDAP Server Troubleshooting Your Trusted Extensions Configuration Additional Trusted Extensions Configuration Tasks How to Copy Files to Portable Media in Trusted Extensions How to Copy Files From Portable Media in Trusted Extensions How to Remove Trusted Extensions From the System 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
Creating Roles and Users in Trusted ExtensionsIf you are already using administrative roles, you might want to add a Security Administrator role. For sites that have not yet implemented roles, the procedure for creating them is similar to the procedure in the Solaris OS. Trusted Extensions adds the Security Administrator role and requires the use of the Solaris Management Console to administer a Trusted Extensions domain. Create the Security Administrator Role in Trusted ExtensionsRole creation in Trusted Extensions is identical to role creation in the Solaris OS. However, in Trusted Extensions, a Security Administrator role is required. To create a local Security Administrator role, you can also use the command-line interface, as in Example 4-4. Before You BeginYou must be superuser, in the root role, or in the Primary Administrator role. To create the role on the network, you must have completed Configuring the Solaris Management Console for LDAP (Task Map).
In this example, the root user adds the Security Administrator role to the local system by using the roleadd command. For details, see the roleadd(1M) man page. The root user consults Table 1-2 before creating the role. # roleadd -c "Local Security Administrator" -d /export/home1 \ -u 110 -P "Information Security,User Security" -K lock_after_retries=no \ -K idletime=5 -K idlecmd=lock -K labelview=showsl \ -K min_label=ADMIN_LOW -K clearance=ADMIN_HIGH secadmin The root user provides an initial password for the role. # passwd -r files secadmin New Password: <Type password> Re-enter new Password: <Retype password> passwd: password successfully changed for secadmin # To assign the role to a local user, see Example 4-5. Create Users Who Can Assume Roles in Trusted ExtensionsTo create a local user, you can use the command-line interface, as in Example 4-5, instead of the following procedure. Where site security policy permits, you can choose to create a user who can assume more than one administrative role. For secure user creation, the System Administrator role creates the user, and the Security Administrator role assigns security-relevant attributes, such as a password. Before You BeginYou must be superuser, in the root role, in the Security Administrator role, or in the Primary Administrator role. The Security Administrator role has the least amount of privilege that is required for user creation. The Solaris Management Console is displayed. For details, see Create the Security Administrator Role in Trusted Extensions.
In this example, the root user creates a local user who can assume the Security Administrator role. For details, see the useradd(1M) and atohexlabel(1M) man pages. First, the root user determines the hexadecimal format of the user's minimum label and clearance label. # atohexlabel public 0x0002-08-08 # atohexlabel -c "confidential restricted" 0x0004-08-78 Next, the root user consults Table 1-2, and then creates the user. # useradd -c "Local user for Security Admin" -d /export/home1 \ -K idletime=10 -K idlecmd=logout -K lock_after_retries=no -K min_label=0x0002-08-08 -K clearance=0x0004-08-78 -K labelview=showsl jandoe Then, the root user provides an initial password. # passwd -r files jandoe New Password: <Type password> Re-enter new Password: <Retype password> passwd: password successfully changed for jandoe # Finally, the root user adds the Security Administrator role to the user's definition. The role was created in Create the Security Administrator Role in Trusted Extensions. # usermod -R secadmin jandoe Verify That the Trusted Extensions Roles WorkTo verify each role, assume the role. Then, perform tasks that only that role can perform. Before You BeginIf you have configured DNS or routing, you must reboot after you create the roles and before you verify that the roles work.
Enable Users to Log In to a Labeled ZoneWhen the host is rebooted, the association between the devices and the underlying storage must be re-established. Before You BeginYou have created at least one labeled zone. That zone is not being used for cloning.
|
||
|