Skip to content

Trusted Extensions Systems Administration

Solaris Trusted Extensions Installation and Configuration

Item Details
Document Link Solaris Trusted Extensions Installation and Configuration
Topics This book is Obsolete

Describes how to plan for, install, and configure Solaris Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions.

The Solaris Trusted Extensions Installation and Configuration guide provides procedures for configuring Solaris™ Trusted Extensions on the Solaris Operating System. This guide also describes preparing the Solaris system to support a secure installation of Solaris Trusted Extensions.
Relevancy to OpenIndiana Hipster To be determined
Target Audience Administrators, developers

This book is for knowledgeable system administrators and security administrators who are installing Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.
Requirements Successfully configuring Trusted Extensions on a system in a way that is consistent with site security requires understanding the security features of Trusted Extensions and your site security policy. Before you install the Solaris Trusted Extensions packages, read Chapter 1, Security Planning for Trusted Extensions for information about how to ensure site security when configuring the software.

Solaris Trusted Extensions User's Guide

Item Details
Document Link Solaris Trusted Extensions User's Guide
Topics Describes the basic features of Solaris Trusted Extensions.

This book contains a glossary.

The Solaris Trusted Extensions User's Guide is a guide to working in the Solaris™ Operating System (Solaris OS) with Solaris Trusted Extensions installed.
Relevancy to OpenIndiana Hipster To be determined
Target Audience This book is for all users of Trusted Extensions (End users, administrators, developers).
Requirements As a prerequisite, you must be familiar with the Solaris OS and one of the following desktops:
  • Common Desktop Environment (CDE)
  • The open source GNOME desktop
  • Sun Java™ Desktop System
You must also be familiar with the security policy of your organization.

Solaris Trusted Extensions Administrator's Procedures

Item Details
Document Link Solaris Trusted Extensions Administrator's Procedures
Topics For this release, Part I describes how to prepare for, enable, and initially configure Trusted Extensions.

Part I replaces Solaris Trusted Extensions Installation and Configuration.

Part II describes how to administer a Trusted Extensions system.

This book contains a glossary.

System installation, configuration, and administration that is specific to Solaris Trusted Extensions
Relevancy to OpenIndiana Hipster To be determined
Target Audience Administrators, developers

This book is for knowledgeable system administrators and security administrators who are configuring and administering Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.
Requirements Administrators should be familiar with Solaris administration.

In addition, administrators should understand the following:

  • The security features of Trusted Extensions and your site security policy
  • Basic concepts and procedures for using a host that is configured with Trusted Extensions, as described in the Solaris Trusted Extensions User’s Guide
  • How administrative tasks are divided among roles at your site

Solaris Trusted Extensions Label Administration

Item Details
Document Link Solaris Trusted Extensions Label Administration
Topics Provides information about how to specify label components in the label encodings file.

Labels, clearances, and handling instructions are used to protect information on a system that is configured with Solaris Trusted Extensions software. The components of labels, clearances, and handling instructions are specified in the label_encodings file. This guide provides background for creating or modifying the file. The guide provides examples, and helps you to create and install a label_encodings file that is appropriate for your site.
Relevancy to OpenIndiana Hipster To be determined
Target Audience Administrators

This book is for security administrators. Security administrators are responsible for defining the organization's labels. Some security administrators are also responsible for implementing the labels. This book is for definers and implementers.
Requirements The security administrator who implements the labels should be familiar with Solaris administration. The necessary level of knowledge can be acquired through training and documentation.

Solaris Trusted Extensions Transition Guide

Item Details
Document Link Solaris Trusted Extensions Transition Guide
Topics The Solaris Trusted Extensions Transition Guide describes the differences between the Solaris Trusted Extensions release and the following releases:

The Trusted Solaris™ 8 releases

The Solaris™ 10 Operating System release

The differences include labels, a modified desktop, a modified windowing system, and modified administration tools.
Relevancy to OpenIndiana Hipster To be determined
Target Audience All users should find the book useful. The Solaris Trusted Extensions Transition Guide is designed for users who are familiar with Trusted Solaris releases and with the Solaris OS. This book enables these users to more easily use systems that are configured with Solaris Trusted Extensions.
Requirements To be determined

Last update: 2023-09-03 19:46:49
Created: 2016-06-15 20:32:35