This book is ObsoleteDescribes how to plan for, install, and configure Solaris Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions.The Solaris Trusted Extensions Installation and Configuration guide provides procedures for configuring Solaris™ Trusted Extensions on the Solaris Operating System. This guide also describes preparing the Solaris system to support a secure installation of Solaris Trusted Extensions.
Relevancy to OpenIndiana Hipster
To be determined
Target Audience
Administrators, developersThis book is for knowledgeable system administrators and security administrators who are installing Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.
Requirements
Successfully configuring Trusted Extensions on a system in a way that is consistent with site security requires understanding the security features of Trusted Extensions and your site security policy. Before you install the Solaris Trusted Extensions packages, read Chapter 1, Security Planning for Trusted Extensions for information about how to ensure site security when configuring the software.
Describes the basic features of Solaris Trusted Extensions.This book contains a glossary.The Solaris Trusted Extensions User's Guide is a guide to working in the Solaris™ Operating System (Solaris OS) with Solaris Trusted Extensions installed.
Relevancy to OpenIndiana Hipster
To be determined
Target Audience
This book is for all users of Trusted Extensions (End users, administrators, developers).
Requirements
As a prerequisite, you must be familiar with the Solaris OS and one of the following desktops:
Common Desktop Environment (CDE)
The open source GNOME desktop
Sun Java™ Desktop System
You must also be familiar with the security policy of your organization.
Solaris Trusted Extensions Administrator's Procedures
For this release, Part I describes how to prepare for, enable, and initially configure Trusted Extensions.Part I replaces Solaris Trusted Extensions Installation and Configuration.Part II describes how to administer a Trusted Extensions system.This book contains a glossary.System installation, configuration, and administration that is specific to Solaris Trusted Extensions
Relevancy to OpenIndiana Hipster
To be determined
Target Audience
Administrators, developersThis book is for knowledgeable system administrators and security administrators who are configuring and administering Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.
Requirements
Administrators should be familiar with Solaris administration.In addition, administrators should understand the following:
The security features of Trusted Extensions and your site security policy
Basic concepts and procedures for using a host that is configured with Trusted Extensions, as described in the Solaris Trusted Extensions User’s Guide
How administrative tasks are divided among roles at your site
Provides information about how to specify label components in the label encodings file.Labels, clearances, and handling instructions are used to protect information on a system that is configured with Solaris Trusted Extensions software. The components of labels, clearances, and handling instructions are specified in the label_encodings file. This guide provides background for creating or modifying the file. The guide provides examples, and helps you to create and install a label_encodings file that is appropriate for your site.
Relevancy to OpenIndiana Hipster
To be determined
Target Audience
Administrators This book is for security administrators. Security administrators are responsible for defining the organization's labels. Some security administrators are also responsible for implementing the labels. This book is for definers and implementers.
Requirements
The security administrator who implements the labels should be familiar with Solaris administration. The necessary level of knowledge can be acquired through training and documentation.
The Solaris Trusted Extensions Transition Guide describes the differences between the Solaris Trusted Extensions release and the following releases: The Trusted Solaris™ 8 releases The Solaris™ 10 Operating System releaseThe differences include labels, a modified desktop, a modified windowing system, and modified administration tools.
Relevancy to OpenIndiana Hipster
To be determined
Target Audience
All users should find the book useful. The Solaris Trusted Extensions Transition Guide is designed for users who are familiar with Trusted Solaris releases and with the Solaris OS. This book enables these users to more easily use systems that are configured with Solaris Trusted Extensions.
Requirements
To be determined
Last update:
2023-09-03 19:46:49
Created:
2016-06-15 20:32:35