Trusted Extensions Systems Administration
Solaris Trusted Extensions Installation and Configuration
Item | Details |
---|---|
Document Link | Solaris Trusted Extensions Installation and Configuration |
Topics | This book is ObsoleteDescribes how to plan for, install, and configure Solaris Trusted Extensions for the Solaris 10 11/06 and Solaris 10 8/07 releases of Trusted Extensions.The Solaris Trusted Extensions Installation and Configuration guide provides procedures for configuring Solaris™ Trusted Extensions on the Solaris Operating System. This guide also describes preparing the Solaris system to support a secure installation of Solaris Trusted Extensions. |
Relevancy to OpenIndiana Hipster | To be determined |
Target Audience | Administrators, developersThis book is for knowledgeable system administrators and security administrators who are installing Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks. |
Requirements | Successfully configuring Trusted Extensions on a system in a way that is consistent with site security requires understanding the security features of Trusted Extensions and your site security policy. Before you install the Solaris Trusted Extensions packages, read Chapter 1, Security Planning for Trusted Extensions for information about how to ensure site security when configuring the software. |
Solaris Trusted Extensions User's Guide
Item | Details |
---|---|
Document Link | Solaris Trusted Extensions User's Guide |
Topics | Describes the basic features of Solaris Trusted Extensions.This book contains a glossary.The Solaris Trusted Extensions User's Guide is a guide to working in the Solaris™ Operating System (Solaris OS) with Solaris Trusted Extensions installed. |
Relevancy to OpenIndiana Hipster | To be determined |
Target Audience | This book is for all users of Trusted Extensions (End users, administrators, developers). |
Requirements | As a prerequisite, you must be familiar with the Solaris OS and one of the following desktops:
|
Solaris Trusted Extensions Administrator's Procedures
Item | Details |
---|---|
Document Link | Solaris Trusted Extensions Administrator's Procedures |
Topics | For this release, Part I describes how to prepare for, enable, and initially configure Trusted Extensions.Part I replaces Solaris Trusted Extensions Installation and Configuration.Part II describes how to administer a Trusted Extensions system.This book contains a glossary.System installation, configuration, and administration that is specific to Solaris Trusted Extensions |
Relevancy to OpenIndiana Hipster | To be determined |
Target Audience | Administrators, developersThis book is for knowledgeable system administrators and security administrators who are configuring and administering Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks. |
Requirements | Administrators should be familiar with Solaris administration.In addition, administrators should understand the following:
|
Solaris Trusted Extensions Label Administration
Item | Details |
---|---|
Document Link | Solaris Trusted Extensions Label Administration |
Topics | Provides information about how to specify label components in the label encodings file.Labels, clearances, and handling instructions are used to protect information on a system that is configured with Solaris Trusted Extensions software. The components of labels, clearances, and handling instructions are specified in the label_encodings file. This guide provides background for creating or modifying the file. The guide provides examples, and helps you to create and install a label_encodings file that is appropriate for your site. |
Relevancy to OpenIndiana Hipster | To be determined |
Target Audience | Administrators This book is for security administrators. Security administrators are responsible for defining the organization's labels. Some security administrators are also responsible for implementing the labels. This book is for definers and implementers. |
Requirements | The security administrator who implements the labels should be familiar with Solaris administration. The necessary level of knowledge can be acquired through training and documentation. |
Solaris Trusted Extensions Transition Guide
Item | Details |
---|---|
Document Link | Solaris Trusted Extensions Transition Guide |
Topics | The Solaris Trusted Extensions Transition Guide describes the differences between the Solaris Trusted Extensions release and the following releases: The Trusted Solaris™ 8 releases The Solaris™ 10 Operating System releaseThe differences include labels, a modified desktop, a modified windowing system, and modified administration tools. |
Relevancy to OpenIndiana Hipster | To be determined |
Target Audience | All users should find the book useful. The Solaris Trusted Extensions Transition Guide is designed for users who are familiar with Trusted Solaris releases and with the Solaris OS. This book enables these users to more easily use systems that are configured with Solaris Trusted Extensions. |
Requirements | To be determined |