<?Pub UDT _bookmark _target?><chapter id="txtool-1"><?Pub Tag atict:info tracking="on" ref="10"?><?Pub Tag atict:user
user="sharonr" fullname="Sharon Veach"?><title>Trusted Extensions Administration
Tools</title><indexterm><primary>administrative tools</primary><secondary>description</secondary>
</indexterm><highlights><para>This chapter describes the tools that are available in Solaris Trusted Extensions,  the
location of the tools, and the databases on which the tools operate.</para><itemizedlist remap="jumplist"><listitem><para><olink targetptr="txtool-6" remap="internal">Administration Tools for Trusted
Extensions</olink></para>
</listitem><listitem><para><olink targetptr="txtool-3" remap="internal">Trusted CDE Actions</olink></para>
</listitem><listitem><para><olink targetptr="txintro-24" remap="internal">Device Allocation Manager</olink></para>
</listitem><listitem><para><olink targetptr="txtool-8" remap="internal">Solaris Management Console Tools</olink></para>
</listitem><listitem><para><olink targetptr="txtool-4" remap="internal">Command Line Tools in Trusted
Extensions</olink></para>
</listitem><listitem><para><olink targetptr="txtool-12" remap="internal">Remote Administration in Trusted
Extensions</olink></para>
</listitem>
</itemizedlist>
</highlights><sect1 id="txtool-6"><title>Administration Tools for Trusted Extensions</title><para>Administration on a system that is configured with Trusted Extensions uses
many of the same tools that are available in the Solaris OS. Trusted Extensions offers
security-enhanced tools as well. Administration tools are available only to
roles in a role workspace.</para><para><indexterm><primary>trusted applications</primary><secondary>in a role workspace</secondary></indexterm><indexterm><primary>roles</primary><secondary>trusted application access</secondary></indexterm>Within a role workspace, you can
access commands, actions, applications, and scripts that are trusted. The
following table summarizes these administrative tools.</para><table frame="topbot" pgwide="1" id="txtool-tbl-1"><title>Trusted Extensions Administrative
Tools</title><tgroup cols="3" colsep="0" rowsep="0"><colspec colwidth="33*"/><colspec colwidth="33*"/><colspec colwidth="33*"/><thead><row rowsep="1"><entry><para>Tool</para>
</entry><entry><para>Description</para>
</entry><entry><para>For More Information</para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary>files</primary><secondary><command>/usr/sbin/txzonemgr</command></secondary></indexterm><indexterm><primary>scripts</primary><secondary><command>/usr/sbin/txzonemgr</command></secondary></indexterm><indexterm><primary><command>/usr/sbin/txzonemgr</command> script</primary></indexterm><command>/usr/sbin/txzonemgr</command></para>
</entry><entry><para>Provides a menu-based wizard for creating, installing, initializing,
and booting zones. This script replaces the Trusted CDE actions that manage zones.</para><para>The script also provides menu items for networking options, name services
options, and for clienting the global zone to an existing LDAP server. <command>txzonemgr</command> uses the <command>zenity</command> command. </para>
</entry><entry><para>See <olink targetptr="txconf-20" remap="internal">Creating
Labeled Zones</olink></para><para>See also the <citerefentry><refentrytitle>zenity</refentrytitle><manvolnum>1</manvolnum></citerefentry> man page.</para>
</entry>
</row><row><entry><para><indexterm><primary>Trusted_Extensions folder</primary><secondary>location</secondary></indexterm>In Trusted CDE, actions in the Trusted_Extensions folder in the Application
Manager folder</para>
</entry><entry><para>Used to edit local files that the Solaris Management Console does not manage, such as <filename>/etc/system</filename>. Some actions run scripts, such as the Install Zone
action.</para>
</entry><entry><para>See <olink targetptr="txtool-3" remap="internal">Trusted CDE Actions</olink> and <olink targetptr="commontasks-42" remap="internal">How to Start CDE Administrative Actions in Trusted
Extensions</olink>.</para>
</entry>
</row><row><entry><para><indexterm><primary>Device Allocation Manager</primary><secondary>administrative tool</secondary></indexterm>In Trusted CDE, Device Allocation Manager</para><para>In Solaris Trusted Extensions (JDS), Device Manager</para>
</entry><entry><para>Used to administer the label ranges of devices, and to allocate or deallocate
devices.</para>
</entry><entry><para>See <olink targetptr="txintro-24" remap="internal">Device Allocation Manager</olink> and <olink targetptr="managedev-2" remap="internal">Handling Devices in Trusted Extensions (Task Map)</olink>.</para>
</entry>
</row><row><entry><para>Solaris Management Console</para>
</entry><entry><para>Used to configure users, roles, rights, hosts, zones, and networks.
This tool can update local files or LDAP databases.</para><para>This tool can also launch the <command>dtappsession</command> legacy
application.</para>
</entry><entry><para>For basic functionality, see <olink targetdoc="group-sa" targetptr="smcover-1" remap="external">Chapter 2, <citetitle remap="chapter">Working With the Solaris Management Console (Tasks),</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>. For information
that is specific to Trusted Extensions, see <olink targetptr="txtool-8" remap="internal">Solaris
Management Console Tools</olink>.</para>
</entry>
</row><row><entry><para>Solaris Management Console commands, such as <command>smuser</command> and <command>smtnzonecfg</command></para>
</entry><entry><para>Is the command-line interface for the Solaris Management Console.</para>
</entry><entry><para>For a list, see <olink targetptr="txtool-tbl-4" remap="internal">Table&nbsp;8&ndash;4</olink>.</para>
</entry>
</row><row><entry><para>Label Builder</para>
</entry><entry><para>Is also a user tool. Appears when a program requires you to choose a
label.</para>
</entry><entry><para>For an example, see <olink targetptr="manageusers-14" remap="internal">How to Modify
a User's Label Range in the Solaris Management Console</olink>.</para>
</entry>
</row><row><entry><para>Trusted Extensions commands</para>
</entry><entry><para>Used to perform tasks that are not covered by Solaris Management Console tools or CDE  actions.</para>
</entry><entry><para>For the list of administrative commands, see <olink targetptr="txtool-tbl-5" remap="internal">Table&nbsp;8&ndash;5</olink>.</para>
</entry>
</row>
</tbody>
</tgroup>
</table>
</sect1><sect1 id="txtool-7"><title><command>txzonemgr</command> Script</title><indexterm><primary>administrative tools</primary><secondary><command>txzonemgr</command> script</secondary>
</indexterm><indexterm><primary>administrative tools</primary><secondary>Labeled Zone Manager</secondary>
</indexterm><para>In the Solaris Express Community Edition, the <command>txzonemgr</command> script is used to configure labeled
zones. This <command>zenity</command>(1) script displays a dialog box with
the title Labeled Zone Manager. This GUI presents a dynamically-determined
menu that displays only valid choices for the current configuration status
of a labeled zone. For instance, if a zone is already labeled, the Label menu
item is not displayed.</para>
</sect1><sect1 id="txtool-3"><title>Trusted CDE Actions</title><indexterm><primary>administrative actions</primary><secondary>in CDE</secondary>
</indexterm><indexterm><primary>trusted actions</primary><secondary>in CDE</secondary>
</indexterm><indexterm><primary>administrative actions</primary><secondary>list of trusted CDE</secondary>
</indexterm><indexterm><primary>actions</primary><secondary>list of trusted CDE</secondary>
</indexterm><indexterm><primary>administrative tools</primary><secondary>Trusted CDE actions</secondary>
</indexterm><para>The following tables list the CDE actions that roles in Trusted Extensions can
run. These trusted CDE actions are available from the Trusted_Extensions folder.
The Trusted_Extensions folder is available from the Application Manager folder
on the CDE desktop.</para><table frame="topbot" pgwide="1" id="txtool-tbl-2"><title>Administrative Actions
in Trusted CDE, Their Purpose, and Associated Rights Profiles</title><tgroup cols="3" colsep="0" rowsep="0"><colspec colnum="1" colname="column1" colwidth="3.08*"/><colspec colnum="2" colname="column2" colwidth="6.75*"/><colspec colnum="3" colname="column3" colwidth="3.19*"/><thead><row rowsep="1"><entry colname="column1" align="left" valign="bottom"><para>Action Name</para>
</entry><entry colname="column2" align="left" valign="bottom"><para>Purpose of Action</para>
</entry><entry colname="column3" align="left" valign="bottom"><para>Default Rights Profile</para>
</entry>
</row>
</thead><tbody><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Add Allocatable Device action</primary></indexterm><literal>Add Allocatable Device</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary>device databases</primary><secondary>action for editing</secondary></indexterm><indexterm><primary>databases</primary><secondary>devices</secondary></indexterm>Creates devices by adding entries
to device databases. See <olink targetdoc="group-refman" targetptr="add-allocatable-1m" remap="external"><citerefentry><refentrytitle>add_allocatable</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Device Security</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Admin Editor action</primary></indexterm><literal>Admin
Editor</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para>Edits the specified file. See <olink targetptr="roles-10" remap="internal">How to Edit
Administrative Files in Trusted Extensions</olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Object Access Management</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Audit Classes action</primary></indexterm><literal>Audit
Classes</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary><filename>/etc/security/audit_class</filename> file</primary></indexterm><indexterm><primary>files</primary><secondary><filename>/etc/security/audit_class</filename></secondary></indexterm><indexterm><primary><filename>audit_class</filename> file</primary><secondary>action for editing</secondary></indexterm>Edits the <filename>audit_class</filename> file. See <olink targetdoc="group-refman" targetptr="audit-class-4" remap="external"><citerefentry><refentrytitle>audit_class</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Audit Control</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Audit Control action</primary></indexterm><literal>Audit
Control</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary><filename>/etc/security/audit_control</filename> file</primary></indexterm><indexterm><primary>files</primary><secondary><filename>/etc/security/audit_control</filename></secondary></indexterm><indexterm><primary><filename>audit_control</filename> file</primary><secondary>action for editing</secondary></indexterm>Edits the <filename>audit_control</filename> file. See <olink targetdoc="group-refman" targetptr="audit-control-4" remap="external"><citerefentry><refentrytitle>audit_control</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Audit Control</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Audit Events action</primary></indexterm><literal>Audit
Events</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary><filename>/etc/security/audit_event</filename> file</primary></indexterm><indexterm><primary>files</primary><secondary><filename>/etc/security/audit_event</filename></secondary></indexterm><indexterm><primary><filename>audit_event</filename> file</primary></indexterm>Edits the <filename>audit_event</filename> file. See <olink targetdoc="group-refman" targetptr="audit-event-4" remap="external"><citerefentry><refentrytitle>audit_event</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Audit Control</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Audit Startup action</primary></indexterm><literal>Audit
Startup</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary><filename>/etc/security/audit_startup</filename> file</primary></indexterm><indexterm><primary>files</primary><secondary><filename>/etc/security/audit_startup</filename></secondary></indexterm><indexterm><primary><command>audit_startup</command> command</primary><secondary>action for editing</secondary></indexterm>Edits the <filename>audit_startup.sh</filename> script. See <olink targetdoc="group-refman" targetptr="audit-startup-1m" remap="external"><citerefentry><refentrytitle>audit_startup</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Audit Control</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Check Encodings action</primary></indexterm><literal>Check
Encodings</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary><command>chk_encodings</command> command</primary><secondary>action for invoking</secondary></indexterm>Runs the <command>chk_encodings</command> command on specified encodings file. See <olink targetdoc="group-refman" targetptr="chk-encodings-1m" remap="external"><citerefentry><refentrytitle>chk_encodings</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Object Label Management</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Check TN Files action</primary></indexterm><literal>Check
TN Files</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary>network databases</primary><secondary>action for checking</secondary></indexterm><indexterm><primary><command>tnchkdb</command> command</primary><secondary>action for checking</secondary></indexterm><indexterm><primary><filename>tnrhdb</filename> database</primary><secondary>action for checking</secondary></indexterm><indexterm><primary><filename>tnrhtp</filename> database</primary><secondary>action for checking</secondary></indexterm>Runs the <command>tnchkdb</command> command on <filename>tnrhdb</filename>, <filename>tnrhtp</filename>,
and <filename>tnzonecfg</filename> databases. See <olink targetdoc="group-refman" targetptr="tnchkdb-1m" remap="external"><citerefentry><refentrytitle>tnchkdb</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Network Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Configure Selection Confirmation action</primary></indexterm><literal>Configure Selection Confirmation</literal>  </para>
</entry><entry><para><indexterm><primary>files</primary><secondary><filename>/usr/dt/config/sel_config</filename></secondary></indexterm><indexterm><primary><filename>sel_config</filename> file</primary><secondary>action for editing</secondary></indexterm>Edits <filename>/usr/dt/config/sel_config</filename> file. See <olink targetdoc="group-refman" targetptr="sel-config-4" remap="external"><citerefentry><refentrytitle>sel_config</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink>.</para>
</entry><entry><para>Object Label Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Create LDAP Client action</primary></indexterm><literal>Create LDAP Client</literal></para>
</entry><entry><para><indexterm><primary>LDAP</primary><secondary>action for creating global zone clients</secondary></indexterm>Makes the global zone an LDAP client of
an existing LDAP directory service.</para>
</entry><entry><para>Information Security</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Edit Encodings action</primary></indexterm><literal>Edit
Encodings</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary>files</primary><secondary><filename>/etc/security/tsol/label_encodings</filename></secondary></indexterm><indexterm><primary><filename>label_encodings</filename> file</primary><secondary>action for editing and checking</secondary></indexterm>Edits
the specified <filename>label_encodings</filename> file and runs the <command>chk_encodings</command> command. See <olink targetdoc="group-refman" targetptr="chk-encodings-1m" remap="external"><citerefentry><refentrytitle>chk_encodings</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Object Label Management</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Name Service Switch action</primary></indexterm><literal>Name Service Switch</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary><filename>/etc/nsswitch.conf</filename> file</primary></indexterm><indexterm><primary>files</primary><secondary><filename>/etc/nsswitch.conf</filename></secondary></indexterm><indexterm><primary><filename>nsswitch.conf</filename> file</primary><secondary>action for editing</secondary></indexterm>Edits the <filename>nsswitch.conf</filename> file. See <olink targetdoc="group-refman" targetptr="nsswitch.conf-4" remap="external"><citerefentry><refentrytitle>nsswitch.conf</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Network Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Set DNS Servers action</primary></indexterm><literal>Set
DNS Servers</literal></para>
</entry><entry><para><indexterm><primary><filename>/etc/resolv.conf</filename> file</primary></indexterm><indexterm><primary>files</primary><secondary><filename>/etc/resolv.conf</filename></secondary></indexterm><indexterm><primary><filename>resolv.conf</filename> file</primary><secondary>action for editing</secondary></indexterm>Edits the <filename>resolv.conf</filename> file. See <olink targetdoc="group-refman" targetptr="resolv.conf-4" remap="external"><citerefentry><refentrytitle>resolv.conf</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink>.</para>
</entry><entry><para>Network Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Set Daily Message action</primary></indexterm><literal>Set Daily Message</literal></para>
</entry><entry><para><indexterm><primary>files</primary><secondary><filename>/etc/motd</filename></secondary></indexterm><indexterm><primary><filename>/etc/motd</filename> file</primary><secondary>action for editing</secondary></indexterm><indexterm><primary><filename>motd</filename> file</primary><secondary>action for editing</secondary></indexterm>Edits the <filename>/etc/motd</filename> file. At login, the contents
of this file display in the Last Login dialog box.</para>
</entry><entry><para>Network Management</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Set Default Routes action</primary></indexterm><literal>Set Default Routes</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary>trusted network</primary><secondary>action for setting default routes</secondary></indexterm>Specifies default static routes.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Network Management</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Share Filesystems action</primary></indexterm><literal>Share Filesystem</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary><filename>/etc/dfs/dfstab</filename> file</primary></indexterm><indexterm><primary>files</primary><secondary><filename>/etc/dfs/dfstab</filename></secondary></indexterm><indexterm><primary><filename>dfstab</filename> file</primary><secondary>action for editing</secondary></indexterm>Edits the <filename>dfstab</filename> file. Does not run the <command>share</command> command.
See <olink targetdoc="group-refman" targetptr="dfstab-4" remap="external"><citerefentry><refentrytitle>dfstab</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink>.</para>
</entry><entry colname="column3" align="left" valign="top"><para>File System Management</para>
</entry>
</row>
</tbody>
</tgroup>
</table><para>The following actions are used by the initial setup team during zone
creation. Some of these actions can be used for maintenance and troubleshooting.</para><table frame="topbot" pgwide="1" id="txtool-tbl-3"><title>Installation Actions
in Trusted CDE, Their Purpose, and Associated Rights Profiles</title><tgroup cols="3" colsep="0" rowsep="0"><colspec colnum="1" colname="column1" colwidth="3.52*"/><colspec colnum="2" colname="column2" colwidth="6.69*"/><colspec colnum="3" colname="column3" colwidth="2.83*"/><thead><row rowsep="1"><entry colname="column1" align="left" valign="bottom"><para>Action Name</para>
</entry><entry colname="column2" align="left" valign="bottom"><para>Purpose of Action</para>
</entry><entry colname="column3" align="left" valign="bottom"><para>Default Rights Profile</para>
</entry>
</row>
</thead><tbody><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Clone Zone action</primary></indexterm><literal>Clone
Zone</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary>zones</primary><secondary>action for cloning</secondary></indexterm>Creates a labeled zone from a ZFS snapshot of an existing zone.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Zone Management</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary>Copy Zone action</primary></indexterm><literal>Copy
Zone</literal></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary>zones</primary><secondary>action for copying</secondary></indexterm>Creates a labeled zone from an existing zone.</para>
</entry><entry colname="column3" align="left" valign="top"><para>Zone Management</para>
</entry>
</row><row><entry colname="column1"><para><indexterm><primary>Configure Zone action</primary></indexterm><literal>Configure
Zone</literal></para>
</entry><entry colname="column2"><para><indexterm><primary>zones</primary><secondary>action for configuring</secondary></indexterm>Associates a label with a zone name.</para>
</entry><entry colname="column3" align="left"><para>Zone Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Initialize Zone for LDAP action</primary></indexterm><literal>Initialize Zone for LDAP</literal></para>
</entry><entry><para><indexterm><primary>zones</primary><secondary>action for initializing</secondary></indexterm>Initializes the zone for booting as an LDAP client.</para>
</entry><entry align="left"><para>Zone Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Install Zone action</primary></indexterm><literal>Install
Zone</literal></para>
</entry><entry><para><indexterm><primary>zones</primary><secondary>action for installing</secondary></indexterm>Installs the system files that a labeled zone requires.</para>
</entry><entry align="left"><para>Zone Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Restart Zone action</primary></indexterm><literal>Restart
Zone</literal></para>
</entry><entry><para><indexterm><primary>zones</primary><secondary>action for restarting</secondary></indexterm>Restarts a zone that has already been booted.</para>
</entry><entry align="left"><para>Zone Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Share Logical Interface action</primary></indexterm><literal>Share Logical Interface</literal></para>
</entry><entry><para><indexterm><primary>zones</primary><secondary>action for sharing logical interface</secondary></indexterm>Sets up one interface for the global zone
and a separate interface for the labeled zones to share.</para>
</entry><entry><para>Network Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Share Physical Interface action</primary></indexterm><literal>Share Physical Interface</literal></para>
</entry><entry><para><indexterm><primary>zones</primary><secondary>action for sharing physical interface</secondary></indexterm>Sets up one interface that is shared by the
global zone and the labeled zones.</para>
</entry><entry><para>Network Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Shut Down Zone action</primary></indexterm><literal>Shut
Down Zone</literal></para>
</entry><entry><para><indexterm><primary>zones</primary><secondary>action for shutting down</secondary></indexterm>Shuts down an installed zone.</para>
</entry><entry align="left"><para>Zone Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Start Zone action</primary></indexterm><literal>Start
Zone</literal></para>
</entry><entry><para><indexterm><primary>zones</primary><secondary>action for starting</secondary></indexterm>Boots an installed zone and starts the services for that zone.</para>
</entry><entry align="left"><para>Zone Management</para>
</entry>
</row><row><entry><para><indexterm><primary>Zone Terminal Console action</primary></indexterm><literal>Zone Terminal Console</literal></para>
</entry><entry><para><indexterm><primary>zones</primary><secondary>action for viewing from console</secondary></indexterm>Opens a console to view processes in an installed
zone.</para>
</entry><entry align="left"><para>Zone Management</para>
</entry>
</row>
</tbody>
</tgroup>
</table>
</sect1><sect1 id="txintro-24"><title>Device Allocation Manager</title><indexterm><primary>devices</primary><secondary>protecting</secondary>
</indexterm><indexterm><primary>protecting</primary><secondary>devices</secondary>
</indexterm><indexterm><primary>administrative tools</primary><secondary>Device Allocation Manager</secondary>
</indexterm><para>A <firstterm>device</firstterm> is either a physical peripheral that
is connected to a computer or a software-simulated device called a <emphasis>pseudo-device</emphasis>. Because devices provide a means for the import and export of
data to and from a system, devices must be controlled to properly protect
the data. Trusted Extensions uses device allocation and device label ranges to
control data flowing through devices.</para><para>Examples of devices that have label ranges are frame buffers, tape drives,
diskette and CD-ROM drives, printers, and USB devices.</para><para>Users allocate devices through the Device Allocation Manager. The Device
Allocation Manager mounts the device, runs a clean script to prepare the device,
and performs the allocation. When finished, the user deallocates the device
through the Device Allocation Manager, which runs another clean script, and
unmounts and deallocates the device.</para><figure id="txtool-fig-43"><title>Device Allocation Manager Icon in Trusted CDE</title><mediaobject><imageobject><imagedata entityref="DevAlloc.epsi"/>
</imageobject><textobject><simpara>Shows the Device Allocation Manager icon.</simpara>
</textobject>
</mediaobject>
</figure><para>You can manage devices by using the Device Administration tool from
the Device Allocation Manager. Regular users cannot access the Device Administration
tool.</para><note><para>In Solaris Trusted Extensions (JDS), this GUI is named Device Manager, and the Device Administration
button is named Administration.</para>
</note><figure id="txtool-fig-3"><title>Device Allocation Manager GUI</title><mediaobject><imageobject><imagedata entityref="devmgr.tiff"/>
</imageobject><textobject><simpara>Dialog box titled Device Allocation Manager shows the
devices that are available to a user, and the Device Administration button.</simpara>
</textobject>
</mediaobject>
</figure><para>For more information about device protection in Trusted Extensions, see <olink targetptr="managedev-1" remap="internal">Chapter&nbsp;23, Managing Devices for Trusted Extensions (Tasks)</olink>.</para>
</sect1><sect1 id="txtool-8"><title>Solaris Management Console Tools</title><indexterm><primary>Solaris Management Console</primary><secondary>description of tools and toolboxes</secondary>
</indexterm><indexterm><primary>administrative tools</primary><secondary>Solaris Management Console</secondary>
</indexterm><para>The Solaris Management Console provides access to toolboxes of GUI-based administration tools.
These tools enable you to edit items in various configuration databases. In Trusted Extensions,
the Solaris Management Console is the administrative interface for users, roles, and the trusted
network databases.</para><itemizedlist><para>Trusted Extensions extends the Solaris Management Console:</para><listitem><para>Trusted Extensions modifies the Solaris Management Console Users tool set. For an introduction
to the tool set, see <olink targetdoc="group-sa" targetptr="smcover-1" remap="external">Chapter 2, <citetitle remap="chapter">Working With the Solaris Management Console (Tasks),</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>.</para>
</listitem><listitem><para>Trusted Extensions adds the Security Templates tool and the Trusted
Network Zones tool to the Computers and Networks tool set.</para>
</listitem>
</itemizedlist><para><indexterm><primary>Solaris Management Console</primary><secondary>toolboxes</secondary></indexterm><indexterm><primary>toolboxes</primary><secondary>defined</secondary></indexterm>Solaris Management Console tools are collected into <firstterm>toolboxes</firstterm> according
to scope and security policy. To administer Trusted Extensions, Trusted Extensions provides
toolboxes whose <literal>Policy=TSOL</literal>. You can access tools according
to scope, that is, according to naming service. The available scopes are local
host and LDAP.</para><para>The Solaris Management Console is shown in the following figure. A <literal>Scope=Files</literal> Trusted Extensions toolbox
is  loaded, and the Users tool set is open.</para><figure id="txtool-fig-1"><title>Typical Trusted Extensions Toolbox in the Solaris Management Console</title><mediaobject><imageobject><imagedata entityref="smcusers.tiff"/>
</imageobject><textobject><simpara>The context describes the graphic.</simpara>
</textobject>
</mediaobject>
</figure><sect2 id="txtool-2"><title>Trusted Extensions Tools in the Solaris Management Console</title><itemizedlist><para><indexterm><primary>User Accounts tool</primary></indexterm><indexterm><primary>Administrative Roles tool</primary></indexterm><indexterm><primary>Rights tool</primary></indexterm>Trusted Extensions adds configurable security attributes
to three tools:</para><listitem><para><emphasis role="strong">User Accounts tool &ndash;</emphasis> Is
the administrative interface to change a user's label, change a user's view
of labels, and to control account usage.</para>
</listitem><listitem><para><emphasis role="strong">Administrative Roles tool &ndash;</emphasis> Is
the administrative interface to change a role's label range and screen-locking
behavior when idle.</para>
</listitem><listitem><para><emphasis role="strong">Rights tool &ndash;</emphasis> Includes
CDE actions that can be assigned to rights profiles. Security attributes can
be assigned to these actions.</para>
</listitem>
</itemizedlist><itemizedlist><para><indexterm><primary>Trusted Network tools</primary><secondary>description</secondary></indexterm><indexterm><primary>Computers and Networks tool set</primary></indexterm><indexterm><primary>Security Templates tool</primary></indexterm><indexterm><primary>Trusted Network Zones tool</primary><secondary>description</secondary></indexterm>Trusted Extensions adds two tools to the Computers and Networks tool
set:</para><listitem><para><emphasis role="strong">Security Templates tool &ndash;</emphasis> Is
the administrative interface for managing the label aspects of hosts and networks.
This tool modifies the <filename>tnrhtp</filename> and <filename>tnrhdb</filename> databases,
enforces syntactic accuracy, and updates the kernel with the changes.</para>
</listitem><listitem><para><emphasis role="strong">Trusted Network Zones tool &ndash;</emphasis> Is
the administrative interface for managing the label aspects of  zones. This
tool modifies the <filename>tnzonecfg</filename> database, enforces syntactic
 accuracy, and updates the kernel with the changes.</para>
</listitem>
</itemizedlist><para><olink targetptr="txtool-fig-2" remap="internal">Figure&nbsp;8&ndash;4</olink> shows
the Files toolbox with the Computers and Networks tool set highlighted. The Trusted Extensions tools
appear below the tool set.</para><figure id="txtool-fig-2"><title>Computers and Networks Tool Set in the Solaris Management Console</title><mediaobject><imageobject><imagedata entityref="smc.navig.titlebar.tiff"/>
</imageobject><textobject><simpara>Window shows icons for the Computers and Networks tool.
The icons are for Computers, Security Templates, and the networks 127,10,
and 192.168.</simpara>
</textobject>
</mediaobject>
</figure><sect3 id="txtool-11"><title>Security Templates Tool</title><indexterm><primary>Solaris Management Console</primary><secondary>Security Templates tool</secondary>
</indexterm><indexterm><primary>Security Templates tool</primary>
</indexterm><indexterm><primary>remote host templates</primary><secondary>tool for administering</secondary>
</indexterm><indexterm><primary><filename>tnrhdb</filename> database</primary><secondary>tool for administering</secondary>
</indexterm><indexterm><primary><filename>tnrhtp</filename> database</primary><secondary>tool for administering</secondary>
</indexterm><para>A <firstterm>security template</firstterm> describes a set of security
attributes that can be assigned to a group of hosts. The Security Templates
tool enables you to conveniently assign a specific combination of security
attributes to a group of hosts. These attributes control how data is packaged,
transmitted, and interpreted. Hosts that are assigned to a template have identical
security settings.</para><itemizedlist><para>The hosts are defined in the Computers tool. The security attributes
of the hosts are assigned in the Security Templates tool. The Modify Template
dialog box contains two tabs:</para><listitem><para><emphasis role="strong">General tab &ndash;</emphasis> Describes
the template. Includes its name, host type, default label, domain of interpretation
(DOI), accreditation range, and set of discrete sensitivity labels.</para>
</listitem><listitem><para><emphasis role="strong">Hosts Assigned to Template tab &ndash;</emphasis> Lists
all the hosts on the network that you have assigned to this template.</para>
</listitem>
</itemizedlist><para>Trusted networking and security templates are explained in more detail
in <olink targetptr="txnet-1" remap="internal">Chapter&nbsp;18, Trusted Networking (Overview)</olink>.</para>
</sect3><sect3 id="txtool-14"><title>Trusted Network Zones Tool</title><indexterm><primary>Solaris Management Console</primary><secondary>Trusted Network Zones tool</secondary>
</indexterm><indexterm><primary>Trusted Network Zones tool</primary><secondary>description</secondary>
</indexterm><indexterm><primary>zones</primary><secondary>tool for labeling</secondary>
</indexterm><para>The Trusted Network Zones tool identifies the zones on your system.
Initially, the global zone is listed. When you add zones and their labels,
the zone names display in the pane. Zone creation usually occurs during system
configuration. Label assignment, multilevel port configuration, and label
policy is configured in this tool. For details, see <olink targetptr="managezones-1" remap="internal">Chapter&nbsp;16, Managing Zones in Trusted Extensions (Tasks)</olink>.</para>
</sect3>
</sect2><sect2 id="txtool-16"><title>Client-Server Communication With the Solaris Management Console</title><para>Typically, a Solaris Management Console client  administers systems <emphasis>remotely</emphasis>.
On a network that uses LDAP as a naming service, a Solaris Management Console client connects to
the Solaris Management Console server that runs on the LDAP server. The following figure shows
this configuration.</para><figure id="txtool-fig-40"><title>Solaris Management Console Client Using an LDAP Server to Administer
the Network</title><mediaobject><imageobject><imagedata entityref="SMCclient.ldap"/>
</imageobject><textobject><simpara>Solaris Management Console client talking to an LDAP
server that is running a Solaris Management Console server.</simpara>
</textobject>
</mediaobject>
</figure><para><olink targetptr="txtool-fig-42" remap="internal">Figure&nbsp;8&ndash;6</olink> shows
a network that is not configured with an LDAP server. The administrator configured
each remote system with a Solaris Management Console server.</para><figure id="txtool-fig-42"><title>Solaris Management Console Client Administering Individual Remote
Systems on a Network</title><mediaobject><imageobject><imagedata entityref="SMCclient.remotes"/>
</imageobject><textobject><simpara>Solaris Management Console client talking to several
remote systems. Each system is running a Solaris Management Console server.</simpara>
</textobject>
</mediaobject>
</figure>
</sect2><sect2 id="txtool-9"><title>Solaris Management Console Documentation</title><para>The main source of documentation for the Solaris Management Console is its online help. Context-sensitive
help is tied to the currently selected feature and is displayed in the information
pane. Expanded help topics are available from the Help menu or by clicking
links in the context-sensitive help. Further information is provided in <olink targetdoc="group-sa" targetptr="smcover-1" remap="external">Chapter 2, <citetitle remap="chapter">Working With the Solaris Management Console (Tasks),</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>.
Also see <olink targetdoc="group-sa" targetptr="smcover-95" remap="external"><citetitle remap="section">Using the Solaris Management Tools With RBAC (Task Map)</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>.</para>
</sect2>
</sect1><sect1 id="txtool-5"><title>Label Builder in Trusted Extensions</title><indexterm><primary>administrative tools</primary><secondary>label builder</secondary>
</indexterm><para>The
label builder GUI enforces your choice of a valid label or clearance when
a program requires you to assign a label. For example, a label builder appears
during login (see <olink targetdoc="trssug" targetptr="uglog-1" remap="external">Chapter 2, <citetitle remap="chapter">Logging In to Trusted Extensions (Tasks),</citetitle> in <citetitle remap="book">Solaris Trusted Extensions User&rsquo;s Guide</citetitle></olink>).
The label builder also appears when you change the label of a workspace, or
when you assign a label to a user, zone, or network interface in the Solaris Management Console.
The following label builder appears when you assign a label range to a new
device.</para><mediaobject><imageobject><imagedata entityref="devlabel.tiff"/>
</imageobject><textobject><simpara>Label builder titled Device Allocation Set Minimum Label
shows the labels that can be chosen as the minimum label for a device.</simpara>
</textobject>
</mediaobject><para>In the label builder,  component names in the Classification column
correspond to the <literal>CLASSIFICATIONS</literal> section in the <filename>label_encodings</filename> file. The component names in the Sensitivity column correspond
to the <literal>WORDS</literal> section in the <filename>label_encodings</filename> file.</para>
</sect1><sect1 id="txtool-4"><title>Command Line Tools in Trusted Extensions</title><indexterm><primary>administrative tools</primary><secondary>commands</secondary>
</indexterm><para>Commands that are unique to Trusted Extensions are contained in the  <citetitle>Solaris Trusted Extensions Reference
Manual</citetitle>. The Solaris commands that Trusted Extensions modifies
are contained in the <citetitle>Solaris Reference Manual</citetitle>.
The <command>man</command> command finds all the commands.</para><para>The following table lists commands that are unique to Trusted Extensions.
The commands are listed in man page format.</para><table frame="topbot" pgwide="1" id="txtool-tbl-4"><title>User and Administrative Trusted Extensions Commands</title><tgroup cols="3" colsep="0" rowsep="0"><colspec colnum="1" colname="column1" colwidth="3.11*"/><colspec colnum="2" colname="column2" colwidth="5.58*"/><colspec colnum="3" colname="column3" colwidth="4.33*"/><thead><row rowsep="1"><entry colname="column1" align="left" valign="bottom"><para>Man Page</para>
</entry><entry colname="column2" align="left" valign="bottom"><para>Trusted Extensions Modification</para>
</entry><entry colname="column3" align="left" valign="bottom"><para>For More Information</para>
</entry>
</row>
</thead><tbody><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary><command>add_allocatable</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="add-allocatable-1m" remap="external"><citerefentry><refentrytitle>add_allocatable</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry colname="column2" align="left" valign="top"><para>Enables a device to be allocated by adding the device to device allocation
databases. By default, removable devices are allocatable.</para>
</entry><entry colname="column3" align="left" valign="top"><para><olink targetptr="managedev-53" remap="internal">How to Configure a Device in Trusted
Extensions</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>atohexlabel</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="atohexlabel-1m" remap="external"><citerefentry><refentrytitle>atohexlabel</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Translates a label into hexadecimal format.</para>
</entry><entry><para><olink targetptr="commontasks-23" remap="internal">How to Obtain the Hexadecimal Equivalent
for a Label</olink></para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary><command>chk_encodings</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="chk-encodings-1m" remap="external"><citerefentry><refentrytitle>chk_encodings</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry colname="column2" align="left" valign="top"><para>Checks the integrity of the <filename>label_encodings</filename> file.</para>
</entry><entry colname="column3" align="left" valign="top"><para><olink targetdoc="trsollbladmin" targetptr="modifyenc-12" remap="external"><citetitle remap="section">How to Debug a label_encodings File</citetitle> in <citetitle remap="book">Solaris Trusted Extensions Label Administration</citetitle></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>dtappsession</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="dtappsession-1" remap="external"><citerefentry><refentrytitle>dtappsession</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Opens a remote Trusted CDE session by using the Application Manager.</para>
</entry><entry><para><olink targetptr="remotead-1" remap="internal">Chapter&nbsp;14, Remote Administration in Trusted Extensions (Tasks)</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>getlabel</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="getlabel-1" remap="external"><citerefentry><refentrytitle>getlabel</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Displays the label of the selected files or directories.</para>
</entry><entry><para><olink targetptr="managetnet-11" remap="internal">How to Display the Labels of Mounted
Files</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>getzonepath</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="getzonepath-1" remap="external"><citerefentry><refentrytitle>getzonepath</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Displays the full pathname of a specific zone.</para>
</entry><entry><para><olink targetdoc="trsoldev" targetptr="labelapi-31" remap="external"><citetitle remap="section">Acquiring a Sensitivity Label</citetitle> in <citetitle remap="book">Solaris Trusted Extensions Developer&rsquo;s Guide</citetitle></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>hextoalabel</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="hextoalabel-1m" remap="external"><citerefentry><refentrytitle>hextoalabel</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Translates a hexadecimal label into its readable equivalent.</para>
</entry><entry><para><olink targetptr="commontasks-46" remap="internal">How to Obtain a Readable Label From
Its Hexadecimal Form</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>plabel</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="plabel-1" remap="external"><citerefentry><refentrytitle>plabel</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Displays the label of the current process.</para>
</entry><entry><para>See the man page.</para>
</entry>
</row><row><entry><para><indexterm><primary><command>remove_allocatable</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="remove-allocatable-1m" remap="external"><citerefentry><refentrytitle>remove_allocatable</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Prevents allocation of a device by removing its entry from device allocation
databases.</para>
</entry><entry><para><olink targetptr="managedev-53" remap="internal">How to Configure a Device in Trusted
Extensions</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>setlabel</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="setlabel-1" remap="external"><citerefentry><refentrytitle>setlabel</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Relabels the selected item. Requires the <constant>solaris.label.file.downgrade</constant> or  <constant>solaris.label.file.upgrade</constant> authorization.
These authorizations are in the Object Label Management rights profile.</para>
</entry><entry><para>For the equivalent GUI procedure, see <olink targetdoc="trssug" targetptr="ugtour-23" remap="external"><citetitle remap="section">How to Move Files Between Labels in Trusted CDE</citetitle> in <citetitle remap="book">Solaris Trusted Extensions User&rsquo;s Guide</citetitle></olink>.</para>
</entry>
</row><row><entry><para><indexterm><primary><command>smtnrhdb</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="smtnrhdb-1m" remap="external"><citerefentry><refentrytitle>smtnrhdb</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Manages entries in the <filename>tnrhdb</filename> database locally
or in a naming service database.</para>
</entry><entry><para>For equivalent procedures that use the Solaris Management Console, see <olink targetptr="managetnet-3" remap="internal">Configuring Trusted Network Databases (Task Map)</olink>.</para>
</entry>
</row><row><entry><para><indexterm><primary><command>smtnrhtp</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="smtnrhtp-1m" remap="external"><citerefentry><refentrytitle>smtnrhtp</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Manages entries in the <filename>tnrhtp</filename> database locally
or in a naming service database.</para>
</entry><entry><para>See the man page.</para>
</entry>
</row><row><entry><para><indexterm><primary><command>smtnzonecfg</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="smtnzonecfg-1m" remap="external"><citerefentry><refentrytitle>smtnzonecfg</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Manages entries in the local <filename>tnzonecfg</filename> database.</para>
</entry><entry><para>For an equivalent procedure that uses the Solaris Management Console, see <olink targetptr="managezones-5" remap="internal">How to Create a Multilevel Port for a Zone</olink>.</para>
</entry>
</row><row><entry><para><indexterm><primary><command>tnchkdb</command> command</primary><secondary>summary</secondary></indexterm><olink targetdoc="group-refman" targetptr="tnchkdb-1m" remap="external"><citerefentry><refentrytitle>tnchkdb</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Checks the integrity of the <filename>tnrhdb</filename> and <filename>tnrhtp</filename> databases.</para>
</entry><entry><para><olink targetptr="managetnet-32" remap="internal">How to Check the Syntax of Trusted
Network Databases</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>tnctl</command> command</primary><secondary>summary</secondary></indexterm><olink targetdoc="group-refman" targetptr="tnctl-1m" remap="external"><citerefentry><refentrytitle>tnctl</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Caches network information in the kernel.</para>
</entry><entry><para><olink targetptr="managetnet-36" remap="internal">How to Synchronize the Kernel Cache
With Trusted Network Databases</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>tnd</command> command</primary><secondary>summary</secondary></indexterm><olink targetdoc="group-refman" targetptr="tnd-1m" remap="external"><citerefentry><refentrytitle>tnd</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Executes the trusted network daemon.</para>
</entry><entry><para><olink targetptr="managetnet-36" remap="internal">How to Synchronize the Kernel Cache
With Trusted Network Databases</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>tninfo</command> command</primary><secondary>summary</secondary></indexterm><olink targetdoc="group-refman" targetptr="tninfo-1m" remap="external"><citerefentry><refentrytitle>tninfo</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Displays kernel-level network information and statistics.</para>
</entry><entry><para><olink targetptr="managetnet-34" remap="internal">How to Compare Trusted Network Database
Information With the Kernel Cache</olink>.</para>
</entry>
</row><row><entry colname="column1" align="left" valign="top"><para><indexterm><primary><command>updatehome</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="updatehome-1m" remap="external"><citerefentry><refentrytitle>updatehome</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry colname="column2" align="left" valign="top"><para><indexterm><primary><filename>.copy_files</filename> file</primary><secondary>startup file</secondary></indexterm><indexterm><primary>files</primary><secondary><filename>.copy_files</filename></secondary></indexterm><indexterm><primary><filename>.link_files</filename> file</primary><secondary>startup file</secondary></indexterm><indexterm><primary>files</primary><secondary><filename>.link_files</filename></secondary></indexterm>Updates <filename>.copy_files</filename> and <filename>.link_files</filename> for the current label.</para>
</entry><entry colname="column3" align="left" valign="top"><para><olink targetptr="manageusers-11" remap="internal">How to Configure Startup Files for
Users in Trusted Extensions</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</table><para>The following table lists Solaris commands that are modified or
extended by Trusted Extensions. The commands are listed in man page format.</para><table frame="topbot" pgwide="1" id="txtool-tbl-5"><title>User and Administrative
Commands That Trusted Extensions Modifies</title><tgroup cols="3" colsep="0" rowsep="0"><colspec colnum="1" colname="column1" colwidth="3.20*"/><colspec colnum="2" colname="column2" colwidth="5.54*"/><colspec colnum="3" colname="column3" colwidth="4.27*"/><thead><row rowsep="1"><entry colname="column1" align="left" valign="bottom"><para>Man Page</para>
</entry><entry colname="column2" align="left" valign="bottom"><para>Purpose of Command</para>
</entry><entry colname="column3" align="left" valign="bottom"><para>For More Information</para>
</entry>
</row>
</thead><tbody><row><entry><para><indexterm><primary><command>allocate</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="allocate-1" remap="external"><citerefentry><refentrytitle>allocate</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds options to clean the allocated device, and to allocate a device
to a specific zone. In Trusted Extensions, regular users do not use this command.</para>
</entry><entry><para><olink targetdoc="trssug" targetptr="ugelem-27" remap="external"><citetitle remap="section">How to Allocate a Device in Trusted Extensions</citetitle> in <citetitle remap="book">Solaris Trusted Extensions User&rsquo;s Guide</citetitle></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>deallocate</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="deallocate-1" remap="external"><citerefentry><refentrytitle>deallocate</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds options to clean the device, and to deallocate a device from a
specific zone. In Trusted Extensions, regular users do not use this command.</para>
</entry><entry><para><olink targetdoc="trssug" targetptr="ugelem-27" remap="external"><citetitle remap="section">How to Allocate a Device in Trusted Extensions</citetitle> in <citetitle remap="book">Solaris Trusted Extensions User&rsquo;s Guide</citetitle></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>list_devices</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="list-devices-1" remap="external"><citerefentry><refentrytitle>list_devices</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds the <option>a</option> option to display device attributes, such
as authorizations and labels. Adds the <option>d</option> option to display
the default attributes of an allocated device type. Adds the <option>z</option> option
to display available devices that can be allocated to a labeled zone.</para>
</entry><entry><para>See the man page.</para>
</entry>
</row><row><entry><para><indexterm><primary><command>tar</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="tar-1" remap="external"><citerefentry><refentrytitle>tar</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds the <option>T</option> option to archive and extract files and
directories that are labeled.</para>
</entry><entry><para><olink targetptr="managefiles-13" remap="internal">How to Back Up Files in Trusted Extensions</olink> and <olink targetptr="managefiles-14" remap="internal">How to Restore Files in Trusted
Extensions</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>auditconfig</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="auditconfig-1m" remap="external"><citerefentry><refentrytitle>auditconfig</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds the <literal>windata_down</literal> and <literal>windata_up</literal> audit
policy options.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-18" remap="external"><citetitle remap="section">How to Configure Audit Policy</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>auditreduce</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="auditreduce-1m" remap="external"><citerefentry><refentrytitle>auditreduce</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds the <option>l</option> option to select audit records by label.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="audittask-24" remap="external"><citetitle remap="section">How to Select Audit Events From the Audit Trail</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>automount</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="automount-1m" remap="external"><citerefentry><refentrytitle>automount</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Modifies the names and contents of <filename>auto_home</filename> maps
to account for zone names and zone visibility from higher labels.</para>
</entry><entry><para><olink targetptr="managefiles-19" remap="internal">Changes to the Automounter in Trusted
Extensions</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>ifconfig</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="ifconfig-1m" remap="external"><citerefentry><refentrytitle>ifconfig</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds the <option role="nodash">all-zones</option> option to make an
interface available to every zone on the system.</para>
</entry><entry><para><olink targetptr="txconf-10" remap="internal">How to Verify That a Host's Interfaces
Are Up</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>netstat</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="netstat-1m" remap="external"><citerefentry><refentrytitle>netstat</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds the <option>R</option> option to display extended security attributes
for sockets and routing table entries.</para>
</entry><entry><para><olink targetptr="managetnet-19" remap="internal">How to Debug the Trusted Extensions
Network</olink></para>
</entry>
</row><row><entry><para><indexterm><primary><command>route</command> command</primary></indexterm><olink targetdoc="group-refman" targetptr="route-1m" remap="external"><citerefentry><refentrytitle>route</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink></para>
</entry><entry><para>Adds the <option>secattr</option> option to display the security attributes
of the route: <literal>cipso</literal>, <literal>doi</literal>, <literal>max_sl</literal>,
and <literal>min_sl</literal>.</para>
</entry><entry><para><olink targetptr="managetnet-4" remap="internal">How to Configure Routes With Security
Attributes</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</table>
</sect1><sect1 id="txtool-12"><title>Remote Administration in Trusted Extensions</title><para>You can remotely administer a system that is configured with Trusted Extensions by
using the <command>ssh</command> command, the <command>dtappsession</command> program,
or the Solaris Management Console. If site security policy permits, you can configure a Trusted Extensions host
to enable login from a non-Trusted Extensions host, although this configuration
is  less secure. For more information, see <olink targetptr="remotead-1" remap="internal">Chapter&nbsp;14, Remote Administration in Trusted Extensions (Tasks)</olink>.</para>
</sect1>
</chapter><?Pub *0000060753 0?>