Preface

Table of Contents

Who Should Use This Book
How the Solaris Trusted Extensions Books Are Organized
How This Book Is Organized
Documentation, Support, and Training
Typographic Conventions
Shell Prompts in Command Examples

Who Should Use This Book

This book is for security administrators. Security administrators are responsible for defining the organization's labels. Some security administrators are also responsible for implementing the labels. This book is for definers and implementers.

Note

Even though Trusted Extensions can be configured with no visible labels, labels are always being used. Labels provide mandatory access control (MAC), and MAC is always enforced. Therefore, the site's label_encodings file must be in place before any users or roles are created.

Trusted Extensions installs a default label_encodings file. The security administrator must provide a file that is appropriate for the site.

The security administrator who implements the labels should be familiar with Solaris administration. The necessary level of knowledge can be acquired through training and documentation. For details, see Documentation, Support, and Training.