Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

Solaris Trusted Extensions Administrator's Procedures
Previous Next

Administering Trusted Extensions Remotely (Task Map)

The following task map describes the tasks used to administer a remote Trusted Extensions system.

Task

Description

For Instructions

Enable root to remotely log in to a Trusted Extensions system.

Enables the root user to work remotely from a labeled system.

Enable Remote Login by root User in Trusted Extensions

Enable a role to remotely log in to a Trusted Extensions system.

Allows any role to work remotely from a labeled system.

Enable Remote Login by a Role in Trusted Extensions

Enable remote login from an unlabeled system to a Trusted Extensions system.

Allows any user or role to work remotely from an unlabeled system.

Enable Remote Login From an Unlabeled System

Log in remotely to a Trusted Extensions system.

Logs in as a role to a Trusted Extensions system.

How to Log In Remotely From the Command Line in Trusted Extensions

Administer a system remotely.

Uses the dtappsession command to administer the remote system with Trusted_Extensions actions.

How to Remotely Administer Trusted Extensions With dtappsession

From a Trusted Extensions system, uses the Solaris Management Console to administer the remote host.

How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System

From an unlabeled system, uses the Solaris Management Console to administer remote Trusted Extensions hosts.

How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System

Administer and use a remote system

From any client, uses the Xvnc server on the remote Trusted Extensions to display a multilevel session back to the client

How to Use Xvnc to Remotely Access a Trusted Extensions System

Enable specific users to log in to the global zone.

Uses user and network tools in the Solaris Management Console to enable specific users to access the global zone.

How to Enable Specific Users to Log In Remotely to the Global Zone in Trusted Extensions

How to Log In Remotely From the Command Line in Trusted Extensions


Note - The telnet command cannot be used for remote role assumption because this command cannot pass the primary and role identities to the pam_roles module.


Before You Begin

The user and the role must be identically defined on the local and the remote system.

The role must have the Remote Login authorization. By default, this authorization is in the Remote Administration, and the Maintenance and Repair rights profiles.

The security administrator has completed the procedure Enable Remote Login by a Role in Trusted Extensions on every system that can be remotely administered. If the system can be administered from an unlabeled system, the procedure Enable Remote Login From an Unlabeled System has also been completed.

  • From the workspace of a user who can assume a role, log in to the remote host.

    Use the rlogin command, the ssh command, or the ftp command.

    • If the rlogin -l or ssh command is used to log in, all commands that are in the role's rights profiles are available.

    • If the ftp command is used, see the ftp(1) man page for the commands that are available.

How to Remotely Administer Trusted Extensions With dtappsession

The dtappsession program enables an administrator to administer a remote system that is running CDE.

dtappsession is useful when a remote system does not have a monitor. For example, dtappsession is often used to administer domains on large servers. For more information, see the dtappsession(1) man page.

Before You Begin

On a labeled system, you must be in an administrative role in the global zone. On an unlabeled system, you must assume a role that is defined on the remote system. You must then run the remote login from the role's profile shell.

  1. (Optional) Create a workspace that is dedicated to the remote session.

    To avoid confusion between the remote CDE applications and any local applications, dedicate an administrative role workspace to this procedure. For details, see How to Add a Workspace at a Particular Label in Solaris Trusted Extensions User’s Guide.

  2. Log in to the remote host.

    You can use the rlogin command or the ssh command.

    $ ssh remote-host
  3. Start remote administration.

    In the terminal window, type the dtappsession command followed by the name of the local host.

    $ /usr/dt/bin/dtappsession local-host

    the Application Manager that is running on the remote host displays on the local host. Also, an Exit dialog box appears.

  4. Administer the remote host.

    If you invoked the remote session from Trusted CDE, you can use actions in the Trusted_Extensions folder.

  5. When finished, click the Exit button.
    Dialog box shows the name of a remote host and an Exit button.

    Caution - Closing the Application Manager does not end the login session and is not recommended.


  6. In the terminal window, exit the remote login session.

    And use the hostname command to verify that you are on your local host.

    $ exit
    $ hostname
    local-host

How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System

The Solaris Management Console provides a remote administration interface to manage users, rights, roles, and the network. You assume a role to use the Console. In this procedure, you run the Console on the local system and specify the remote system as the server.

Before You Begin

You have completed the following procedures:

  1. On the local system, log in as the user who is defined identically on the remote system.
  2. Assume the role that you plan to use to administer the system.
  3. In the role, start the Solaris Management Console.

    For details, see Initialize the Solaris Management Console Server in Trusted Extensions.

    1. In the Server dialog box, type the name of the remote server.
      • If you are using LDAP as a naming service, type the name of the LDAP server.

        Then, choose one of the following scopes.

        • To administer the databases in the naming service, choose the Scope=LDAP toolbox.
          This Computer (ldap-server: Scope=LDAP, Policy=TSOL)
        • To administer the local files on the LDAP server, choose the Scope=Files toolbox.
          This Computer (ldap-server: Scope=Files, Policy=TSOL)
      • If you are not using LDAP as a naming service, type the name of the remote system that you want to administer.

        Then, choose the Scope=Files toolbox.

        This Computer (remote-system: Scope=Files, Policy=TSOL)
  4. Select a tool under System Configuration.

    When you select a tool such as User, a dialog box displays the Solaris Management Console server name, your user name, your role name, and a place to type the role's password. Make sure that the entries are correct.

  5. In the role that is defined identically on the local and the remote systems, log in to the Solaris Management Console server.

    Type the role's password and press Login as Role. You can now use the Solaris Management Console to manage the system.


    Note - Although you can use the Solaris Management Console to run dtappsession, the simplest way to use dtappsession is described in How to Remotely Administer Trusted Extensions With dtappsession.


How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System

In this procedure, you run the Solaris Management Console client and server on the remote system, and display the Console on the local system.

Before You Begin

The Trusted Extensions system must have assigned the label ADMIN_LOW to the local system.


Note - A system that is not running the CIPSO protocol, such as a Trusted Solaris system, is an unlabeled system from the viewpoint of a Trusted Extensions system.


The Solaris Management Console server on the remote system must be configured to accept the remote connection. For the procedure, see Enable the Solaris Management Console to Accept Network Communications.

Both systems must have the same user who is assigned the same role that can use the Solaris Management Console. The user can have the normal user's label range, but the role must have the range from ADMIN_LOW to ADMIN_HIGH.

You must be in an administrative role in the global zone.

  1. Enable the local X server to display the remote Solaris Management Console.
    # xhost + TX-SMC-Server
    # echo $DISPLAY
    :n.n
  2. On the local system, become the user who can assume a role for the Solaris Management Console.
    # su - same-username-on-both-systems
  3. As that user, log in to the remote server as the role.
    $ rlogin -l same-rolename-on-both-systems TX-SMC-Server
  4. Make sure that the environment variables that the Solaris Management Console uses have the correct values.
    1. Set the value of the DISPLAY variable.
      $ DISPLAY=local:n.n
      $ export DISPLAY=local:n.n
    2. Set the value of the LOGNAME variable to the user name.
      $ LOGNAME=same-username-on-both-systems
      $ export LOGNAME=same-username-on-both-systems
    3. Set the value of the USER variable to the role name.
      $ USER=same-rolename-on-both-systems
      $ export USER=same-rolename-on-both-systems
  5. In the role, start the Solaris Management Console from the command line.
    $ /usr/sbin/smc &
  6. Select a tool under System Configuration.

    When you select a tool such as User, a dialog box displays the Solaris Management Console server name, your user name, your role name, and a place to type the role's password. Make sure that the entries are correct.

  7. As the role, log in to the server.

    Type the role's password and press Login as Role. You can now use the Solaris Management Console to manage the system.


    Note - When you try to access network database information from a system that is not the LDAP server, the operation fails. The Console allows you to log in to the remote host and open the toolbox. However, when you try to access or change information, the following error message indicates that you have selected Scope=LDAP on a system that is not the LDAP server:

    Management server cannot perform the operation requested.
    ...
    Error extracting the value-from-tool.
    The keys received from the client were machine, domain, Scope.
    Problem with Scope.

How to Enable Specific Users to Log In Remotely to the Global Zone in Trusted Extensions

The user's default label range and the zone's default behavior are changed to enable remote login by a non-role. You might want to complete this procedure for a tester who is using a remote labeled system. For security reasons, the tester's system should be running a disjoint label from other users.

Before You Begin

You must have a very good reason why this user can log in to the global zone.

You must be in the Security Administrator role in the global zone.

  1. To enable specific users to log in to the global zone, assign them an administrative label range.

    Use the Solaris Management Console to assign a clearance of ADMIN_HIGH and a minimum label of ADMIN_LOW to each user. For details, see How to Modify a User's Label Range in the Solaris Management Console.

    The user's labeled zones must also permit login.

  2. To enable remote login from a labeled zone into the global zone, do the following.
    1. Add a multilevel port for remote login to the global zone.

      Use the Solaris Management Console. Port 513 over the TCP protocol enables remote login. For an example, see How to Create a Multilevel Port for a Zone.

    2. Read the tnzonecfg changes into the kernel.
      # tnctl -fz /etc/security/tsol/tnzonecfg
    3. Restart the remote login service.
      # svcadm restart svc:/network/login:rlogin

How to Use Xvnc to Remotely Access a Trusted Extensions System

Virtual Network Computing (vnc) technology connects a client to a remote server, then displays the desktop of the remote server in a window on the client. Xvnc is the UNIX version of vnc, which is based on a standard X server. In Trusted Extensions, a client on any platform can connect to an Xvnc that is running Trusted Extensions software, log in to the Xvnc server, then display and work on a multilevel desktop.

Before You Begin

You have installed and configured Trusted Extensions software on the system that is going to be used as the Xvnc server. You have created and booted the labeled zones. Your Xvnc server recognizes the vnc clients by hostname or IP address.

You are superuser in the global zone of the system that is going to be used as the Xvnc server.

  1. Configure the Xvnc server.

    For more information, see the Xvnc(1) and vncconfig(1) man pages.


    Caution - If you are running the Solaris 10 10/08 or the Solaris 10 5/08 release, you must patch your system before configuring the server. For a SPARC system, install the latest version of patch 125719. For an x86 system, install the latest version of patch 125720.


    1. Create the Xservers configuration directory.
      # mkdir -p /etc/dt/config
    2. Copy the /usr/dt/config/Xservers file to the /etc/dt/config directory.
      # cp /usr/dt/config/Xservers /etc/dt/config/Xservers
    3. Edit the /etc/dt/config/Xservers file to start up the Xvnc program instead of Xserver or Xorg.

      In this example, the entry is configured to log in to the server without a password. To successfully log in the desktop, the local UID must be none instead of console.

      The entry is split for display purposes. The entry must be on one line.

      #   :0  Local local_uid@console root /usr/X11/bin/Xserver :0 -nobanner
        :0  Local local_uid@none root /usr/X11/bin/Xvnc :0 -nobanner 
        -AlwaysShared -SecurityTypes None -geometry 1024x768x24 -depth 24

      Note - A safer configuration is to require a password by using the -SecurityTypes VncAuth parameter. The Xvnc(1) man page describes password requirements.


    4. Reboot the server or start the Xvnc server.
      # reboot

      After reboot, verify that the Xvnc program is running.

      # ps -ef | grep Xvnc
        root  2145  932  0  Jan 18 ?  6:15 /usr/X11/bin/Xvnc :0 -nobanner 
        -AlwaysShared -SecurityTypes None -geometry 1024
  2. On every vnc client of the Trusted Extensions Xvnc server, install vnc client software.

    For the client system, you have a choice of software. This example uses the Sun vnc software.

    # cd SUNW-pkg-directory
    # pkgadd -d . SUNWvncviewer
  3. In a terminal window on a vnc client, connect to the server.
    % /usr/bin/vncviewer Xvnc-server-hostname
  4. In the window that displays, type your name and password.

    Continue with the login procedure. For a description of the remaining steps, see Logging In to Trusted Extensions in Solaris Trusted Extensions User’s Guide.

    If you logged in to the server as superuser, you can administer the server immediately. If you logged in to the server as a user, you must assume a role to administer the system.

Previous Next

 
 
  Published under the terms fo the Public Documentation License Version 1.01. Design by Interspire