Trusted IRIX®/CMW Security Features User's Guide

Document Number: 007-3300-003

Front Matter

| List of Figures | List of Tables |


Table of Contents

New Features in This Guide
Major Documentation Changes

About This Guide
Who Should Read This Guide
Accompanying Documentation
What This Guide Contains
Conventions Used in This Guide
How to Use This Guide
Additional Resources
Reader Comments

1. Introduction to Trusted IRIX/CMW
Trusted IRIX/CMW Product Overview
Trusted IRIX/CMW Security Features
TSIX Session Manager
Data Import/Export Restrictions

2. Understanding Access Control
Discretionary Access Control
Access Control Lists
Mandatory Access Control
Using MAC Labels

3. Understanding System Access
Interactive Desktop under Trusted IRIX/CMW
Logging In Using the CMW Dialog
Logging Out Using the GUI
Logging In Using Telnet or Serial Terminals
Determining the Identity and Security Features of a System
Passwords Under Trusted IRIX/CMW

4. Importing and Exporting Data
Printing under Trusted IRIX/CMW
Using Tape Devices
Using CD-ROM Devices

5. Understanding Auditing
System Audit Trail

6. Programming in a Trusted Environment
Guidelines
Trusted IRIX/CMW System and Library Calls
Identifying System Security Options from within a Compiled Program

A. Glossary of Computer Security Terms

Index