About This Guide

“About This Guide” includes brief descriptions of the contents of this guide and an explanation of the typographical conventions used, and refers you to additional sources of information you might find helpful.

This guide explains how to use the Trusted IRIX/CMW (Compartmented Mode Workstation) operating system with SGI workstations and servers. It provides descriptions of those user tasks that are specific to this version of the operating system.

If you have a graphics workstation, you should be familiar with the user documentation of the standard IRIX operating system, on which this product is based. See the SGI_EndUser bookshelf in your IRIS InSight online documentation system.

Who Should Read This Guide

You should read this guide if you have never used a secure system before or if you are using Trusted IRIX/CMW for the first time.

Accompanying Documentation

To administer and use the Trusted IRIX/CMW operating system, you must have the set of standard IRIX documentation in addition to the Trusted IRIX/CMW release. In addition to this manual the following documentation is included:

Trusted IRIX/CMW Security Administration Guide 

This manual describes how to administer your Trusted IRIX/CMW site.

Release Notes 

This document describes how to install the release and any known problems with the implementation.

What This Guide Contains

This guide contains the following chapters:

Chapter 1, “Introduction to Trusted IRIX/CMW” 

Provides an overview of Trusted IRIX/CMW.

 Chapter 2, “Understanding Access Control” 

Provides information on the mandatory and discretionary access control features of Trusted IRIX/CMW.

Chapter 3, “Understanding System Access”  

Describes the tasks and procedures necessary to successfully log in and keep passwords current.

Chapter 4, “Importing and Exporting Data”  

Provides information on the security requirements and features relating to media and data import and export generally.

Chapter 5, “Understanding Auditing” 

Describes the auditing features and the user's responsibilities with respect to an audited environment.

Chapter 6, “Programming in a Trusted Environment”  

Provides information on programming practices in a trusted environment.

Appendix A, “Glossary of Computer Security Terms”,  

Provides a glossary of computer security terms and concepts used in these guides and elsewhere.

Conventions Used in This Guide

These type conventions and symbols are used in this guide:

command 

This fixed-space font denotes literal items such as commands, files, routines, pathnames, signals, messages, and programming language structures.

variable 

Italic typeface denotes variable entries and words or concepts being defined.

user input 

This bold, fixed-space font denotes literal items that the user enters in interactive sessions. Output is shown in nonbold, fixed-space font.

[] 

Brackets enclose optional portions of a command or directive line.

manpage(x) 

Man page section identifiers appear in parentheses after man page names.

"" 

(Double quotation marks) References in text to document section titles.

# 

IRIX shell prompt for the superuser (root).

% 

IRIX shell prompt for users other than superuser.

() 

(Parentheses) Following function names, these surround function arguments or are empty if the function has no arguments.

>> 

Command Monitor prompt

> 

Cascading menu options: File > Delete

This guide uses the standard UNIX convention for citing man pages in IRIX documentation. The page name is followed by the section number in parentheses. For example, rep(1C) refers to the rcp online man page.

How to Use This Guide

The Trusted IRIX/CMW Security Features User's Guide is written for end users of Trusted IRIX/CMW systems. Frequently, people who would consider themselves end users find themselves performing advanced administrative tasks. For those individuals, the Trusted IRIX/CMW Security Administration Guide has been prepared to help both new and experienced administrators successfully perform all operations necessary to configure and maintain CMW security on Trusted IRIX/CMW systems.

Additional Resources

This section contains a list of the guides and resources provided with your system and the specific focus and scope of each. You can see the guides by invoking the IRIS InSight library on your desktop or through the system toolchest, or through the iiv command from a shell window.

SGI End User Documentation

Your IRIS InSight documentation library contains a bookshelf titled SGI_EndUser. This bookshelf contains the end user documentation for your system. Some of these books include:

  • IRIS Essentials or Desktop User's Guide 

  • IRIS Glossary of Terms 

  • IRIS Utilities Guide 

  • Personal System Administration Guide 

  • Media Control Panels User's Guide 

These books have been written for standard IRIX. Where they differ from information in this book and in the Trusted IRIX/CMW Security Administration Guide, the Trusted IRIX/CMW books should be considered authoritative.

IRIX Admin Manual Set

The IRIX Admin suite is intended for administrators: those who are responsible for servers, multiple systems, and file structures outside the user's home directory and immediate working directories. If you find yourself maintaining systems for others or if you require more information about IRIX than is in the end-user manuals, these guides are for you. The IRIX Admin guides are available through the IRIS InSight online viewing system. They are also available on the Web at http://techpubs.sgi.com/library . The set comprises these volumes:

  • IRIX Admin: Software Installation and Licensing —Explains how to install and license software that runs under IRIX, the SGI implementation of the UNIX operating system. Contains instructions for performing miniroot and live installations using Inst, the command line interface to the IRIX installation utility. Identifies the licensing products that control access to restricted applications running under IRIX and refers readers to licensing product documentation.

  • IRIX Admin: System Configuration and Operation —Lists good general system administration practices and describes system administration tasks, including configuring the operating system; managing user accounts, user processes, and disk resources; interacting with the system while in the PROM monitor; and tuning system performance.

  • IRIX Admin: Disks and Filesystems —Describes how to add, maintain, and use disks and filesystems. Discusses how they work, their organization, and how to optimize their performance.

  • IRIX Admin: Networking and Mail —Describes how to plan, set up, use, and maintain the networking and mail systems, including discussions of sendmail, UUCP, SLIP, and PPP.

  • RIX Admin: Backup, Security, and Accounting —Describes how to back up and restore files, how to protect your system's and network's security, and how to track system usage on a per-user basis.

  • IRIX Admin: Resource Administration—Introduces system resource administration and describes how to use and administer various IRIX resource management features such as IRIX job limits and Miser.

  • IRIX Admin: Peripheral Devices —Describes how to set up and maintain the software for peripheral devices such as terminals, modems, printers, and CD-ROM and tape drives. Also includes specifications for the associated cables for these devices.

  • IRIX Admin: Selected Reference Pages—Provides concise reference page (manual page) information on the use of commands that may be needed while the system is down. Generally, each reference page covers one command, although some reference pages cover several closely related commands. Reference pages are available online through the man(1) command.

Reference Pages

The IRIX reference pages (often called “man” or “manual” pages) provide concise reference information on the use of IRIX commands, subroutines, and other elements that make up the IRIX operating system. This collection of entries is one of the most important references for an administrator. Generally, each reference page covers one command, although some reference pages cover several closely related commands.

The IRIX reference pages are available online through the man command. To view a reference page, use the man command at the shell prompt. For example, to see the reference page for diff, enter

man diff 

It is a good practice to print those man pages you consistently use for reference and those you are likely to need before major administrative operations and keep them in a notebook of some kind.

Each command, system file, or other system object is described on a separate page. The reference pages are divided into seven sections, as shown in Table 1. When referring to reference pages, this document follows a standard UNIX convention: the name of the command is followed by its section number in parentheses. For example, cc(1) refers to the cc reference page in Section 1.

Table 1 shows the reference page sections and the types of reference pages that they contain.

Table 1. Outline of Reference Page Organization

Type of Reference Page

Section Number

General Commands

(1)

System Calls and Error Numbers

(2)

Library Subroutines

(3)

File Formats

(4)

Miscellaneous

(5)

Demos and Games

(6)

Special Files

(7)


Release Notes

Release notes provide specific information about the current release and exceptions to the administration guides. Release notes are available online through the relnotes command. Each optional product or application has its own set of release notes. The grelnotes command provides a graphical interface to the release notes of all products installed on your system.

IRIX Help System

Your IRIX system comes with an online help system that provides help cards for commonly asked questions about basic system setup and usage. The command to initiate a help session is desktophelp.

SGI World Wide Web Site

The SGI World Wide Web (WWW) presence has been established to provide current information of interest to SGI customers. The following URL addresses are accessible to most commercially available Web browsers on the Internet:

http://www.sgi.com  

The SGI general Web server

http://techpubs.sgi.com/library  

The SGI Technical Publications Library

Reader Comments

If you have comments about the technical accuracy. content, or organization of this document, please tell us. Be sure to include the title and document number of the manual with your comments. (Online, the document number is located in the front matter of the manual. In printed manuals, the document number can be found on the back cover.)

You can contact us in any of the following ways.

  • Send e-mail to the follow address:

    techpubs@sgi.com

  • Use the Feedback option on the Technical Publications Library World Wide Web page:

    http://techpubs.sgi.com

  • Contact your customer service representative and ask that an incident be filed in the SGI incident tracking system.

  • Send mail to the following address:

    Technical Publications
    SGI
    1600 Amphitheatre Pkwy., M/S 535
    Mountain View, California 94043-1351

  • Send a fax to the attention of “Technical Publications” at +1 650 932 0801.

We value your comments and will respond to them promptly.