R
- read access, in labeled environment, Labels and Transactions
- regaining control of pointer, How to Find the Mouse Pointer
- remote login, to multilevel desktop, Logging In Remotely to Trusted Extensions
- responsibilities
- of administrators, Administration by Role in Trusted Extensions
- users for password security, Password Security in the Oracle Solaris OS
- users to clear media, Erasing Data on Objects Prior to Object Reuse
- users to protect data, User Responsibilities for Protecting Data
- users when logging out, How to Log Out of Trusted Extensions
- restoring control of pointer, How to Find the Mouse Pointer
- reviewing security settings
- Message Of The Day dialog box, Review Security Attributes During Login
- procedure during login, Check Messages and Select Session Type
- rights profiles, defined, Accessing Applications in Trusted Extensions
- roles
- adding a labeled workspace, How to Add a Workspace at Your Minimum Label
- changing workspace label, How to Change the Label of a Workspace
- common roles, Administration by Role in Trusted Extensions
- responsibilities of, Administration by Role in Trusted Extensions
- special user account, Trusted Extensions Enables Secure Administration
- root role, responsibilities, Administration by Role in Trusted Extensions