R
- read access, in labeled environment,
Labels and Transactions
- regaining control of pointer,
How to Find the Mouse Pointer
- remote login, to multilevel desktop,
Logging In Remotely to Trusted Extensions
- responsibilities
- of administrators,
Administration by Role in Trusted Extensions
- users for password security,
Password Security in the Oracle Solaris OS
- users to clear media,
Erasing Data on Objects Prior to Object Reuse
- users to protect data,
User Responsibilities for Protecting Data
- users when logging out,
How to Log Out of Trusted Extensions
- restoring control of pointer,
How to Find the Mouse Pointer
- reviewing security settings
- Message Of The Day dialog box,
Review Security Attributes During Login
- procedure during login,
Check Messages and Select Session Type
- rights profiles, defined,
Accessing Applications in Trusted Extensions
- roles
- adding a labeled workspace,
How to Add a Workspace at Your Minimum Label
- changing workspace label,
How to Change the Label of a Workspace
- common roles,
Administration by Role in Trusted Extensions
- responsibilities of,
Administration by Role in Trusted Extensions
- special user account,
Trusted Extensions Enables Secure Administration
- root role, responsibilities,
Administration by Role in Trusted Extensions