Skip Navigation Links
Trusted Extensions User's Guide
Oracle Solaris 11.1 Information Library
Search Scope:
This Document
Entire Library
Trusted Extensions User's Guide
October 2012
Explains how to use the Trusted Extensions feature of Oracle Solaris on a desktop system.
Document Information
Preface
1. Introduction to Trusted Extensions
What Is Trusted Extensions?
Trusted Extensions Protects Against Intruders
Access to the Trusted Computing Base Is Limited
Mandatory Access Control Protects Information
Peripheral Devices Are Protected
Programs That Spoof Users Are Prevented
Trusted Extensions Provides Discretionary and Mandatory Access Control
Discretionary Access Control
Mandatory Access Control
Sensitivity Labels and Clearances
Containers and Labels
Labels and Transactions
User Responsibilities for Protecting Data
Trusted Extensions Separates Information by Label
Single-Level or Multilevel Sessions
Session Selection Example
Labeled Workspaces
Enforcing MAC for Email Transactions
Erasing Data on Objects Prior to Object Reuse
Trusted Extensions Enables Secure Administration
Accessing Applications in Trusted Extensions
Administration by Role in Trusted Extensions
2. Logging In to Trusted Extensions (Tasks)
Desktop Login in Trusted Extensions
Trusted Extensions Login Process
Identification and Authentication During Login
Review Security Attributes During Login
Logging In to Trusted Extensions
Identify and Authenticate Yourself to the System
Check Messages and Select Session Type
Troubleshoot Login Problems
Logging In Remotely to Trusted Extensions
How to Log In to a Remote Trusted Extensions Desktop
3. Working in Trusted Extensions (Tasks)
Visible Desktop Security in Trusted Extensions
Trusted Extensions Logout Process
Working on a Labeled System
How to Lock and Unlock Your Screen
How to Log Out of Trusted Extensions
How to Shut Down Your System
How to View Your Files in a Labeled Workspace
How to Access the Trusted Extensions Man Pages
How to Access Initialization Files at Every Label
How to Interactively Display a Window Label
How to Find the Mouse Pointer
How to Perform Some Common Desktop Tasks in Trusted Extensions
Performing Trusted Actions
How to Change Your Password in Trusted Extensions
How to Log In at a Different Label
How to Allocate a Device in Trusted Extensions
How to Deallocate a Device in Trusted Extensions
How to Assume a Role in Trusted Extensions
How to Change the Label of a Workspace
How to Add a Workspace at Your Minimum Label
How to Switch to a Workspace at a Different Label
How to Move a Window to a Different Workspace
How to Determine the Label of a File
How to Move Data Between Windows of Different Labels
How to Upgrade Data in a Multilevel Dataset
How to Downgrade Data in a Multilevel Dataset
4. Elements of Trusted Extensions (Reference)
Visible Features of Trusted Extensions
Labels on Trusted Extensions Desktops
Trusted Stripe
Trusted Symbol
Window Label Indicator
Device Security in Trusted Extensions
Files and Applications in Trusted Extensions
.copy_files
File
.link_files
File
Password Security in the Oracle Solaris OS
Workspace Security in Trusted Extensions
Glossary
Index
A
C
D
E
F
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z