Skip Navigation Links | |
Exit Print View | |
Trusted Extensions User's Guide Oracle Solaris 11.1 Information Library |
1. Introduction to Trusted Extensions
2. Logging In to Trusted Extensions (Tasks)
Desktop Login in Trusted Extensions
Logging In to Trusted Extensions
Identify and Authenticate Yourself to the System
Check Messages and Select Session Type
Logging In Remotely to Trusted Extensions
How to Log In to a Remote Trusted Extensions Desktop
3. Working in Trusted Extensions (Tasks)
The login process on a system that is configured with Trusted Extensions is similar to the login process for Oracle Solaris. However, in Trusted Extensions, you examine several screens for security-relevant information before the desktop session can be started. The process is described in more detail in the sections that follow. Here is a brief overview.
Identification – Type your username in the Username field.
Authentication – Type your password in the Password field.
Successful completion of identification and authentication confirms your right to use the system.
Message checking and session type selection – You examine the information in the Message Of The Day dialog box. This dialog box displays the time you last logged in, any messages from the administrator, and the security attributes of your session. If you are permitted to operate at more than one label, you can specify the type of session, single-level or multilevel.
Note - If your account restricts you to operate at one label, you cannot specify the type of session. This restriction is called a single-label or single-level configuration. For an example, see Session Selection Example.
Label selection – In the label builder, you choose the highest security level at which you intend to work while in your session.
Note - By default, remote login is not supported for regular users in Trusted Extensions. If your administrator has configured the Oracle Solaris Xvnc software, you can use a VNC client to remotely display a multilevel desktop. For the procedure, see Logging In Remotely to Trusted Extensions.
Identification and authentication during login are handled by the Oracle Solaris OS. The login screen initially contains the Username prompt. This part of the login process is referred to as identification.
After you have entered the username, the password prompt is displayed. This part of the process is referred to as authentication. The password authenticates that you are indeed the user who is authorized to use that username.
A password is a private combination of keystrokes that validates your identity to the system. Your password is stored in an encrypted form and is not accessible by other users on the system. It is your responsibility to protect your password so that other users cannot use it to gain unauthorized access. Never write down your password or disclose it to anyone else because a person with your password has access to all your data without being identifiable or accountable. Your initial password is supplied by your security administrator.
The review of security attributes is handled by Trusted Extensions, not by the Oracle Solaris OS. Before login is complete, Trusted Extensions displays the Message Of The Day (MOTD) dialog box. This dialog box provides status information for you to review. The status includes past information, such as when the system was last used by you. You can also review the security attributes that are in effect for the upcoming session. If your account is configured to operate at more than one label, you can select a single-level or a multilevel session.
You then view your single label, or choose a label and clearance from the label builder.