Skip Navigation Links | |
Exit Print View | |
Trusted Extensions User's Guide Oracle Solaris 11.1 Information Library |
1. Introduction to Trusted Extensions
2. Logging In to Trusted Extensions (Tasks)
Trusted Extensions Login Process
Identification and Authentication During Login
Review Security Attributes During Login
Logging In to Trusted Extensions
Identify and Authenticate Yourself to the System
Check Messages and Select Session Type
Logging In Remotely to Trusted Extensions
How to Log In to a Remote Trusted Extensions Desktop
3. Working in Trusted Extensions (Tasks)
The desktop that you use in Trusted Extensions is protected. Labels provide a visible indication of protection. Applications, data, and your communications are labeled. The desktop is a trusted version of the Oracle Solaris desktop.
The login screen is not labeled. The login process requires you to establish a label for your session. Once you have chosen a label, the desktop, its windows, and all applications are labeled. In addition, applications that affect security are visibly protected by a trusted path indicator.