JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions User's Guide     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

1.  Introduction to Trusted Extensions

2.  Logging In to Trusted Extensions (Tasks)

3.  Working in Trusted Extensions (Tasks)

Visible Desktop Security in Trusted Extensions

Trusted Extensions Logout Process

Working on a Labeled System

How to Lock and Unlock Your Screen

How to Log Out of Trusted Extensions

How to Shut Down Your System

How to View Your Files in a Labeled Workspace

How to Access the Trusted Extensions Man Pages

How to Access Initialization Files at Every Label

How to Interactively Display a Window Label

How to Find the Mouse Pointer

How to Perform Some Common Desktop Tasks in Trusted Extensions

Performing Trusted Actions

How to Change Your Password in Trusted Extensions

How to Log In at a Different Label

How to Allocate a Device in Trusted Extensions

How to Deallocate a Device in Trusted Extensions

How to Assume a Role in Trusted Extensions

How to Change the Label of a Workspace

How to Add a Workspace at Your Minimum Label

How to Switch to a Workspace at a Different Label

How to Move a Window to a Different Workspace

How to Determine the Label of a File

How to Move Data Between Windows of Different Labels

How to Upgrade Data in a Multilevel Dataset

How to Downgrade Data in a Multilevel Dataset

4.  Elements of Trusted Extensions (Reference)

Glossary

Index

Visible Desktop Security in Trusted Extensions

Trusted Extensions provides a multilevel desktop.

A system that is configured with Trusted Extensions displays the trusted stripe except during login and screen lock. At all other times, the trusted stripe is visible.

image:Graphic shows the trusted stripe.

The stripe is at the top of the screen. The trusted symbol appears on the trusted stripe when you interact with the trusted computing base (TCB). When you change your password, for example, you interact with the TCB.

When the monitors of a multiheaded Trusted Extensions system are configured horizontally, one trusted stripe appears across the monitors. However, if the multiheaded system is configured to display vertically, or has separate desktops, one desktop per monitor, then the trusted stripe appears on one monitor only.


Caution

Caution - If a second trusted stripe appears on a multiheaded system, the stripe is not generated by the operating system. You might have an unauthorized program on your system.

Contact your security administrator immediately. To determine the correct trusted stripe, see How to Find the Mouse Pointer.


For details about the applications, menus, labels, and features of the desktop, see Chapter 4, Elements of Trusted Extensions (Reference).