Skip Navigation Links | |
Exit Print View | |
Trusted Extensions User's Guide Oracle Solaris 11.1 Information Library |
1. Introduction to Trusted Extensions
2. Logging In to Trusted Extensions (Tasks)
3. Working in Trusted Extensions (Tasks)
Trusted Extensions Logout Process
How to Lock and Unlock Your Screen
How to Log Out of Trusted Extensions
How to View Your Files in a Labeled Workspace
How to Access the Trusted Extensions Man Pages
How to Access Initialization Files at Every Label
How to Interactively Display a Window Label
How to Perform Some Common Desktop Tasks in Trusted Extensions
How to Change Your Password in Trusted Extensions
How to Log In at a Different Label
How to Allocate a Device in Trusted Extensions
How to Deallocate a Device in Trusted Extensions
How to Assume a Role in Trusted Extensions
How to Change the Label of a Workspace
How to Add a Workspace at Your Minimum Label
How to Switch to a Workspace at a Different Label
How to Move a Window to a Different Workspace
How to Determine the Label of a File
How to Move Data Between Windows of Different Labels
How to Upgrade Data in a Multilevel Dataset
How to Downgrade Data in a Multilevel Dataset
Trusted Extensions provides a multilevel desktop.
A system that is configured with Trusted Extensions displays the trusted stripe except during login and screen lock. At all other times, the trusted stripe is visible.
The stripe is at the top of the screen. The trusted symbol appears on the trusted stripe when you interact with the trusted computing base (TCB). When you change your password, for example, you interact with the TCB.
When the monitors of a multiheaded Trusted Extensions system are configured horizontally, one trusted stripe appears across the monitors. However, if the multiheaded system is configured to display vertically, or has separate desktops, one desktop per monitor, then the trusted stripe appears on one monitor only.
Caution - If a second trusted stripe appears on a multiheaded system, the stripe is not generated by the operating system. You might have an unauthorized program on your system. Contact your security administrator immediately. To determine the correct trusted stripe, see How to Find the Mouse Pointer. |
For details about the applications, menus, labels, and features of the desktop, see Chapter 4, Elements of Trusted Extensions (Reference).