JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Developer's Guide
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions APIs and Security Policy

2.  Labels and Clearances

3.  Label Code Examples

4.  Printing and the Label APIs

5.  Interprocess Communications

6.  Trusted X Window System

Trusted X Window System Environment

Trusted X Window System Security Attributes

Trusted X Window System Security Policy

Root Window

Client Windows

Override-Redirect Windows

Keyboard, Pointer, and Server Control

Selection Manager

Default Window Resources

Moving Data Between Windows

Privileged Operations and the Trusted X Window System

Trusted Extensions X Window System APIs

Data Types for X11

Accessing Attributes

Accessing and Setting a Window Label

Accessing and Setting a Window User ID

Accessing and Setting a Window Property Label

Accessing and Setting a Window Property User ID

Accessing and Setting a Workstation Owner ID

Setting the X Window Server Clearance and Minimum Label

Working With the Trusted Path Window

Accessing and Setting the Screen Stripe Height

Setting Window Polyinstantiation Information

Working With the X11 Label-Clipping Interface

Using Trusted X Window System Interfaces

Obtaining Window Attributes

Translating the Window Label With the Font List

Obtaining a Window Label

Setting a Window Label

Obtaining the Window User ID

Obtaining the X Window Server Workstation Owner ID

7.  Label Builder APIs

8.  Trusted Web Guard Prototype

9.  Experimental Java Bindings for the Solaris Trusted Extensions Label APIs

A.  Programmer's Reference

B.  Trusted Extensions API Reference

Index

Trusted X Window System Environment

A system that is configured with Trusted Extensions uses the Trusted Extensions CDE (CDE), which is an enhanced version of the Common Desktop Environment (CDE). The Trusted Extensions CDE (CDE) uses the Trusted Extensions X Window System. The Trusted Extensions X Window System includes protocol extensions to support mandatory access control (MAC), discretionary access control (DAC), and the use of privileges.

Data transfer sessions are polyinstantiated, meaning that they are instantiated at different sensitivity labels and user IDs. Polyinstantiation ensures that data in an unprivileged client at one sensitivity label or user ID is not transferred to another client at another sensitivity label or user ID. Such a transfer might violate the Trusted X Window System DAC policies and the MAC policies of write-equal and read-down.

The Trusted Extensions X Window System APIs enable you to obtain and set security-related attribute information. These APIs also enable you to translate labels to strings by using a font list and width to apply a style to the text string output. For example, the font might be 14-point, bold Helvetica. These interfaces are usually called by administrative applications that are written with Motif widgets, Xt Intrinsics, Xlib, and CDE interfaces.

For declarations of these routines, see Trusted Extensions X Window System APIs.