Trusted Solaris Administration Overview

How the Trusted Solaris Environment Protects Against Intruders

The Trusted Solaris environment protects access to the system by providing accounts requiring user names with passwords. Passwords can be created by users or system-generated, according to your site's security policy. You can also require that passwords be changed regularly. In addition, users can work within their approved label range only limiting the information they can access. Additional passwords are required for certain administrative tasks. Additional authentication limits the damage that can be done by an intruder who guesses the root password.

The Trusted Solaris environment displays the Trusted Path symbol, an unmistakable, tamper-proof emblem that appears at the bottom of the screen. The symbol indicates to users when they are using security-related parts of the system. If the Trusted Path symbol does not appear when the user is running a trusted application, that version of the application should be checked immediately for authenticity.

As administrator, you should always verify personally instructions that you send to your users via email. This policy can help to prevent such situations as imposters posing as administrators and sending email to users to try to get passwords to accounts or other sensitive information.