Documentation Home
> Oracle Solaris Trusted Extensions User's Guide
Oracle Solaris Trusted Extensions User's Guide
Book Information
Index
A
C
D
E
F
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
Preface
Chapter 1 Introduction to Solaris Trusted Extensions Software
What Is Trusted Extensions Software?
Trusted Extensions Protects Against Intruders
Access to the Trusted Computing Base Is Limited
Mandatory Access Control Protects Information
Peripheral Devices Are Protected
Programs That Spoof Users Are Prevented
Trusted Extensions Provides Discretionary and Mandatory Access Control
Discretionary Access Control
Mandatory Access Control
Sensitivity Labels and Clearances
Containers and Labels
Labels and Transactions
User Responsibilities for Protecting Data
Trusted Extensions Separates Information by Label
Single-Level or Multilevel Sessions
Session Selection Example
Labeled Workspaces
Enforcing MAC for Email Transactions
Erasing Data on Objects Prior to Object Reuse
Trusted Extensions Enables Secure Administration
Accessing Applications in Trusted Extensions
Administration by Role in Trusted Extensions
Chapter 2 Logging In to Trusted Extensions (Tasks)
Desktops and Login in Trusted Extensions
Trusted Extensions Login Process
Desktop Choice Before Login
Identification and Authentication During Login
Review Security Attributes During Login
Logging In to Trusted Extensions
Choose a Trusted Desktop
Identify and Authenticate Yourself to the System
Check Messages and Select Session Type
Troubleshoot Login Problems
Logging In Remotely to Trusted Extensions
How to Log In to a Remote Trusted Extensions Desktop
Chapter 3 Working in Trusted Extensions (Tasks)
Visible Desktop Security in Trusted Extensions
Trusted Extensions Logout Process
Working on a Labeled System
How to Lock and Unlock Your Screen
How to Log Out of Trusted Extensions
How to Shut Down Your System
How to View Your Files in a Labeled Workspace
How to Access the Trusted Extensions Man Pages
How to Access Trusted Extensions Online Help
How to Customize the CDE Workspace Menu
How to Access Initialization Files at Every Label
How to Interactively Display a Window Label
How to Perform Some Common Desktop Tasks in Trusted Extensions
Performing Trusted Actions
How to Change Your Password in Trusted Extensions
How to Log In at a Different Label
How to Allocate a Device in Trusted Extensions
How to Deallocate a Device in Trusted Extensions
How to Assume a Role in Trusted Extensions
How to Change the Label of a Workspace
How to Add a Workspace at a Particular Label
How to Switch to a Workspace at a Different Label
How to Move a Window to a Different Workspace
How to Determine the Label of a File
How to Move Data Between Labels
How to Move Files Between Labels in Trusted CDE
Chapter 4 Elements of Trusted Extensions (Reference)
Visible Features of Trusted Extensions
Labels on Trusted Extensions Desktops
Trusted Stripe
Trusted Symbol
Window Label Indicator
Device Security in Trusted Extensions
Files and Applications in Trusted Extensions
.copy_files File
.link_files File
Password Security in the Solaris OS
Front Panel Security (Trusted CDE)
Workspace Switch Area
Trusted Path Menu
Clock Security
Calendar Security
File Manager Security
Text Editor Security
Personal Applications Subpanel
Mailer Security
Printer Security
Style Manager Security
Application Manager Security
Trash Can Security
Workspace Security (Trusted JDS)
Glossary
© 2010, Oracle Corporation and/or its affiliates