JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions User Guide     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

1.  Introduction to Trusted Extensions Software

2.  Logging In to Trusted Extensions (Tasks)

3.  Working in Trusted Extensions (Tasks)

4.  Elements of Trusted Extensions (Reference)

Glossary

Index

A

C

D

E

F

H

I

K

L

M

N

O

P

Q

R

S

T

U

V

W

Z

R

read access, in labeled environment, Labels and Transactions
regaining control of pointer, How to Find the Mouse Pointer
remote login, to multilevel desktop, Logging In Remotely to Trusted Extensions
responsibilities
of administrators, Administration by Role in Trusted Extensions
users for password security, Password Security in the Oracle Solaris OS
users to clear media, Erasing Data on Objects Prior to Object Reuse
users to protect data, User Responsibilities for Protecting Data
users when logging out, How to Log Out of Trusted Extensions
restoring control of pointer, How to Find the Mouse Pointer
reviewing security settings
Last Login dialog box, Review Security Attributes During Login
procedure during login, Check Messages and Select Session Type
rights profiles, defined, Accessing Applications in Trusted Extensions
roles
adding a labeled workspace, How to Add a Workspace at Your Minimum Label
changing workspace label, How to Change the Label of a Workspace
common roles, Administration by Role in Trusted Extensions
responsibilities of, Administration by Role in Trusted Extensions
special user account, Trusted Extensions Enables Secure Administration
root role, responsibilities, Administration by Role in Trusted Extensions