JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions User's Guide     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information


1.  Introduction to Trusted Extensions Software

2.  Logging In to Trusted Extensions (Tasks)

3.  Working in Trusted Extensions (Tasks)

Visible Desktop Security in Trusted Extensions

Trusted Extensions Logout Process

Working on a Labeled System

How to Lock and Unlock Your Screen

How to Log Out of Trusted Extensions

How to Shut Down Your System

How to View Your Files in a Labeled Workspace

How to Access the Trusted Extensions Man Pages

How to Access Trusted Extensions Online Help

How to Customize the CDE Workspace Menu

How to Access Initialization Files at Every Label

How to Interactively Display a Window Label

How to Perform Some Common Desktop Tasks in Trusted Extensions

Performing Trusted Actions

How to Change Your Password in Trusted Extensions

How to Log In at a Different Label

How to Allocate a Device in Trusted Extensions

How to Deallocate a Device in Trusted Extensions

How to Assume a Role in Trusted Extensions

How to Change the Label of a Workspace

How to Add a Workspace at a Particular Label

How to Switch to a Workspace at a Different Label

How to Move a Window to a Different Workspace

How to Determine the Label of a File

How to Move Data Between Labels

How to Move Files Between Labels in Trusted CDE

4.  Elements of Trusted Extensions (Reference)



Visible Desktop Security in Trusted Extensions

Trusted Extensions offers two labeled desktops, the Solaris Trusted Extensions (CDE) desktop and the Solaris Trusted Extensions (JDS) desktop.

A system that is configured with Trusted Extensions displays the trusted stripe except during login and screen lock. At all other times, the trusted stripe is visible. In Trusted CDE, the stripe is at the bottom of the screen. In Trusted JDS, the stripe is at the top of the screen. The trusted symbol appears on the trusted stripe when you interact with the trusted computing base. When you change your password, for example, you interact with the TCB.

When the monitors of a multiheaded Trusted Extensions system are configured horizontally, one trusted stripe appears across the monitors. However, if the multiheaded system is configured to display vertically, or has separate desktops, one per monitor, then the trusted stripe appears on one monitor only.


Caution - If a second trusted stripe appears on a multiheaded system, the stripe is not generated by the operating system. You might have an unauthorized program on your system.

Contact your security administrator immediately. To determine the correct trusted stripe, see How to Regain Control of the Desktop’s Current Focus in Trusted Extensions Administrator’s Procedures.

For details about the applications, menus, labels, and features of the desktop, see Chapter 4, Elements of Trusted Extensions (Reference).