JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions User's Guide     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

1.  Introduction to Trusted Extensions

2.  Logging In to Trusted Extensions (Tasks)

Desktop Login in Trusted Extensions

Trusted Extensions Login Process

Identification and Authentication During Login

Review Security Attributes During Login

Logging In to Trusted Extensions

Identify and Authenticate Yourself to the System

Check Messages and Select Session Type

Troubleshoot Login Problems

Logging In Remotely to Trusted Extensions

How to Log In to a Remote Trusted Extensions Desktop

3.  Working in Trusted Extensions (Tasks)

4.  Elements of Trusted Extensions (Reference)

Glossary

Index

Desktop Login in Trusted Extensions

The desktop that you use in Trusted Extensions is protected. Labels provide a visible indication of protection. Applications, data, and your communications are labeled. The desktop is a trusted version of the Oracle Solaris desktop.

The login screen is not labeled. The login process requires you to establish a label for your session. Once you have chosen a label, the desktop, its windows, and all applications are labeled. In addition, applications that affect security are visibly protected by a trusted path indicator.