Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

User Security Features in Trusted Extensions

    Trusted Extensions software adds the following security features to users, roles, or rights profiles:

  • A user has a label range within which the user can use the system.

  • A role has a label range within which the role can be used to perform administrative tasks.

  • Commands in a Trusted Extensions rights profile have a label attribute. The command must be performed within a label range, or at a particular label.

  • Trusted Extensions software adds privileges and authorizations to the set of privileges and authorizations that are defined by Oracle Solaris.