JavaScript is required to interactively collapse and expand the table of contents. Go to main content
Trusted Extensions Configuration and Administration

Exit Print View

Updated: March 2017

Trusted Extensions Configuration and Administration

March 2017

Describes how to enable, configure, and maintain the Trusted Extensions feature of Oracle Solaris. Trusted Extensions software adds labels that implement mandatory access control (MAC) to protect system subjects (processes) and objects (data), including network endpoints and the desktop. Trusted Extensions software provides interfaces to handle label configuration, label assignment, and label policy.