1. Introduction to Solaris Trusted Extensions Software
2. Logging In to Trusted Extensions (Tasks)
3. Working in Trusted Extensions (Tasks)
Password Security in the Solaris OS
Discretionary Access Control
User Responsibilities for Protecting Data
Printer Security
Printer Security
Accessing Applications in Trusted Extensions
Trusted Extensions Separates Information by Label
Discretionary Access Control
Mandatory Access Control
User Responsibilities for Protecting Data