JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions User's Guide
search filter icon
search icon

Document Information

Preface

1.  Introduction to Solaris Trusted Extensions Software

2.  Logging In to Trusted Extensions (Tasks)

3.  Working in Trusted Extensions (Tasks)

4.  Elements of Trusted Extensions (Reference)

Glossary

Index

A

C

D

E

F

H

I

K

L

M

N

O

P

Q

R

S

T

U

V

W

Z

T

tasks, See users
Text Editor security in Trusted Extensions, Text Editor Security
Trash Can security in Trusted Extensions, Trash Can Security
troubleshooting
$HOME/.copy_files file, How to Access Initialization Files at Every Label
$HOME/.link_files file, How to Access Initialization Files at Every Label
command line error messages, Accessing Applications in Trusted Extensions
device allocation, How to Allocate a Device in Trusted Extensions
File Manager not appearing, How to Allocate a Device in Trusted Extensions
login, Troubleshoot Login Problems
minimized Front Panel, Front Panel Security (Trusted CDE)
missing trusted indicator, Trusted Symbol
missing trusted stripe, Working on a Labeled System
password failure, Identify and Authenticate Yourself to the System
relabeling files, How to Move Files Between Labels in Trusted CDE
trusted applications
by using rights profiles, Accessing Applications in Trusted Extensions
on Front Panel, Front Panel Security (Trusted CDE)
Trusted CDE
choosing as desktop, Choose a Trusted Desktop
customizing the desktop, How to Perform Some Common Desktop Tasks in Trusted Extensions
customizing the Workspace Menu, How to Customize the CDE Workspace Menu
finding online help for Trusted Extensions, How to Access Trusted Extensions Online Help
Trusted Extensions desktop, Desktops and Login in Trusted Extensions
using the Style Manager, How to Perform Some Common Desktop Tasks in Trusted Extensions
trusted computing base (TCB)
defined, Access to the Trusted Computing Base Is Limited
procedures that interact with the TCB, Performing Trusted Actions
symbol of interacting with
Programs That Spoof Users Are Prevented
Trusted Symbol
Trusted Extensions
overview, What Is Trusted Extensions Software?
visible features, Visible Features of Trusted Extensions
trusted grab, key combination, How to Change Your Password in Trusted Extensions
trusted indicator, missing, Trusted Symbol
Trusted JDS
choosing as desktop, Choose a Trusted Desktop
customizing the desktop, How to Perform Some Common Desktop Tasks in Trusted Extensions
online help, How to Access Trusted Extensions Online Help
Trusted Extensions desktop, Desktops and Login in Trusted Extensions
workspace security, Workspace Security (Trusted JDS)
Trusted Path menu
Allocate Device, How to Allocate a Device in Trusted Extensions
Assume rolename role, How to Assume a Role in Trusted Extensions
Change Password, How to Change Your Password in Trusted Extensions
Change Workspace Label, How to Change the Label of a Workspace
described, Trusted Path Menu
location, Visible Features of Trusted Extensions
Query Window Label, How to Interactively Display a Window Label
using, How to Access Trusted Extensions Online Help
trusted stripe
described, Trusted Stripe
location in CDE, Visible Features of Trusted Extensions
location in Trusted JDS, Visible Features of Trusted Extensions
location on screen
Sensitivity Labels and Clearances
Sensitivity Labels and Clearances
not on lockscreen, How to Lock and Unlock Your Screen
on multiheaded system, Visible Desktop Security in Trusted Extensions
what to do if missing, Working on a Labeled System
trusted symbol
described, Trusted Symbol
on workspace, Visible Desktop Security in Trusted Extensions
tamper-proof icon, Programs That Spoof Users Are Prevented
types of labels, Sensitivity Labels and Clearances