JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions User's Guide
search filter icon
search icon

Document Information

Preface

1.  Introduction to Solaris Trusted Extensions Software

2.  Logging In to Trusted Extensions (Tasks)

3.  Working in Trusted Extensions (Tasks)

4.  Elements of Trusted Extensions (Reference)

Visible Features of Trusted Extensions

Labels on Trusted Extensions Desktops

Trusted Stripe

Trusted Symbol

Window Label Indicator

Device Security in Trusted Extensions

Files and Applications in Trusted Extensions

.copy_files File

.link_files File

Password Security in the Solaris OS

Front Panel Security (Trusted CDE)

Workspace Switch Area

Trusted Path Menu

Clock Security

Calendar Security

File Manager Security

Text Editor Security

Personal Applications Subpanel

Mailer Security

Printer Security

Style Manager Security

Application Manager Security

Trash Can Security

Workspace Security (Trusted JDS)

Glossary

Index

Device Security in Trusted Extensions

By default in Trusted Extensions, devices are protected by device allocation requirements. Users cannot use a device without being given explicit authorization to allocate devices, and an allocated device cannot be used by another user. A device in use at one label cannot be used at another label until it is deallocated from the first label and allocated at the second label.

To use a device, see How to Allocate a Device in Trusted Extensions.