Solaris Trusted Extensions User's Guide

ProcedureHow to Assume a Role in Trusted Extensions

Unlike the Solaris OS, Trusted Extensions provides a GUI for assuming a role.

  1. Open the Trusted Path menu.

    • In Solaris Trusted Extensions (CDE), click the center of the Front Panel.

      If you have been assigned a role by the security administrator, the Trusted Path menu includes the Assume rolename Role menu item.

      Choose Assume rolename Role.

    • In Solaris Trusted Extensions (GNOME), click your user name at the right of the trusted symbol.

      Choose the role name from the menu.

  2. Type the role password and press Return.

    This action confirms that you can legitimately assume this role. For security reasons, the password is not displayed as you type.


    Caution – Caution –

    When you type your password, make sure that the cursor is over the Change Password dialog box and that the trusted symbol is displayed. If the cursor is not over the dialog box, you might inadvertently type your password into a different window where the password could be seen by another user. If the trusted symbol is not displayed, then someone might be attempting to steal your password. Contact your security administrator at once.


    After the role password is accepted, the software places you in a role workspace. In Trusted GNOME, the current workspace becomes the role workspace. In Trusted CDE, a new workspace is created for the role. You are in the global zone. You can perform the tasks that are permitted by the rights profiles in your role.