User processes receive the Solaris and Trusted Solaris security attributes listed below from the user or role that started them and the workspace where they were started.
Chapter 2, Getting Started describes how to access process attribute flags.
Chapter 3, Privileges describes how to access process privilege sets.
Chapter 4, Labels describes how to access labels on processes.
Chapter 6, Process Clearance describes how to access the process clearance.
Process ID |
Process clearance |
Real and effective user ID |
CMW label |
Real and effective group ID |
Process attribute flags |
Supplementary group list |
Process privilege sets |
User audit ID |
|
Audit session ID |
|
umask (defines permission bits for files created by the process) |