JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions User Guide     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

1.  Introduction to Trusted Extensions Software

2.  Logging In to Trusted Extensions (Tasks)

3.  Working in Trusted Extensions (Tasks)

4.  Elements of Trusted Extensions (Reference)

Glossary

Index

A

C

D

E

F

H

I

K

L

M

N

O

P

Q

R

S

T

U

V

W

Z

P

passwords
testing if password prompt is trusted, How to Change Your Password in Trusted Extensions
user responsibilities, Password Security in the Oracle Solaris OS
peripheral devices, See devices
permissions
at discretion of file owner, Discretionary Access Control
user responsibilities, User Responsibilities for Protecting Data
pfsh command, See profile shell
policy, See security policy
procedures, See users
profile shell, defined, Accessing Applications in Trusted Extensions
profiles, See rights profiles
protecting files
by label, Trusted Extensions Separates Information by Label
DAC, Discretionary Access Control
MAC, Mandatory Access Control
user responsibilities, User Responsibilities for Protecting Data