| Skip Navigation Links | |
| Exit Print View | |
|
Trusted Extensions User's Guide Oracle Solaris 10 8/11 Information Library |
1. Introduction to Trusted Extensions Software
2. Logging In to Trusted Extensions (Tasks)
3. Working in Trusted Extensions (Tasks)
Discretionary Access Control
Discretionary Access Control
Mandatory Access Control
Discretionary Access Control
Discretionary Access Control
Desktops and Login in Trusted Extensions
Labels and Transactions
Labels and Transactions
Labels and Transactions
How to Access Initialization Files at Every Label
Containers and Labels
How to Access the Trusted Extensions Man Pages
Logging In Remotely to Trusted Extensions
How to Add a Workspace at a Particular Label
How to Add a Workspace at a Particular Label
How to Allocate a Device in Trusted Extensions
How to Allocate a Device in Trusted Extensions
How to Allocate a Device in Trusted Extensions
How to Allocate a Device in Trusted Extensions
Application Manager Security
How to Assume a Role in Trusted Extensions
How to Assume a Role in Trusted Extensions
Labels and Transactions
Peripheral Devices Are Protected
How to Move Data Between Labels