U
- unlabeled screens
- lockscreen, How to Lock and Unlock Your Screen
- login screen, Desktops and Login in Trusted Extensions
- upgrading information, Labels and Transactions
- user clearances, defined, Sensitivity Labels and Clearances
- user responsibilities
- password security, Password Security in the Oracle Solaris OS
- protecting data, User Responsibilities for Protecting Data
- when leaving workstation, Trusted Extensions Logout Process
- users
- accessing initialization files at every label, How to Access Initialization Files at Every Label
- adding a labeled workspace, How to Add a Workspace at a Particular Label
- allocating a device, How to Allocate a Device in Trusted Extensions
- assuming a role, How to Assume a Role in Trusted Extensions
- authorized to change label of file, How to Move Files Between Labels in Trusted CDE
- authorized to change security level of data, How to Move Data Between Labels
- changing workspace label, How to Change the Label of a Workspace
- changing your password, How to Change Your Password in Trusted Extensions
- customizing the Workspace Menu, How to Customize the CDE Workspace Menu
- determining the label of a file, How to Determine the Label of a File
- finding online help for Trusted Extensions, How to Access Trusted Extensions Online Help
- getting online help, How to Access the Trusted Extensions Man Pages
- linking files at different labels, How to Move Files Between Labels in Trusted CDE
- locking your screen, How to Lock and Unlock Your Screen
- logging in at a different label, How to Log In at a Different Label
- logging out, How to Log Out of Trusted Extensions
- moving a window to a workspace at a different label, How to Move a Window to a Different Workspace
- moving data between labels, How to Move Data Between Labels
- moving files between labels, How to Move Files Between Labels in Trusted CDE
- responsibilities
- clearing devices, Erasing Data on Objects Prior to Object Reuse
- password security, Password Security in the Oracle Solaris OS
- protecting data, User Responsibilities for Protecting Data
- when leaving workstation, How to Log Out of Trusted Extensions
shutting down a workstation, How to Shut Down Your System
- switching to a workspace at a different label, How to Switch to a Workspace at a Different Label
- unlocking your screen, How to Lock and Unlock Your Screen
- viewing files in a workspace, How to View Your Files in a Labeled Workspace
- using a device, See allocating a device
- using trusted desktop, single-level or multilevel, Choose a Trusted Desktop