Skip Navigation Links | |
Exit Print View | |
Trusted Extensions User's Guide Oracle Solaris 10 8/11 Information Library |
1. Introduction to Trusted Extensions Software
2. Logging In to Trusted Extensions (Tasks)
3. Working in Trusted Extensions (Tasks)
4. Elements of Trusted Extensions (Reference)
Visible Features of Trusted Extensions
Labels on Trusted Extensions Desktops
Device Security in Trusted Extensions
Files and Applications in Trusted Extensions
Password Security in the Oracle Solaris OS
Front Panel Security (Trusted CDE)
In Trusted Extensions, Trusted JDS provides equivalent security to Trusted CDE, but the look and feel is different. As in Trusted CDE, desktop applications are label-aware. Applications run at the label of the current workspace, and display information only at the label of the process that opened the application.
The location of security features differs in Trusted JDS from their location in Trusted CDE. The behavior can also be different.
In Trusted JDS, the Trusted Path menu is available from the trusted stripe.
The label name of a window in the task list on the panel appears in a tooltip when the mouse hovers over the window. Similarly, the label name of a workspace in the switch area appears in the tooltip.
To change to a role, you click the account name in the trusted stripe and choose the role.
To add a workspace at a particular label, you select an existing workspace and change its label.
The desktop can be configured so that each workspace reflects the color of the label at which you are working in that workspace.