JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions User's Guide     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

1.  Introduction to Trusted Extensions Software

2.  Logging In to Trusted Extensions (Tasks)

Desktops and Login in Trusted Extensions

Trusted Extensions Login Process

Desktop Choice Before Login

Identification and Authentication During Login

Review Security Attributes During Login

Logging In to Trusted Extensions

Choose a Trusted Desktop

Identify and Authenticate Yourself to the System

Check Messages and Select Session Type

Troubleshoot Login Problems

Logging In Remotely to Trusted Extensions

How to Log In to a Remote Trusted Extensions Desktop

3.  Working in Trusted Extensions (Tasks)

4.  Elements of Trusted Extensions (Reference)

Glossary

Index

Desktops and Login in Trusted Extensions

The desktop that you use in Trusted Extensions is protected. Labels provide a visible indication of protection. Applications, data, and your communications are labeled.

The desktops are trusted versions of the Common Desktop Environment (CDE), and the Sun Java Desktop System:

The login screen is not labeled. The login process requires you to establish a label for your session. Once you have chosen a label, the desktop, its windows, and all applications are labeled. In addition, applications that affect security are visibly protected by a trusted path indicator.