JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Trusted Extensions User's Guide     Oracle Solaris 11 Information Library
search filter icon
search icon

Document Information


1.  Introduction to Trusted Extensions

2.  Logging In to Trusted Extensions (Tasks)

3.  Working in Trusted Extensions (Tasks)

4.  Elements of Trusted Extensions (Reference)

Visible Features of Trusted Extensions

Labels on Trusted Extensions Desktops

Trusted Stripe

Trusted Symbol

Window Label Indicator

Device Security in Trusted Extensions

Files and Applications in Trusted Extensions

.copy_files File

.link_files File

Password Security in the Oracle Solaris OS

Workspace Security in Trusted Extensions



Visible Features of Trusted Extensions

After you have successfully completed the login process, as explained in Chapter 2, Logging In to Trusted Extensions (Tasks), you can work within Trusted Extensions. Your work is subject to security restrictions. Restrictions that are specific to Trusted Extensions include the label range of the system, your clearance, and your choice of a single-level or multilevel session. As the following figure illustrates, several features distinguish a system that is configured with Trusted Extensions from an Oracle Solaris system.

Figure 4-1 Trusted Extensions Multilevel Desktop

image:Screen shows labels on windows and panels, the trusted stripe with the trusted symbol and workspace label.

Labels on Trusted Extensions Desktops

As discussed in Mandatory Access Control, all applications and files in Trusted Extensions have labels. Trusted Extensions displays labels in the following locations:

In addition, the color of the panels indicate the label of the workspace.

Figure 4-2 Panels Indicating Workspaces at Different Labels

image:Graphic shows four panels with different labels and different windows in each labeled workspace.

Figure 4-1 shows how labels display on a Trusted Extensions desktop. Also, the Query Window Label menu item can be used to display the label of a window. For an illustration, see Figure 3-2.

Trusted Stripe

The trusted stripe appears at the top of the screen.

Figure 4-3 Trusted Stripe on the Desktop

image:Graphic shows the trusted stripe.

The purpose of the trusted stripe is to provide a visual confirmation that you are in a legitimate Trusted Extensions session. The stripe indicates when you are interacting with the trusted computing base (TCB). The stripe also displays the labels of your current workspace and current window. The trusted stripe cannot be moved or obscured by other windows or dialog boxes.

The trusted stripe has the following elements:

Trusted Symbol

Whenever you access any portion of the TCB, the trusted symbol appears at the left of the trusted stripe area.

image:Graphic shows the trusted symbol.

The trusted symbol is not displayed when the mouse pointer is focused in a window or area of the screen that does not affect security. The trusted symbol cannot be forged. If you see the symbol, you can be sure that you are safely interacting with the TCB.


Caution - If the trusted stripe is missing from your workspace, contact the security administrator. The problem with your system could be serious.

The trusted stripe must not appear during login or when you lock your screen. If the trusted stripe shows, contact the administrator immediately.

Window Label Indicator

The Window Label indicator displays the label of the active window. In a multilevel session, the indicator can help identify windows with different labels in the same workspace. The indicator can also show that you are interacting with the TCB. For example, when you change your password, the Trusted Path indicator displays in the trusted stripe.