| Skip Navigation Links | |
| Exit Print View | |
|
Trusted Extensions User's Guide Oracle Solaris 11.1 Information Library |
1. Introduction to Trusted Extensions
2. Logging In to Trusted Extensions (Tasks)
3. Working in Trusted Extensions (Tasks)
How to Access Initialization Files at Every Label
How to Access Initialization Files at Every Label
Accessing Applications in Trusted Extensions
How to Allocate a Device in Trusted Extensions
How to Allocate a Device in Trusted Extensions
Troubleshoot Login Problems
Trusted Symbol
Working on a Labeled System
Identify and Authenticate Yourself to the System
Accessing Applications in Trusted Extensions
Access to the Trusted Computing Base Is Limited
Performing Trusted Actions
What Is Trusted Extensions?
Visible Features of Trusted Extensions
Workspace Security in Trusted Extensions
How to Perform Some Common Desktop Tasks in Trusted Extensions
Trusted Symbol
How to Allocate a Device in Trusted Extensions
How to Assume a Role in Trusted Extensions
How to Change Your Password in Trusted Extensions
How to Change the Label of a Workspace
How to Change Your Password in Trusted Extensions
Visible Features of Trusted Extensions
How to Interactively Display a Window Label
Trusted Stripe
Visible Features of Trusted Extensions
Sensitivity Labels and Clearances
How to Lock and Unlock Your Screen
How to Find the Mouse Pointer
Working on a Labeled System
Trusted Symbol
Visible Desktop Security in Trusted Extensions
Programs That Spoof Users Are Prevented
Sensitivity Labels and Clearances