oracle home
Trusted Extensions User's Guide
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
» ...
Documentation Home
»
Oracle Solaris 11.2 Information Library
»
Trusted Extensions User's Guide
»
Index V
Updated: July 2014
Trusted Extensions User's Guide
Document Information
Using This Documentation
Product Documentation Library
Access to Oracle Support
Feedback
Chapter 1 About Trusted Extensions
What Is Trusted Extensions?
Trusted Extensions Protects Against Intruders
Access to the Trusted Computing Base Is Limited
Mandatory Access Control Protects Information
Peripheral Devices Are Protected
Programs That Spoof Users Are Prevented
Trusted Extensions Provides Discretionary and Mandatory Access Control
Discretionary Access Control
Mandatory Access Control
Sensitivity Labels and Clearances
Containers and Labels
Labels and Transactions
User Responsibilities for Protecting Data
Trusted Extensions Separates Information by Label
Single-Level or Multilevel Sessions
Session Selection Example
Labeled Workspaces
Enforcing MAC for Email Transactions
Erasing Data on Objects Prior to Object Reuse
Trusted Extensions Enables Secure Administration
Accessing Applications in Trusted Extensions
Administration by Role in Trusted Extensions
Chapter 2 Logging In to Trusted Extensions
Desktop Login in Trusted Extensions
Trusted Extensions Login Process
Identification and Authentication During Login
Review Security Attributes During Login
Logging In to Trusted Extensions
Identify and Authenticate Yourself to the System
Check Messages and Select Session Type
Troubleshoot Login Problems
Logging In Remotely to Trusted Extensions
How to Log In to a Remote Trusted Extensions Desktop
Chapter 3 Working in Trusted Extensions
Visible Desktop Security in Trusted Extensions
Trusted Extensions Logout Process
Working on a Labeled System
How to Lock and Unlock Your Screen
How to Log Out of Trusted Extensions
How to Shut Down Your System
How to View Your Files in a Labeled Workspace
How to Access the Trusted Extensions Man Pages
How to Access Initialization Files at Every Label
How to Interactively Display a Window Label
How to Find the Mouse Pointer
How to Perform Some Common Desktop Tasks in Trusted Extensions
Performing Trusted Actions
How to Change Your Password in Trusted Extensions
How to Log In at a Different Label
How to Allocate a Device in Trusted Extensions
How to Deallocate a Device in Trusted Extensions
How to Assume a Role in Trusted Extensions
How to Change the Label of a Workspace
How to Add a Workspace at Your Minimum Label
How to Switch to a Workspace at a Different Label
How to Move a Window to a Different Workspace
How to Determine the Label of a File
How to Move Data Between Windows of Different Labels
How to Upgrade Data in a Multilevel Dataset
How to Downgrade Data in a Multilevel Dataset
Chapter 4 Elements of Trusted Extensions
Visible Features of Trusted Extensions
Labels on Trusted Extensions Desktops
Trusted Stripe
Trusted Symbol
Window Label Indicator
Device Security in Trusted Extensions
Files and Applications in Trusted Extensions
.copy_files File
.link_files File
Password Security in the Oracle Solaris OS
Workspace Security in Trusted Extensions
Glossary
Index
Index Numbers and Symbols
Index A
Index C
Index D
Index E
Index F
Index H
Index I
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index Z
Language:
English
V
visibility
desktop security
Visible Desktop Security in Trusted Extensions
labels after login
Desktop Login in Trusted Extensions
reading lower-level home directories
Containers and Labels
trusted stripe
Trusted Extensions Multilevel Desktop
Working on a Labeled System
Typical Industry Sensitivity Labels
Previous
Next