Trusted Extensions User's Guide

Exit Print View

Updated: July 2014
 
 

Trusted Extensions Login Process

The login process on a system that is configured with Trusted Extensions is similar to the login process for Oracle Solaris. However, in Trusted Extensions, you examine several screens for security-relevant information before the desktop session can be started. The process is described in more detail in the sections that follow. Here is a brief overview.

  1. Identification – Type your username in the Username field.

  2. Authentication – Type your password in the Password field.

    Successful completion of identification and authentication confirms your right to use the system.

  3. Message checking and session type selection – You examine the information in the Message Of The Day dialog box. This dialog box displays the time you last logged in, any messages from the administrator, and the security attributes of your session. If you are permitted to operate at more than one label, you can specify the type of session, single-level or multilevel.


    Note - If your account restricts you to operate at one label, you cannot specify the type of session. This restriction is called a single-label or single-level configuration. For an example, see Session Selection Example.
  4. Label selection – In the label builder, you choose the highest security level at which you intend to work while in your session.


Note - By default, remote login is not supported for regular users in Trusted Extensions. If your administrator has configured the Oracle Solaris Xvnc software, you can use a VNC client to remotely display a multilevel desktop. For the procedure, see Logging In Remotely to Trusted Extensions.