Logging in places you in the global zone, which is an environment that recognizes and enforces mandatory access control (MAC).
At most sites, two or more administrators serve as an initial setup team and are present when configuring the system.
Before You Begin
You have completed Enable Trusted Extensions.
In the login dialog box, type username, then type the password.
You must log out or lock the screen before leaving a system unattended. Otherwise, a person can access the system without having to pass identification and authentication, and that person would not be uniquely identified or accountable.
Next Steps
Return to Remote Administration in Trusted Extensions.