Log In to Trusted Extensions
Logging in places you in the global zone, which is an environment that
recognizes and enforces mandatory access control (MAC).
At most sites, two or more administrators serve as an initial setup team and are present when configuring
the system.
Before You Begin
You have completed Enable Trusted Extensions.
-
Log in by using the user account that you created during Oracle Solaris
installation.
In the login dialog box, type
username, then type the password.
Note -
Users must not disclose their passwords to another
person, as that person might then have access to the data of the
user and will not be uniquely identified or accountable. Note that
disclosure can be direct, through the user deliberately disclosing
her or his password to another person, or indirect, such as
through writing it down or choosing an insecure password.
Trusted Extensions provides protection against insecure passwords, but
cannot prevent a user from disclosing her or his password or
writing it down.
-
Open a terminal and assume the root
role.
You must log out or lock
the screen before leaving a system unattended. Otherwise, a person can access the system without
having to pass identification and authentication, and that person would not be uniquely identified
or accountable.
Next Steps
Return to Remote Administration in Trusted Extensions.