Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: March 2019

Log In to Trusted Extensions

Logging in places you in the global zone, which is an environment that recognizes and enforces mandatory access control (MAC).

At most sites, two or more administrators serve as an initial setup team and are present when configuring the system.

Before You Begin

You have completed Enable Trusted Extensions.

  1. Log in by using the user account that you created during Oracle Solaris installation.

    In the login dialog box, type username, then type the password.

    Note -  Users must not disclose their passwords to another person, as that person might then have access to the data of the user and will not be uniquely identified or accountable. Note that disclosure can be direct, through the user deliberately disclosing her or his password to another person, or indirect, such as through writing it down or choosing an insecure password. Trusted Extensions provides protection against insecure passwords, but cannot prevent a user from disclosing her or his password or writing it down.
  2. Open a terminal and assume the root role.

Security Considerations

You must log out or lock the screen before leaving a system unattended. Otherwise, a person can access the system without having to pass identification and authentication, and that person would not be uniquely identified or accountable.

Next Steps

Return to Remote Administration in Trusted Extensions.