Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017
 
 

Log In to Trusted Extensions

Logging in places you in the global zone, which is an environment that recognizes and enforces mandatory access control (MAC).

At most sites, two or more administrators serve as an initial setup team and are present when configuring the system.

Before You Begin

You have completed Enable Trusted Extensions.

  • Log in by using the user account that you created during Oracle Solaris installation.

    In the login dialog box, type username, then type the password.


    Note -  Users must not disclose their passwords to another person, as that person might then have access to the data of the user and will not be uniquely identified or accountable. Note that disclosure can be direct, through the user deliberately disclosing her or his password to another person, or indirect, such as through writing it down or choosing an insecure password. Trusted Extensions provides protection against insecure passwords, but cannot prevent a user from disclosing her or his password or writing it down.
    • If you did not install the desktop packages, open a terminal and assume the root role.
    • If you installed the desktop packages, perform the following steps.
      1. Use the mouse to dismiss the Status window and the Clearance window.
      2. Dismiss the dialog box that says that the label PUBLIC has no matching zone.

        You will create the zone after you assume the root role.

      3. Assume the root role by clicking your login name in the trusted stripe.

        Select the root role from the pulldown menu.

Security Considerations

You must log out or lock the screen before leaving a system unattended. Otherwise, a person can access the system without having to pass identification and authentication, and that person would not be uniquely identified or accountable.

Next Steps