Log In to Trusted Extensions
Logging in places you in the global zone, which is an environment that
recognizes and enforces mandatory access control (MAC).
At most sites, two or more administrators serve as an initial setup team and are present when configuring
Before You Begin
You have completed Enable Trusted Extensions.
Log in by using the user account that you created during Oracle Solaris installation.
In the login dialog box, type username, then type the
Users must not disclose
their passwords to another person, as that person might then have access to the data of the user and
will not be uniquely identified or accountable. Note that disclosure can be direct, through the user
deliberately disclosing her or his password to another person, or indirect, such as through writing
it down or choosing an insecure password. Trusted Extensions provides protection against insecure
passwords, but cannot prevent a user from disclosing her or his password or writing it down.
If you did not install the desktop packages, open a terminal and assume the
If you installed the desktop packages, perform the following steps.
Use the mouse to dismiss the Status window and the Clearance window.
Dismiss the dialog box that says that the label PUBLIC has no matching
You will create the zone after you assume the root role.
Assume the root role by clicking your login name in the trusted stripe.
Select the root role from the pulldown menu.
You must log out or lock
the screen before leaving a system unattended. Otherwise, a person can access the system without
having to pass identification and authentication, and that person would not be uniquely identified