Go to main content

Trusted Extensions User's Guide

Exit Print View

Updated: October 2017
 
 

Index

A

access control
access control lists (ACLs)index iconDiscretionary Access Control
discretionary access control (DAC)index iconDiscretionary Access Control
mandatory access control (MAC)index iconMandatory Access Control
permission bitsindex iconDiscretionary Access Control
access control lists (ACLs)index iconDiscretionary Access Control
accessing
for read onlyindex iconLabels and Transactions
for reading and writingindex iconLabels and Transactions
for writingindex iconLabels and Transactions
initialization files at every labelindex iconHow to Access Initialization Files at Every Label
lower-level home directoriesindex iconContainers and Labels
man pages in Trusted Extensionsindex iconHow to Access the Trusted Extensions Man Pages
remote multilevel desktopindex iconLogging In Remotely to Trusted Extensions
adding
labeled workspaceindex iconHow to Add a Workspace at Your Minimum Label
workspacesindex iconHow to Add a Workspace at Your Minimum Label
admin role  Seeindex iconSystem Administrator role
Allocate Device menu itemindex iconHow to Allocate a Device in Trusted Extensions
allocating a deviceindex iconHow to Allocate a Device in Trusted Extensions
troubleshootingindex iconHow to Allocate a Device in Trusted Extensions
Assume rolename role menu itemindex iconHow to Assume a Role in Trusted Extensions
assuming a roleindex iconHow to Assume a Role in Trusted Extensions
authorizations
changing labelsindex iconExamples of Label Relationships in Trusted Extensions
for allocating devicesindex iconPeripheral Devices Are Protected
required to change label of data
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels

C

.copy_files file
creatingindex iconHow to Access Initialization Files at Every Label
describedindex icon.copy_files File
troubleshootingindex iconCreating a .link_files File
Change Login Password menu itemindex iconHow to Change Your Password in Trusted Extensions
Change Workspace Label menu itemindex iconHow to Change the Label of a Workspace
Change Workspace Password menu itemindex iconHow to Change Your Password in Trusted Extensions
changing
security level of data
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels
workspace labelindex iconHow to Change the Label of a Workspace
your passwordindex iconHow to Change Your Password in Trusted Extensions
choosing
label or clearance during loginindex iconCheck Messages and Select Session Type
classification component of label
definedindex iconSensitivity Labels and Clearances
clearances
label typeindex iconSensitivity Labels and Clearances
setting at login
index iconCheck Messages and Select Session Type
index iconSingle-Level or Multilevel Sessions
setting sessionindex iconCheck Messages and Select Session Type
compartment component of label
definedindex iconSensitivity Labels and Clearances
containers  Seeindex iconzones
copy-and-paste
effect on labelsindex iconExamples of Label Relationships in Trusted Extensions
creating
$HOME/.copy_files fileindex iconHow to Access Initialization Files at Every Label
$HOME/.link_files fileindex iconHow to Access Initialization Files at Every Label
customizing
desktopindex iconHow to Perform Some Common Desktop Tasks in Trusted Extensions

D

data
changing label of
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels
determining label ofindex iconHow to Determine the Label of a File
protecting with MACindex iconMandatory Access Control
deallocating devices
basic procedureindex iconHow to Deallocate a Device in Trusted Extensions
desktops
common tasksindex iconHow to Perform Some Common Desktop Tasks in Trusted Extensions
in Trusted Extensionsindex iconDesktop Login in Trusted Extensions
keyboard focusindex iconHow to Change Your Password in Trusted Extensions
logging in remotelyindex iconLogging In Remotely to Trusted Extensions
determining
label of a fileindex iconHow to Determine the Label of a File
label of a windowindex iconHow to Interactively Display a Window Label
Device Manager
deallocating devicesindex iconHow to Deallocate a Device in Trusted Extensions
devices
allocatingindex iconHow to Allocate a Device in Trusted Extensions
clearing prior to reuseindex iconErasing Data on Objects Prior to Object Reuse
protectingindex iconPeripheral Devices Are Protected
secured by allocation requirementindex iconDevice Security in Trusted Extensions
troubleshootingindex iconHow to Allocate a Device in Trusted Extensions
usingindex iconHow to Allocate a Device in Trusted Extensions
directories
visibility of home directoriesindex iconContainers and Labels
discretionary access control (DAC)
definedindex iconDiscretionary Access Control
dominance between labelsindex iconLabels and Transactions
downgrading informationindex iconExamples of Label Relationships in Trusted Extensions
drag-and-drop
effect on labelsindex iconExamples of Label Relationships in Trusted Extensions

E

email
label enforcementindex iconEnforcing MAC for Email Transactions
email instructions
user responsibilitiesindex iconUser Responsibilities for Protecting Data

F

failsafe loginindex iconTroubleshoot Login Problems
File Browser
displaying label of fileindex iconHow to Determine the Label of a File
troubleshooting when it does not appearindex iconHow to Allocate a Device in Trusted Extensions
viewing contents
index iconHow to View Your Files in a Labeled Workspace
index iconHow to View Your Files in a Labeled Workspace
File Manager
troubleshooting when it does not appearindex iconHow to Allocate a Device in Trusted Extensions
files
$HOME/.copy_files
index icon.copy_files File
index iconHow to Access Initialization Files at Every Label
$HOME/.link_files
index icon.link_files File
index iconHow to Access Initialization Files at Every Label
accessing initialization files at every labelindex iconHow to Access Initialization Files at Every Label
viewing in a workspaceindex iconHow to View Your Files in a Labeled Workspace
finding
calendar events at every labelindex iconHow to Perform Some Common Desktop Tasks in Trusted Extensions
Trusted Path menuindex iconTrusted Extensions Multilevel Desktop

H

help in Trusted Extensions
man pagesindex iconHow to Access the Trusted Extensions Man Pages
home directories
visible from higher-level zoneindex iconContainers and Labels
hot key
regaining control of desktop focusindex iconHow to Change Your Password in Trusted Extensions
regaining control of pointerindex iconHow to Find the Mouse Pointer

I

information  Seeindex icondata
initialization files
accessing at every labelindex iconHow to Access Initialization Files at Every Label
troubleshooting when customizedindex iconTroubleshoot Login Problems

K

key combinations
testing if grab is trusted
index iconHow to Change Your Password in Trusted Extensions
index iconHow to Find the Mouse Pointer

L

.link_files file
creatingindex iconHow to Access Initialization Files at Every Label
describedindex icon.link_files File
troubleshootingindex iconCreating a .link_files File
label ranges
describedindex iconSensitivity Labels and Clearances
troubleshooting a workstation with a restricted rangeindex iconTroubleshoot Login Problems
labels  See Alsoindex iconclearances
changing label of data
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels
changing label on informationindex iconExamples of Label Relationships in Trusted Extensions
componentsindex iconSensitivity Labels and Clearances
determining by window queryindex iconHow to Interactively Display a Window Label
displayed in Trusted Extensionsindex iconLabels on Trusted Extensions Desktops
displayed on desktopindex iconTypical Industry Sensitivity Labels
dominanceindex iconLabels and Transactions
labeled zonesindex iconContainers and Labels
means of protecting dataindex iconTrusted Extensions Separates Information by Label
rangesindex iconSensitivity Labels and Clearances
relationshipsindex iconLabels and Transactions
sample government labelsindex iconLabels and Transactions
sample industry labelsindex iconSensitivity Labels and Clearances
sample label relationshipsindex iconLabels and Transactions
setting at loginindex iconCheck Messages and Select Session Type
setting clearance at loginindex iconSingle-Level or Multilevel Sessions
setting session labels
index iconCheck Messages and Select Session Type
index iconCheck Messages and Select Session Type
typesindex iconSensitivity Labels and Clearances
visible on desktopindex iconVisible Desktop Security in Trusted Extensions
linking files at different labels
by using .link_filesindex iconHow to Access Initialization Files at Every Label
logging in
at a different labelindex iconHow to Log In at a Different Label
choosing a label or clearanceindex iconCheck Messages and Select Session Type
failsafeindex iconTroubleshoot Login Problems
five steps ofindex iconTrusted Extensions Login Process
remotely to multilevel desktopindex iconLogging In Remotely to Trusted Extensions
reviewing security settingsindex iconCheck Messages and Select Session Type
troubleshooting
index iconTroubleshoot Login Problems
index iconIdentify and Authenticate Yourself to the System
logging out
procedureindex iconHow to Log Out of Trusted Extensions
user responsibilitiesindex iconTrusted Extensions Logout Process
login process  Seeindex iconlogging in

M

Main Menu
Shut Downindex iconHow to Shut Down Your System
man pages in Trusted Extensionsindex iconHow to Access the Trusted Extensions Man Pages
mandatory access control (MAC)
definedindex iconMandatory Access Control
enforced for emailindex iconEnforcing MAC for Email Transactions
moving
a window to a workspace at a different labelindex iconHow to Move a Window to a Different Workspace
data to different label
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels
multiheaded system
trusted stripe
index iconFinding the Real Trusted Stripe
index iconVisible Desktop Security in Trusted Extensions
multilevel login
remoteindex iconLogging In Remotely to Trusted Extensions
multilevel sessions
definedindex iconSingle-Level or Multilevel Sessions

N

no trusted indicator
troubleshootingindex iconTrusted Symbol
no trusted stripe
troubleshootingindex iconWorking on a Labeled System
Not Found error messageindex iconAccessing Applications in Trusted Extensions
Not in Profile error messageindex iconAccessing Applications in Trusted Extensions

O

object
definedindex iconTypical Industry Sensitivity Labels
reuseindex iconErasing Data on Objects Prior to Object Reuse
oper role  Seeindex iconOperator role
Operator role
responsibilitiesindex iconAdministration by Role in Trusted Extensions

P

passwords
testing if password prompt is trustedindex iconTesting If the Password Prompt Can Be Trusted
user responsibilitiesindex iconPassword Security in the Oracle Solaris OS
peripheral devices  Seeindex icondevices
permissions
at discretion of file ownerindex iconDiscretionary Access Control
user responsibilitiesindex iconUser Responsibilities for Protecting Data
pfexec command  Seeindex iconprofile shell
policy  Seeindex iconsecurity policy
procedures  Seeindex iconusers
profile shell
definedindex iconAccessing Applications in Trusted Extensions
profiles  Seeindex iconrights profiles
protecting files
by labelindex iconTrusted Extensions Separates Information by Label
DACindex iconDiscretionary Access Control
MACindex iconMandatory Access Control
user responsibilitiesindex iconUser Responsibilities for Protecting Data

Q

Query Window Label menu itemindex iconHow to Interactively Display a Window Label

R

read access
in labeled environmentindex iconLabels and Transactions
regaining control of pointerindex iconHow to Find the Mouse Pointer
remote login
to multilevel desktopindex iconLogging In Remotely to Trusted Extensions
responsibilities
of administratorsindex iconAdministration by Role in Trusted Extensions
users for password securityindex iconPassword Security in the Oracle Solaris OS
users to clear mediaindex iconErasing Data on Objects Prior to Object Reuse
users to protect dataindex iconUser Responsibilities for Protecting Data
users when logging outindex iconHow to Log Out of Trusted Extensions
restoring control of pointerindex iconHow to Find the Mouse Pointer
reviewing security settings
Message Of The Day dialog boxindex iconReview Security Attributes During Login
procedure during loginindex iconCheck Messages and Select Session Type
rights profiles
definedindex iconAccessing Applications in Trusted Extensions
roles
adding a labeled workspaceindex iconHow to Add a Workspace at Your Minimum Label
changing workspace labelindex iconHow to Change the Label of a Workspace
common rolesindex iconAdministration by Role in Trusted Extensions
responsibilities ofindex iconAdministration by Role in Trusted Extensions
special user accountindex iconTrusted Extensions Enables Secure Administration
root role
responsibilitiesindex iconAdministration by Role in Trusted Extensions

S

secadmin role  Seeindex iconSecurity Administrator role
Security Administrator role
contacting about missing trusted indicatorindex iconTrusted Symbol
contacting about missing trusted stripeindex iconWorking on a Labeled System
responsibilitiesindex iconAdministration by Role in Trusted Extensions
security policy
defined
index iconsecurity policy
index iconWhat Is Trusted Extensions?
security practices
definedindex iconWhat Is Trusted Extensions?
selection
changing label
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels
Selection Managerindex iconHow to Move Data Between Windows of Different Labels
sensitivity labels  Seeindex iconlabels
label typeindex iconSensitivity Labels and Clearances
session clearances
definedindex iconSingle-Level or Multilevel Sessions
sessions
choosing clearanceindex iconSingle-Level or Multilevel Sessions
effect of selecting levelindex iconSession Selection Example
setting levelindex iconCheck Messages and Select Session Type
single-level or multilevelindex iconSingle-Level or Multilevel Sessions
Shut Down menu itemindex iconHow to Shut Down Your System
shutting down a workstationindex iconHow to Shut Down Your System
single-level sessions
definedindex iconSingle-Level or Multilevel Sessions
spoofing
defined
index iconspoof
index iconPrograms That Spoof Users Are Prevented
Stop-A (L1-A) keyboard combinationindex iconHow to Shut Down Your System
subject
definedindex iconTypical Industry Sensitivity Labels
Suspend System menu itemindex iconHow to Shut Down Your System
switching to a workspace at a different labelindex iconHow to Switch to a Workspace at a Different Label
system administration
on Trusted Extensionsindex iconTrusted Extensions Enables Secure Administration
System Administrator role
responsibilitiesindex iconAdministration by Role in Trusted Extensions

T

tasks  Seeindex iconusers
troubleshooting
$HOME/.copy_files fileindex iconCreating a .link_files File
$HOME/.link_files fileindex iconCreating a .link_files File
command line error messagesindex iconAccessing Applications in Trusted Extensions
device allocationindex iconHow to Allocate a Device in Trusted Extensions
File Manager not appearingindex iconHow to Allocate a Device in Trusted Extensions
loginindex iconTroubleshoot Login Problems
missing trusted indicatorindex iconTrusted Symbol
missing trusted stripeindex iconWorking on a Labeled System
password failureindex iconIdentify and Authenticate Yourself to the System
trusted applications
by using rights profilesindex iconAccessing Applications in Trusted Extensions
trusted computing base (TCB)
definedindex iconAccess to the Trusted Computing Base Is Limited
procedures that interact with the TCBindex iconPerforming Trusted Actions
symbol of interacting with
index iconTrusted Symbol
index iconPrograms That Spoof Users Are Prevented
Trusted Extensions
overviewindex iconWhat Is Trusted Extensions?
visible featuresindex iconVisible Features of Trusted Extensions
workspace securityindex iconWorkspace Security in Trusted Extensions
Trusted GNOME
customizing the desktopindex iconHow to Perform Some Common Desktop Tasks in Trusted Extensions
trusted grab
key combination
index iconHow to Change Your Password in Trusted Extensions
index iconHow to Find the Mouse Pointer
trusted indicator
missingindex iconTrusted Symbol
Trusted Path menu
Allocate Deviceindex iconHow to Allocate a Device in Trusted Extensions
Assume rolename roleindex iconHow to Assume a Role in Trusted Extensions
Change Login Passwordindex iconHow to Change Your Password in Trusted Extensions
Change Workspace Labelindex iconHow to Change the Label of a Workspace
Change Workspace Passwordindex iconHow to Change Your Password in Trusted Extensions
locationindex iconTrusted Extensions Multilevel Desktop
Query Window Labelindex iconHow to Interactively Display a Window Label
trusted stripe
describedindex iconTrusted Stripe
location on desktopindex iconTrusted Extensions Multilevel Desktop
location on screenindex iconTypical Industry Sensitivity Labels
not on lockscreenindex iconHow to Lock and Unlock Your Screen
on multiheaded system
index iconFinding the Real Trusted Stripe
index iconVisible Desktop Security in Trusted Extensions
warping pointer toindex iconForcing the Mouse Pointer to the Trusted Stripe
what to do if missingindex iconWorking on a Labeled System
trusted symbol
describedindex iconTrusted Symbol
on workspaceindex iconVisible Desktop Security in Trusted Extensions
tamper-proof iconindex iconPrograms That Spoof Users Are Prevented
types of labelsindex iconSensitivity Labels and Clearances

U

unlabeled screens
lockscreenindex iconHow to Lock and Unlock Your Screen
login screenindex iconDesktop Login in Trusted Extensions
upgrading informationindex iconExamples of Label Relationships in Trusted Extensions
user clearances
definedindex iconSensitivity Labels and Clearances
user responsibilities
password securityindex iconPassword Security in the Oracle Solaris OS
protecting dataindex iconUser Responsibilities for Protecting Data
when leaving workstationindex iconTrusted Extensions Logout Process
users
accessing initialization files at every labelindex iconHow to Access Initialization Files at Every Label
adding a labeled workspaceindex iconHow to Add a Workspace at Your Minimum Label
allocating a deviceindex iconHow to Allocate a Device in Trusted Extensions
assuming a roleindex iconHow to Assume a Role in Trusted Extensions
authorized to change security level of data
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels
changing workspace labelindex iconHow to Change the Label of a Workspace
changing your passwordindex iconHow to Change Your Password in Trusted Extensions
determining the label of a fileindex iconHow to Determine the Label of a File
finding pointerindex iconHow to Find the Mouse Pointer
locking your screenindex iconHow to Lock and Unlock Your Screen
logging in at a different labelindex iconHow to Log In at a Different Label
logging outindex iconHow to Log Out of Trusted Extensions
moving a window to a workspace at a different labelindex iconHow to Move a Window to a Different Workspace
moving data between labels
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels
responsibilities
clearing devicesindex iconErasing Data on Objects Prior to Object Reuse
password securityindex iconPassword Security in the Oracle Solaris OS
protecting dataindex iconUser Responsibilities for Protecting Data
when leaving workstationindex iconHow to Log Out of Trusted Extensions
shutting down a workstationindex iconHow to Shut Down Your System
switching to a workspace at a different labelindex iconHow to Switch to a Workspace at a Different Label
unlocking your screenindex iconHow to Lock and Unlock Your Screen
viewing files in a workspaceindex iconHow to View Your Files in a Labeled Workspace
using a device  Seeindex iconallocating a device

V

visibility
desktop securityindex iconVisible Desktop Security in Trusted Extensions
labels after loginindex iconDesktop Login in Trusted Extensions
reading lower-level home directoriesindex iconContainers and Labels
trusted stripe
index iconTrusted Extensions Multilevel Desktop
index iconWorking on a Labeled System
index iconTypical Industry Sensitivity Labels

W

Window Label indicatorindex iconWindow Label Indicator
Workspace Menu
Suspend Systemindex iconHow to Shut Down Your System
workspaces
labeledindex iconLabeled Workspaces
setting default labelindex iconHow to Log In at a Different Label
write access
in labeled environmentindex iconLabels and Transactions

Z

zones
home directory visibilityindex iconContainers and Labels
labeledindex iconContainers and Labels