trusted_extensions - Solaris Trusted Extensions
The Trusted Extensions feature of Oracle Solaris provides labels for local objects and processes, for zones and file systems, and for network communications. These labels are used to implement a Multilevel Security (MLS) policy that restricts the flow of information based on label relationships. In contrast to Discretionary Access Control (DAC) based on ownership, the MLS policy enforced by Trusted Extensions is an example of Mandatory Access Control (MAC).
By default, Trusted Extensions software is disabled. It is enabled and disabled (but not completely configured) by the labeladm(8) command, and is associated with labeld(8) services, identified by the FMRI pattern:
svc:/system/labeld:*
label_encodings(5), labels(7), labeladm(8), labeld(8)
Trusted Extensions Configuration and Administration
Trusted Extensions Label Administration
Trusted Extensions Developer’s Guide
Trusted Extensions was made available as an add-on for Solaris 10 11/06 (Update 3), and then was integrated fully into Solaris in the Solaris 10 4/08 (Update 5) release.
Prior to that, Multilevel Security for Solaris was provided by the separate Trusted Solaris product, and before that, the SunOS CMW and SunOS MLS products.
Support for a multilevel, labeled desktop environment was removed from Solaris in Oracle Solaris 11.4.0.