|
|
S
- secadmin role, See Security Administrator role
- Security Administrator role
- contacting about missing trusted indicator, Trusted Symbol
- contacting about missing trusted stripe, Working on a Labeled System
- responsibilities, Administration by Role in Trusted Extensions
- security policy
- defined
- What Is Trusted Extensions Software?
- Glossary
- security practices, defined, What Is Trusted Extensions Software?
- selection, changing label, How to Move Data Between Labels
- Selection Manager, How to Move Data Between Labels
- sensitivity labels
- See labels
- label type, Sensitivity Labels and Clearances
- session clearances, defined, Single-Level or Multilevel Sessions
- sessions
- choosing clearance, Single-Level or Multilevel Sessions
- effect of selecting level, Session Selection Example
- setting level, Check Messages and Select Session Type
- single-level or multilevel, Single-Level or Multilevel Sessions
- Shut Down menu item, How to Shut Down Your System
- shutting down a workstation, How to Shut Down Your System
- single-level login, Trusted GNOME, Choose a Trusted Desktop
- single-level sessions, defined, Single-Level or Multilevel Sessions
- Solaris Trusted Extensions (CDE), See CDE
- spoofing
- defined
- Programs That Spoof Users Are Prevented
- Glossary
- Stop-A (L1-A) keyboard combination, How to Shut Down Your System
- Style Manager
- changing session characteristics, How to Log In at a Different Label
- limitations in Solaris Trusted Extensions (CDE), Style Manager Security
- requires the trusted path, How to Perform Some Common Desktop Tasks in Trusted Extensions
- subject, defined, Sensitivity Labels and Clearances
- Suspend System menu item, How to Shut Down Your System
- switching to a workspace at a different label, How to Switch to a Workspace at a Different Label
- system administration, on Trusted Extensions, Trusted Extensions Enables Secure Administration
- System Administrator role, responsibilities, Administration by Role in Trusted Extensions
T
- tasks, See users
- Text Editor security in Trusted Extensions, Text Editor Security
- Trash Can security in Trusted Extensions, Trash Can Security
- troubleshooting
- $HOME/.copy_files file, How to Access Initialization Files at Every Label
- $HOME/.link_files file, How to Access Initialization Files at Every Label
- command line error messages, Accessing Applications in Trusted Extensions
- device allocation, How to Allocate a Device in Trusted Extensions
- File Manager not appearing, How to Allocate a Device in Trusted Extensions
- login, Troubleshoot Login Problems
- minimized Front Panel, Front Panel Security (Trusted CDE)
- missing trusted indicator, Trusted Symbol
- missing trusted stripe, Working on a Labeled System
- password failure, Identify and Authenticate Yourself to the System
- relabeling files, How to Move Files Between Labels in Trusted CDE
- trusted applications
- by using rights profiles, Accessing Applications in Trusted Extensions
- on Front Panel, Front Panel Security (Trusted CDE)
- Trusted CDE
- customizing the desktop, How to Perform Some Common Desktop Tasks in Trusted Extensions
- customizing the Workspace Menu, How to Customize the CDE Workspace Menu
- finding online help for Trusted Extensions, How to Access Trusted Extensions Online Help
- using the Style Manager, How to Perform Some Common Desktop Tasks in Trusted Extensions
- trusted computing base (TCB)
- defined, Access to the Trusted Computing Base Is Limited
- procedures that interact with the TCB, Performing Trusted Actions
- symbol of interacting with
- Programs That Spoof Users Are Prevented
- Trusted Symbol
- Trusted Extensions
- overview, What Is Trusted Extensions Software?
- visible features, Visible Features of Trusted Extensions
- Trusted GNOME
- customizing the desktop, How to Perform Some Common Desktop Tasks in Trusted Extensions
- online help, How to Access Trusted Extensions Online Help
- workspace security, Workspace Security (Trusted GNOME)
- trusted grab, key combination, How to Change Your Password in Trusted Extensions
- trusted indicator, missing, Trusted Symbol
- Trusted Path menu
- Allocate Device, How to Allocate a Device in Trusted Extensions
- Assume rolename role, How to Assume a Role in Trusted Extensions
- Change Password, How to Change Your Password in Trusted Extensions
- Change Workspace Label, How to Change the Label of a Workspace
- described, Trusted Path Menu
- location, Visible Features of Trusted Extensions
- Query Window Label, How to Interactively Display a Window Label
- using, How to Access Trusted Extensions Online Help
- trusted stripe
- described, Trusted Stripe
- location in CDE
- Sensitivity Labels and Clearances
- Visible Features of Trusted Extensions
- location in Trusted GNOME, Visible Features of Trusted Extensions
- not on lockscreen, How to Lock and Unlock Your Screen
- on multiheaded system, Visible Desktop Security in Trusted Extensions
- what to do if missing, Working on a Labeled System
- trusted symbol
- described, Trusted Symbol
- on Trusted CDE workspace, Visible Desktop Security in Trusted Extensions
- tamper-proof icon, Programs That Spoof Users Are Prevented
- types of labels, Sensitivity Labels and Clearances
U
- unlabeled screens
- lockscreen, How to Lock and Unlock Your Screen
- login screen, Desktops and Login in Trusted Extensions
- upgrading information, Labels and Transactions
- user clearances, defined, Sensitivity Labels and Clearances
- user responsibilities
- password security, Password Security in the Solaris OS
- protecting data, User Responsibilities for Protecting Data
- when leaving workstation, Trusted Extensions Logout Process
- users
- accessing initialization files at every label, How to Access Initialization Files at Every Label
- adding a labeled workspace, How to Add a Workspace at a Particular Label
- allocating a device, How to Allocate a Device in Trusted Extensions
- assuming a role, How to Assume a Role in Trusted Extensions
- authorized to change label of file, How to Move Files Between Labels in Trusted CDE
- authorized to change security level of data, How to Move Data Between Labels
- changing workspace label, How to Change the Label of a Workspace
- changing your password, How to Change Your Password in Trusted Extensions
- customizing the Workspace Menu, How to Customize the CDE Workspace Menu
- determining the label of a file, How to Determine the Label of a File
- finding online help for Trusted Extensions, How to Access Trusted Extensions Online Help
- getting online help, How to Access the Trusted Extensions Man Pages
- linking files at different labels, How to Move Files Between Labels in Trusted CDE
- locking your screen, How to Lock and Unlock Your Screen
- logging in at a different label, How to Log In at a Different Label
- logging out, How to Log Out of Trusted Extensions
- moving a window to a workspace at a different label, How to Move a Window to a Different Workspace
- moving data between labels, How to Move Data Between Labels
- moving files between labels, How to Move Files Between Labels in Trusted CDE
- responsibilities
- clearing devices, Erasing Data on Objects Prior to Object Reuse
- password security, Password Security in the Solaris OS
- protecting data, User Responsibilities for Protecting Data
- when leaving workstation, How to Log Out of Trusted Extensions
shutting down a workstation, How to Shut Down Your System
- switching to a workspace at a different label, How to Switch to a Workspace at a Different Label
- unlocking your screen, How to Lock and Unlock Your Screen
- viewing files in a workspace, How to View Your Files in a Labeled Workspace
- using a device, See allocating a device
- using trusted desktop, single-level or multilevel, Choose a Trusted Desktop
|
|
|
|