Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

Solaris Trusted Extensions User's Guide
Previous Next

S

secadmin role, See Security Administrator role
Security Administrator role
contacting about missing trusted indicator, Trusted Symbol
contacting about missing trusted stripe, Working on a Labeled System
responsibilities, Administration by Role in Trusted Extensions
security policy
defined
What Is Trusted Extensions Software?
Glossary
security practices, defined, What Is Trusted Extensions Software?
selection, changing label, How to Move Data Between Labels
Selection Manager, How to Move Data Between Labels
sensitivity labels
See labels
label type, Sensitivity Labels and Clearances
session clearances, defined, Single-Level or Multilevel Sessions
sessions
choosing clearance, Single-Level or Multilevel Sessions
effect of selecting level, Session Selection Example
setting level, Check Messages and Select Session Type
single-level or multilevel, Single-Level or Multilevel Sessions
Shut Down menu item, How to Shut Down Your System
shutting down a workstation, How to Shut Down Your System
single-level login, Trusted GNOME, Choose a Trusted Desktop
single-level sessions, defined, Single-Level or Multilevel Sessions
Solaris Trusted Extensions (CDE), See CDE
spoofing
defined
Programs That Spoof Users Are Prevented
Glossary
Stop-A (L1-A) keyboard combination, How to Shut Down Your System
Style Manager
changing session characteristics, How to Log In at a Different Label
limitations in Solaris Trusted Extensions (CDE), Style Manager Security
requires the trusted path, How to Perform Some Common Desktop Tasks in Trusted Extensions
subject, defined, Sensitivity Labels and Clearances
Suspend System menu item, How to Shut Down Your System
switching to a workspace at a different label, How to Switch to a Workspace at a Different Label
system administration, on Trusted Extensions, Trusted Extensions Enables Secure Administration
System Administrator role, responsibilities, Administration by Role in Trusted Extensions

T

tasks, See users
Text Editor security in Trusted Extensions, Text Editor Security
Trash Can security in Trusted Extensions, Trash Can Security
troubleshooting
$HOME/.copy_files file, How to Access Initialization Files at Every Label
$HOME/.link_files file, How to Access Initialization Files at Every Label
command line error messages, Accessing Applications in Trusted Extensions
device allocation, How to Allocate a Device in Trusted Extensions
File Manager not appearing, How to Allocate a Device in Trusted Extensions
login, Troubleshoot Login Problems
minimized Front Panel, Front Panel Security (Trusted CDE)
missing trusted indicator, Trusted Symbol
missing trusted stripe, Working on a Labeled System
password failure, Identify and Authenticate Yourself to the System
relabeling files, How to Move Files Between Labels in Trusted CDE
trusted applications
by using rights profiles, Accessing Applications in Trusted Extensions
on Front Panel, Front Panel Security (Trusted CDE)
Trusted CDE
customizing the desktop, How to Perform Some Common Desktop Tasks in Trusted Extensions
customizing the Workspace Menu, How to Customize the CDE Workspace Menu
finding online help for Trusted Extensions, How to Access Trusted Extensions Online Help
using the Style Manager, How to Perform Some Common Desktop Tasks in Trusted Extensions
trusted computing base (TCB)
defined, Access to the Trusted Computing Base Is Limited
procedures that interact with the TCB, Performing Trusted Actions
symbol of interacting with
Programs That Spoof Users Are Prevented
Trusted Symbol
Trusted Extensions
overview, What Is Trusted Extensions Software?
visible features, Visible Features of Trusted Extensions
Trusted GNOME
customizing the desktop, How to Perform Some Common Desktop Tasks in Trusted Extensions
online help, How to Access Trusted Extensions Online Help
workspace security, Workspace Security (Trusted GNOME)
trusted grab, key combination, How to Change Your Password in Trusted Extensions
trusted indicator, missing, Trusted Symbol
Trusted Path menu
Allocate Device, How to Allocate a Device in Trusted Extensions
Assume rolename role, How to Assume a Role in Trusted Extensions
Change Password, How to Change Your Password in Trusted Extensions
Change Workspace Label, How to Change the Label of a Workspace
described, Trusted Path Menu
location, Visible Features of Trusted Extensions
Query Window Label, How to Interactively Display a Window Label
using, How to Access Trusted Extensions Online Help
trusted stripe
described, Trusted Stripe
location in CDE
Sensitivity Labels and Clearances
Visible Features of Trusted Extensions
location in Trusted GNOME, Visible Features of Trusted Extensions
not on lockscreen, How to Lock and Unlock Your Screen
on multiheaded system, Visible Desktop Security in Trusted Extensions
what to do if missing, Working on a Labeled System
trusted symbol
described, Trusted Symbol
on Trusted CDE workspace, Visible Desktop Security in Trusted Extensions
tamper-proof icon, Programs That Spoof Users Are Prevented
types of labels, Sensitivity Labels and Clearances

U

unlabeled screens
lockscreen, How to Lock and Unlock Your Screen
login screen, Desktops and Login in Trusted Extensions
upgrading information, Labels and Transactions
user clearances, defined, Sensitivity Labels and Clearances
user responsibilities
password security, Password Security in the Solaris OS
protecting data, User Responsibilities for Protecting Data
when leaving workstation, Trusted Extensions Logout Process
users
accessing initialization files at every label, How to Access Initialization Files at Every Label
adding a labeled workspace, How to Add a Workspace at a Particular Label
allocating a device, How to Allocate a Device in Trusted Extensions
assuming a role, How to Assume a Role in Trusted Extensions
authorized to change label of file, How to Move Files Between Labels in Trusted CDE
authorized to change security level of data, How to Move Data Between Labels
changing workspace label, How to Change the Label of a Workspace
changing your password, How to Change Your Password in Trusted Extensions
customizing the Workspace Menu, How to Customize the CDE Workspace Menu
determining the label of a file, How to Determine the Label of a File
finding online help for Trusted Extensions, How to Access Trusted Extensions Online Help
getting online help, How to Access the Trusted Extensions Man Pages
linking files at different labels, How to Move Files Between Labels in Trusted CDE
locking your screen, How to Lock and Unlock Your Screen
logging in at a different label, How to Log In at a Different Label
logging out, How to Log Out of Trusted Extensions
moving a window to a workspace at a different label, How to Move a Window to a Different Workspace
moving data between labels, How to Move Data Between Labels
moving files between labels, How to Move Files Between Labels in Trusted CDE
responsibilities
clearing devices, Erasing Data on Objects Prior to Object Reuse
password security, Password Security in the Solaris OS
protecting data, User Responsibilities for Protecting Data
when leaving workstation, How to Log Out of Trusted Extensions
shutting down a workstation, How to Shut Down Your System
switching to a workspace at a different label, How to Switch to a Workspace at a Different Label
unlocking your screen, How to Lock and Unlock Your Screen
viewing files in a workspace, How to View Your Files in a Labeled Workspace
using a device, See allocating a device
using trusted desktop, single-level or multilevel, Choose a Trusted Desktop
Previous Next

 
 
  Published under the terms fo the Public Documentation License Version 1.01. Design by Interspire