Solaris Trusted Extensions Administrator's Procedures
Previous Next

User Security Features in Trusted Extensions

Trusted Extensions software adds the following security features to users, roles, or rights profiles:

  • A user has a label range within which the user can use the system.

  • A role has a label range within which the role can be used to perform administrative tasks.

  • A Trusted Extensions rights profile can include CDE administrative actions. Like commands, actions can have security attributes.

  • Commands and actions in a Trusted Extensions rights profile have a label attribute. The command or action must be performed within a label range, or at a particular label.

  • Trusted Extensions software adds privileges and authorizations to the set of privileges and authorizations that are defined by the Solaris OS.

Previous Next