Solaris Trusted Extensions User's Guide
Previous Next

H

help in Trusted Extensions
man pages, How to Access the Trusted Extensions Man Pages
online help, How to Access Trusted Extensions Online Help
home directories, visible from higher-level zone, Containers and Labels
hot key, regaining control of desktop focus, How to Change Your Password in Trusted Extensions

I

information, See data
initialization files
accessing at every label, How to Access Initialization Files at Every Label
troubleshooting when customized, Troubleshoot Login Problems

K

key combinations, testing if grab is trusted, How to Change Your Password in Trusted Extensions

L

label ranges
described, Sensitivity Labels and Clearances
troubleshooting a workstation with a restricted range, Troubleshoot Login Problems
labels
See also clearances
changing label of data, How to Move Data Between Labels
changing label of files, How to Move Files Between Labels in Trusted CDE
changing label on information, Labels and Transactions
components, Sensitivity Labels and Clearances
determining by window query, How to Interactively Display a Window Label
displayed in Trusted Extensions, Labels on Trusted Extensions Desktops
displayed on desktop, Sensitivity Labels and Clearances
dominance, Labels and Transactions
labeled zones, Containers and Labels
means of protecting data, Trusted Extensions Separates Information by Label
ranges, Sensitivity Labels and Clearances
relationships, Labels and Transactions
sample government labels, Labels and Transactions
sample industry labels, Sensitivity Labels and Clearances
sample label relationships, Labels and Transactions
setting at login, Check Messages and Select Session Type
setting clearance at login, Single-Level or Multilevel Sessions
setting session labels
Check Messages and Select Session Type
Check Messages and Select Session Type
types, Sensitivity Labels and Clearances
visible on desktop, Visible Desktop Security in Trusted Extensions
.link_files file
creating, How to Access Initialization Files at Every Label
described, .link_files File
troubleshooting, How to Access Initialization Files at Every Label
linking files at different labels, How to Move Files Between Labels in Trusted CDE
by using .link_files, How to Access Initialization Files at Every Label
logging in
at a different label, How to Log In at a Different Label
choosing a desktop
Desktop Choice Before Login
Choose a Trusted Desktop
choosing a label or clearance, Check Messages and Select Session Type
failsafe, Troubleshoot Login Problems
five steps of, Trusted Extensions Login Process
reviewing security settings, Check Messages and Select Session Type
troubleshooting
Identify and Authenticate Yourself to the System
Troubleshoot Login Problems
logging out
procedure, How to Log Out of Trusted Extensions
user responsibilities, Trusted Extensions Logout Process
login process, See logging in

M

mail security in Trusted Extensions, Mailer Security
Main Menu, Shut Down, How to Shut Down Your System
man pages in Trusted Extensions, How to Access the Trusted Extensions Man Pages
mandatory access control (MAC)
defined, Mandatory Access Control
enforced for email, Enforcing MAC for Email Transactions
mounting, removable media, How to Allocate a Device in Trusted Extensions
moving
a window to a workspace at a different label, How to Move a Window to a Different Workspace
data to different label, How to Move Data Between Labels
file to different label, How to Move Files Between Labels in Trusted CDE
multiheaded system, trusted stripe, Visible Desktop Security in Trusted Extensions
multilevel login, Trusted GNOME, Choose a Trusted Desktop
multilevel sessions, defined, Single-Level or Multilevel Sessions

N

no trusted indicator, troubleshooting, Trusted Symbol
no trusted stripe, troubleshooting, Working on a Labeled System
Not Found error message, Accessing Applications in Trusted Extensions
Not in Profile error message, Accessing Applications in Trusted Extensions

O

object
defined, Sensitivity Labels and Clearances
reuse, Erasing Data on Objects Prior to Object Reuse
oper role, See Operator role
Operator role, responsibilities, Administration by Role in Trusted Extensions

P

passwords, user responsibilities, Password Security in the Solaris OS
peripheral devices, See devices
permissions
at discretion of file owner, Discretionary Access Control
user responsibilities, User Responsibilities for Protecting Data
pfsh command, See profile shell
policy, See security policy
Printer tool security in Trusted Extensions, Printer Security
printing, typical labeled banner page, Printer Security
procedures, See users
profile shell, defined, Accessing Applications in Trusted Extensions
profiles, See rights profiles
protecting files
by label, Trusted Extensions Separates Information by Label
DAC, Discretionary Access Control
MAC, Mandatory Access Control
user responsibilities, User Responsibilities for Protecting Data

Q

Query Window Label menu item, How to Interactively Display a Window Label

R

read access, in labeled environment, Labels and Transactions
responsibilities
of administrators, Administration by Role in Trusted Extensions
users for password security, Password Security in the Solaris OS
users to clear media, Erasing Data on Objects Prior to Object Reuse
users to protect data, User Responsibilities for Protecting Data
users when logging out, How to Log Out of Trusted Extensions
reviewing security settings
Last Login dialog box, Review Security Attributes During Login
procedure during login, Check Messages and Select Session Type
rights profiles, defined, Accessing Applications in Trusted Extensions
roles
adding a labeled workspace, How to Add a Workspace at a Particular Label
changing workspace label, How to Change the Label of a Workspace
common roles, Administration by Role in Trusted Extensions
responsibilities of, Administration by Role in Trusted Extensions
special user account, Trusted Extensions Enables Secure Administration
root role, responsibilities, Administration by Role in Trusted Extensions
Previous Next