Document Information
Preface
1. Introduction to Solaris Trusted Extensions Software
2. Logging In to Trusted Extensions (Tasks)
3. Working in Trusted Extensions (Tasks)
4. Elements of Trusted Extensions (Reference)
Glossary
Index
|
H
I
K
L
- label ranges
- described, Sensitivity Labels and Clearances
- troubleshooting a workstation with a restricted range, Troubleshoot Login Problems
- labels
- See also clearances
- changing label of data, How to Move Data Between Labels
- changing label of files, How to Move Files Between Labels in Trusted CDE
- changing label on information, Labels and Transactions
- components, Sensitivity Labels and Clearances
- determining by window query, How to Interactively Display a Window Label
- displayed in Trusted Extensions, Labels on Trusted Extensions Desktops
- displayed on desktop, Sensitivity Labels and Clearances
- dominance, Labels and Transactions
- labeled zones, Containers and Labels
- means of protecting data, Trusted Extensions Separates Information by Label
- ranges, Sensitivity Labels and Clearances
- relationships, Labels and Transactions
- sample government labels, Labels and Transactions
- sample industry labels, Sensitivity Labels and Clearances
- sample label relationships, Labels and Transactions
- setting at login, Check Messages and Select Session Type
- setting clearance at login, Single-Level or Multilevel Sessions
- setting session labels
- Check Messages and Select Session Type
- Check Messages and Select Session Type
- types, Sensitivity Labels and Clearances
- visible on desktop, Visible Desktop Security in Trusted Extensions
- .link_files file
- creating, How to Access Initialization Files at Every Label
- described, .link_files File
- troubleshooting, How to Access Initialization Files at Every Label
- linking files at different labels, How to Move Files Between Labels in Trusted CDE
- by using .link_files, How to Access Initialization Files at Every Label
- logging in
- at a different label, How to Log In at a Different Label
- choosing a desktop
- Desktop Choice Before Login
- Choose a Trusted Desktop
- choosing a label or clearance, Check Messages and Select Session Type
- failsafe, Troubleshoot Login Problems
- five steps of, Trusted Extensions Login Process
- reviewing security settings, Check Messages and Select Session Type
- troubleshooting
- Identify and Authenticate Yourself to the System
- Troubleshoot Login Problems
- logging out
- procedure, How to Log Out of Trusted Extensions
- user responsibilities, Trusted Extensions Logout Process
- login process, See logging in
M
- mail security in Trusted Extensions, Mailer Security
- Main Menu, Shut Down, How to Shut Down Your System
- man pages in Trusted Extensions, How to Access the Trusted Extensions Man Pages
- mandatory access control (MAC)
- defined, Mandatory Access Control
- enforced for email, Enforcing MAC for Email Transactions
- mounting, removable media, How to Allocate a Device in Trusted Extensions
- moving
- a window to a workspace at a different label, How to Move a Window to a Different Workspace
- data to different label, How to Move Data Between Labels
- file to different label, How to Move Files Between Labels in Trusted CDE
- multiheaded system, trusted stripe, Visible Desktop Security in Trusted Extensions
- multilevel login, Trusted GNOME, Choose a Trusted Desktop
- multilevel sessions, defined, Single-Level or Multilevel Sessions
N
O
P
- passwords, user responsibilities, Password Security in the Solaris OS
- peripheral devices, See devices
- permissions
- at discretion of file owner, Discretionary Access Control
- user responsibilities, User Responsibilities for Protecting Data
- pfsh command, See profile shell
- policy, See security policy
- Printer tool security in Trusted Extensions, Printer Security
- printing, typical labeled banner page, Printer Security
- procedures, See users
- profile shell, defined, Accessing Applications in Trusted Extensions
- profiles, See rights profiles
- protecting files
- by label, Trusted Extensions Separates Information by Label
- DAC, Discretionary Access Control
- MAC, Mandatory Access Control
- user responsibilities, User Responsibilities for Protecting Data
Q
R
- read access, in labeled environment, Labels and Transactions
- responsibilities
- of administrators, Administration by Role in Trusted Extensions
- users for password security, Password Security in the Solaris OS
- users to clear media, Erasing Data on Objects Prior to Object Reuse
- users to protect data, User Responsibilities for Protecting Data
- users when logging out, How to Log Out of Trusted Extensions
- reviewing security settings
- Last Login dialog box, Review Security Attributes During Login
- procedure during login, Check Messages and Select Session Type
- rights profiles, defined, Accessing Applications in Trusted Extensions
- roles
- adding a labeled workspace, How to Add a Workspace at a Particular Label
- changing workspace label, How to Change the Label of a Workspace
- common roles, Administration by Role in Trusted Extensions
- responsibilities of, Administration by Role in Trusted Extensions
- special user account, Trusted Extensions Enables Secure Administration
- root role, responsibilities, Administration by Role in Trusted Extensions
|