Document Information
Preface
1. Introduction to Solaris Trusted Extensions Software
2. Logging In to Trusted Extensions (Tasks)
3. Working in Trusted Extensions (Tasks)
4. Elements of Trusted Extensions (Reference)
Glossary
Index
|
S
- secadmin role, See Security Administrator role
- Security Administrator role
- contacting about missing trusted indicator, Trusted Symbol
- contacting about missing trusted stripe, Working on a Labeled System
- responsibilities, Administration by Role in Trusted Extensions
- security policy
- defined
- What Is Trusted Extensions Software?
- Glossary
- security practices, defined, What Is Trusted Extensions Software?
- selection, changing label, How to Move Data Between Labels
- Selection Manager, How to Move Data Between Labels
- sensitivity labels
- See labels
- label type, Sensitivity Labels and Clearances
- session clearances, defined, Single-Level or Multilevel Sessions
- sessions
- choosing clearance, Single-Level or Multilevel Sessions
- effect of selecting level, Session Selection Example
- setting level, Check Messages and Select Session Type
- single-level or multilevel, Single-Level or Multilevel Sessions
- Shut Down menu item, How to Shut Down Your System
- shutting down a workstation, How to Shut Down Your System
- single-level login, Trusted GNOME, Choose a Trusted Desktop
- single-level sessions, defined, Single-Level or Multilevel Sessions
- Solaris Trusted Extensions (CDE), See CDE
- spoofing
- defined
- Programs That Spoof Users Are Prevented
- Glossary
- Stop-A (L1-A) keyboard combination, How to Shut Down Your System
- Style Manager
- changing session characteristics, How to Log In at a Different Label
- limitations in Solaris Trusted Extensions (CDE), Style Manager Security
- requires the trusted path, How to Perform Some Common Desktop Tasks in Trusted Extensions
- subject, defined, Sensitivity Labels and Clearances
- Suspend System menu item, How to Shut Down Your System
- switching to a workspace at a different label, How to Switch to a Workspace at a Different Label
- system administration, on Trusted Extensions, Trusted Extensions Enables Secure Administration
- System Administrator role, responsibilities, Administration by Role in Trusted Extensions
T
- tasks, See users
- Text Editor security in Trusted Extensions, Text Editor Security
- Trash Can security in Trusted Extensions, Trash Can Security
- troubleshooting
- $HOME/.copy_files file, How to Access Initialization Files at Every Label
- $HOME/.link_files file, How to Access Initialization Files at Every Label
- command line error messages, Accessing Applications in Trusted Extensions
- device allocation, How to Allocate a Device in Trusted Extensions
- File Manager not appearing, How to Allocate a Device in Trusted Extensions
- login, Troubleshoot Login Problems
- minimized Front Panel, Front Panel Security (Trusted CDE)
- missing trusted indicator, Trusted Symbol
- missing trusted stripe, Working on a Labeled System
- password failure, Identify and Authenticate Yourself to the System
- relabeling files, How to Move Files Between Labels in Trusted CDE
- trusted applications
- by using rights profiles, Accessing Applications in Trusted Extensions
- on Front Panel, Front Panel Security (Trusted CDE)
- Trusted CDE
- customizing the desktop, How to Perform Some Common Desktop Tasks in Trusted Extensions
- customizing the Workspace Menu, How to Customize the CDE Workspace Menu
- finding online help for Trusted Extensions, How to Access Trusted Extensions Online Help
- using the Style Manager, How to Perform Some Common Desktop Tasks in Trusted Extensions
- trusted computing base (TCB)
- defined, Access to the Trusted Computing Base Is Limited
- procedures that interact with the TCB, Performing Trusted Actions
- symbol of interacting with
- Programs That Spoof Users Are Prevented
- Trusted Symbol
- Trusted Extensions
- overview, What Is Trusted Extensions Software?
- visible features, Visible Features of Trusted Extensions
- Trusted GNOME
- customizing the desktop, How to Perform Some Common Desktop Tasks in Trusted Extensions
- online help, How to Access Trusted Extensions Online Help
- workspace security, Workspace Security (Trusted GNOME)
- trusted grab, key combination, How to Change Your Password in Trusted Extensions
- trusted indicator, missing, Trusted Symbol
- Trusted Path menu
- Allocate Device, How to Allocate a Device in Trusted Extensions
- Assume rolename role, How to Assume a Role in Trusted Extensions
- Change Password, How to Change Your Password in Trusted Extensions
- Change Workspace Label, How to Change the Label of a Workspace
- described, Trusted Path Menu
- location, Visible Features of Trusted Extensions
- Query Window Label, How to Interactively Display a Window Label
- using, How to Access Trusted Extensions Online Help
- trusted stripe
- described, Trusted Stripe
- location in CDE
- Sensitivity Labels and Clearances
- Visible Features of Trusted Extensions
- location in Trusted GNOME, Visible Features of Trusted Extensions
- not on lockscreen, How to Lock and Unlock Your Screen
- on multiheaded system, Visible Desktop Security in Trusted Extensions
- what to do if missing, Working on a Labeled System
- trusted symbol
- described, Trusted Symbol
- on Trusted CDE workspace, Visible Desktop Security in Trusted Extensions
- tamper-proof icon, Programs That Spoof Users Are Prevented
- types of labels, Sensitivity Labels and Clearances
U
- unlabeled screens
- lockscreen, How to Lock and Unlock Your Screen
- login screen, Desktops and Login in Trusted Extensions
- upgrading information, Labels and Transactions
- user clearances, defined, Sensitivity Labels and Clearances
- user responsibilities
- password security, Password Security in the Solaris OS
- protecting data, User Responsibilities for Protecting Data
- when leaving workstation, Trusted Extensions Logout Process
- users
- accessing initialization files at every label, How to Access Initialization Files at Every Label
- adding a labeled workspace, How to Add a Workspace at a Particular Label
- allocating a device, How to Allocate a Device in Trusted Extensions
- assuming a role, How to Assume a Role in Trusted Extensions
- authorized to change label of file, How to Move Files Between Labels in Trusted CDE
- authorized to change security level of data, How to Move Data Between Labels
- changing workspace label, How to Change the Label of a Workspace
- changing your password, How to Change Your Password in Trusted Extensions
- customizing the Workspace Menu, How to Customize the CDE Workspace Menu
- determining the label of a file, How to Determine the Label of a File
- finding online help for Trusted Extensions, How to Access Trusted Extensions Online Help
- getting online help, How to Access the Trusted Extensions Man Pages
- linking files at different labels, How to Move Files Between Labels in Trusted CDE
- locking your screen, How to Lock and Unlock Your Screen
- logging in at a different label, How to Log In at a Different Label
- logging out, How to Log Out of Trusted Extensions
- moving a window to a workspace at a different label, How to Move a Window to a Different Workspace
- moving data between labels, How to Move Data Between Labels
- moving files between labels, How to Move Files Between Labels in Trusted CDE
- responsibilities
- clearing devices, Erasing Data on Objects Prior to Object Reuse
- password security, Password Security in the Solaris OS
- protecting data, User Responsibilities for Protecting Data
- when leaving workstation, How to Log Out of Trusted Extensions
shutting down a workstation, How to Shut Down Your System
- switching to a workspace at a different label, How to Switch to a Workspace at a Different Label
- unlocking your screen, How to Lock and Unlock Your Screen
- viewing files in a workspace, How to View Your Files in a Labeled Workspace
- using a device, See allocating a device
- using trusted desktop, single-level or multilevel, Choose a Trusted Desktop
|