User Security Features in Trusted Extensions
Trusted Extensions software adds the following security features to users, roles, or rights
profiles:
- A user has a label range within which the user can use the system. 
- A role has a label range within which the role can be used to perform administrative tasks. 
- A Trusted Extensions rights profile can include CDE administrative actions. Like commands, actions can have security attributes. 
- Commands and actions in a Trusted Extensions rights profile have a label attribute. The command or action must be performed within a label range, or at a particular label. 
- Trusted Extensions software adds privileges and authorizations to the set of privileges and authorizations that are defined by the Solaris OS.