| Document Information Preface 1.  Introduction to Solaris Trusted Extensions Software 2.  Logging In to Trusted Extensions (Tasks) 3.  Working in Trusted Extensions (Tasks) 4.  Elements of Trusted Extensions (Reference) Glossary Index |       	 
             HIKL
label ranges
described, Sensitivity Labels and Clearancestroubleshooting a workstation with a restricted range, Troubleshoot Login Problems 
labels
See also clearanceschanging label of data, How to Move Data Between Labelschanging label of files, How to Move Files Between Labels in Trusted CDEchanging label on information, Labels and Transactionscomponents, Sensitivity Labels and Clearancesdetermining by window query, How to Interactively Display a Window Labeldisplayed in Trusted Extensions, Labels on Trusted Extensions Desktopsdisplayed on desktop, Sensitivity Labels and Clearancesdominance, Labels and Transactionslabeled zones, Containers and Labelsmeans of protecting data, Trusted Extensions Separates Information by Labelranges, Sensitivity Labels and Clearancesrelationships, Labels and Transactionssample government labels, Labels and Transactionssample industry labels, Sensitivity Labels and Clearancessample label relationships, Labels and Transactionssetting at login, Check Messages and Select Session Typesetting clearance at login, Single-Level or Multilevel Sessionssetting session labels
Check Messages and Select Session TypeCheck Messages and Select Session Typetypes, Sensitivity Labels and Clearancesvisible on desktop, Visible Desktop Security in Trusted Extensions 
.link_files file
creating, How to Access Initialization Files at Every Labeldescribed, .link_files Filetroubleshooting, How to Access Initialization Files at Every Label 
linking files at different labels, How to Move Files Between Labels in Trusted CDE
by using .link_files, How to Access Initialization Files at Every Label 
logging in
at a different label, How to Log In at a Different Labelchoosing a desktop
Desktop Choice Before LoginChoose a Trusted Desktopchoosing a label or clearance, Check Messages and Select Session Typefailsafe, Troubleshoot Login Problemsfive steps of, Trusted Extensions Login Processreviewing security settings, Check Messages and Select Session Typetroubleshooting
Identify and Authenticate Yourself to the SystemTroubleshoot Login Problems 
logging out
procedure, How to Log Out of Trusted Extensionsuser responsibilities, Trusted Extensions Logout Process 
login process, See logging in M
mail security in Trusted Extensions, Mailer Security 
Main Menu, Shut Down, How to Shut Down Your System 
man pages in Trusted Extensions, How to Access the Trusted Extensions Man Pages 
mandatory access control (MAC)
defined, Mandatory Access Controlenforced for email, Enforcing MAC for Email Transactions 
mounting, removable media, How to Allocate a Device in Trusted Extensions 
moving
a window to a workspace at a different label, How to Move a Window to a Different Workspacedata to different label, How to Move Data Between Labelsfile to different label, How to Move Files Between Labels in Trusted CDE 
multiheaded system, trusted stripe, Visible Desktop Security in Trusted Extensions 
multilevel login, Trusted GNOME, Choose a Trusted Desktop 
multilevel sessions, defined, Single-Level or Multilevel Sessions NOP
passwords, user responsibilities, Password Security in the Solaris OS 
peripheral devices, See devices 
permissions
at discretion of file owner, Discretionary Access Controluser responsibilities, User Responsibilities for Protecting Data 
pfsh command, See profile shell 
policy, See security policy 
Printer tool security in Trusted Extensions, Printer Security 
printing, typical labeled banner page, Printer Security 
procedures, See users 
profile shell, defined, Accessing Applications in Trusted Extensions 
profiles, See rights profiles 
protecting files
by label, Trusted Extensions Separates Information by LabelDAC, Discretionary Access ControlMAC, Mandatory Access Controluser responsibilities, User Responsibilities for Protecting Data QR
read access, in labeled environment, Labels and Transactions 
responsibilities
of administrators, Administration by Role in Trusted Extensionsusers for password security, Password Security in the Solaris OSusers to clear media, Erasing Data on Objects Prior to Object Reuseusers to protect data, User Responsibilities for Protecting Datausers when logging out, How to Log Out of Trusted Extensions 
reviewing security settings
Last Login dialog box, Review Security Attributes During Loginprocedure during login, Check Messages and Select Session Type 
rights profiles, defined, Accessing Applications in Trusted Extensions 
roles
adding a labeled workspace, How to Add a Workspace at a Particular Labelchanging workspace label, How to Change the Label of a Workspacecommon roles, Administration by Role in Trusted Extensionsresponsibilities of, Administration by Role in Trusted Extensionsspecial user account, Trusted Extensions Enables Secure Administration 
root role, responsibilities, Administration by Role in Trusted Extensions |