User Security Features in Trusted Extensions
Trusted Extensions software adds the following security features to users, roles, or rights
profiles:
A user has a label range within which the user can use the system.
A role has a label range within which the role can be used to perform administrative tasks.
A Trusted Extensions rights profile can include CDE administrative actions. Like commands, actions can have security attributes.
Commands and actions in a Trusted Extensions rights profile have a label attribute. The command or action must be performed within a label range, or at a particular label.
Trusted Extensions software adds privileges and authorizations to the set of privileges and authorizations that are defined by the Solaris OS.