|
|||
1. Solaris Trusted Extensions APIs and Security Policy 4. Printing and the Label APIs 5. Interprocess Communications Trusted X Window System Security Attributes Trusted X Window System Security Policy Privileged Operations and the Trusted X Window System Trusted Extensions X Window System APIs Using Trusted X Window System Interfaces 8. Trusted Web Guard Prototype 9. Experimental Java Bindings for the Solaris Trusted Extensions Label APIs |
Trusted X Window System EnvironmentA system that is configured with Solaris Trusted Extensions uses the Solaris Trusted Extensions CDE, which is an enhanced version of the Common Desktop Environment (CDE). The Solaris Trusted Extensions CDE uses the Trusted Extensions X Window System. The Trusted Extensions X Window System includes protocol extensions to support mandatory access control (MAC), discretionary access control (DAC), and the use of privileges. Data transfer sessions are polyinstantiated, meaning that they are instantiated at different sensitivity labels and user IDs. Polyinstantiation ensures that data in an unprivileged client at one sensitivity label or user ID is not transferred to another client at another sensitivity label or user ID. Such a transfer might violate the Trusted X Window System DAC policies and the MAC policies of write-equal and read-down. The Trusted Extensions X Window System APIs enable you to obtain and set security-related attribute information. These APIs also enable you to translate labels to strings by using a font list and width to apply a style to the text string output. For example, the font might be 14-point, bold Helvetica. These interfaces are usually called by administrative applications that are written with Motif widgets, Xt Intrinsics, Xlib, and CDE interfaces.
For declarations of these routines, see Trusted Extensions X Window System APIs. |
||
|