|
|||
1. Introduction to Solaris Trusted Extensions Software 2. Logging In to Trusted Extensions (Tasks) 3. Working in Trusted Extensions (Tasks) 4. Elements of Trusted Extensions (Reference) Visible Features of Trusted Extensions Files and Applications in Trusted Extensions Front Panel Security (Trusted CDE) |
Password Security in the Solaris OSUsers who change passwords on a frequent basis shorten the window of opportunity for intruders to use illegally obtained passwords. Therefore, your site's security policy can require you to change your password regularly. The Solaris OS can set content requirements for passwords and enforce password resetting requirements. The following are possible resetting requirements:
If your administrator has implemented one of the preceding options, you are sent an email message that warns you to change your password prior to the cutoff date. Passwords can have content criteria. At minimum, passwords in the Solaris OS must meet the following criteria:
You can change your password by using the Change Password menu item from the Trusted Path menu. For the steps, see Performing Trusted Actions. |
||
|