|
|||
1. Introduction to Solaris Trusted Extensions Software 2. Logging In to Trusted Extensions (Tasks) Trusted Extensions Login Process Logging In to Trusted Extensions 3. Working in Trusted Extensions (Tasks) |
Desktops and Login in Trusted ExtensionsThe desktop that you use in Trusted Extensions is protected. Labels provide a visible indication of protection. Applications, data, and your communications are labeled. The desktop is a trusted version of the GNOME desktop. The menu item is Solaris Trusted Extensions (GNOME). The login screen is not labeled. The login process requires you to establish a label for your session. Once you have chosen a label, the desktop, its windows, and all applications are labeled. In addition, applications that affect security are visibly protected by a trusted path indicator. |
||
|