O'Reilly logo

Solaris™ 10 Security Essentials by Sun Microsystems Security Engineers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

12Configuring and Using Trusted Extensions

Trusted Extensions extends the Solaris OS by restricting access to information based on the sensitivity of the information. Processes, files, desktop components, and network communications are assigned labels such as PUBLIC and RESTRICTED. The Trusted Extensions policy is based on the following concepts.

Capabilities that in most UNIX environments are assigned to superuser are available to discrete administrative roles.

In addition to UNIX permissions, access to data is controlled by special security tags. These tags are called sensitivity labels. Labels are assigned to users, processes, and objects such as data files and directories.

Users can be cleared to operate in a multilevel desktop environment. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required