Overview of Changes From Trusted Solaris Software
Trusted Extensions administrators assign labels to hosts, zones, devices, and users. Trusted Extensions
applies these labels to resources such as files, processes, network packets, and windows.
The basis for applying these labels is the host or zone with which
the resources are associated.
As in previous Trusted Solaris releases, the Solaris OS provides support for privileges,
authorizations, and auditing. Trusted Extensions adds to the privileges, authorizations, rights profiles, audit
classes, and audit events that the Solaris OS defines. As in previous releases,
Trusted Extensions adds CDE actions to rights profiles.
As in previous releases, the software provides a trusted windowing system, desktop, and
administration tools that extend Solaris functionality. Printing is modified to handle labeled print
jobs. Also, Trusted Extensions provides a trusted version of the Sun JavaTM Desktop
System. This trusted version is called Solaris Trusted Extensions (JDS).
Unlike Trusted Solaris software, Trusted Extensions is a configuration of the underlying Solaris
OS. Trusted Extensions does not support the NIS+ naming service. LDAP is the
recommended naming service for this release. Also, the root user in Trusted Extensions
is identical to the root user in the Solaris OS. You can
modify the root user as you can in the Solaris OS, that is,
by turning the root user into a role.