Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Mail Systems
Eclipse Documentation

How To Guides
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Problem Solutions
Privacy Policy




Solaris Trusted Extensions User's Guide
Previous Next

Visible Desktop Security in Trusted Extensions

Trusted Extensions offers two desktops, the Solaris Trusted Extensions (CDE) desktop and the Solaris Trusted Extensions (GNOME) desktop. Both desktops are labeled, but the labels might not be visible when you are working at a single label. To view an example of a system that is configured to display labels, see Figure 1-4.

A system that is configured with Trusted Extensions displays the trusted stripe except during login and screen lock. At all other times, the trusted stripe is visible. In Trusted CDE, the stripe is at the bottom of the screen. In Trusted GNOME, the stripe is at the top of the screen. The trusted symbol appears on the trusted stripe when you interact with the trusted computing base. When you change your password, for example, you interact with the TCB.

When the monitors of a multiheaded Trusted Extensions system are configured horizontally, one trusted stripe appears across the monitors. However, if the multiheaded system is configured to display vertically, or has separate desktops, one per monitor, then the trusted stripe appears on one monitor only.

Caution - If a second trusted stripe appears on a multiheaded system, the stripe is not generated by the operating system. You might have an unauthorized program on your system.

Contact your security administrator immediately. To determine the correct trusted stripe, see How to Regain Control of the Desktop’s Current Focus in Solaris Trusted Extensions Administrator’s Procedures.

For details about the applications, menus, labels, and features of the desktop, see Chapter 4, Elements of Trusted Extensions (Reference).

Previous Next

  Published under the terms fo the Public Documentation License Version 1.01. Design by Interspire