Secure Global Desktop Administration Guide > Applications, documents and hosts > Enable X Security Extension (--securityextension)
Attribute name | Usage |
---|---|
Enable X Security Extension | Check or clear the box. |
Command option | Usage |
---|---|
--securityextension true|false |
Specify true or false . |
Whether to enable the X Security Extension for the application.
The X Security Extension divides X clients (hosts) into trusted and untrusted clients. Untrusted clients cannot interact with windows and resources owned by trusted clients.
If you need to run an X application from a host that may not be secure, you should enable the X Security Extension and run the application in untrusted mode. This restricts the operations that the X application can perform in the X server and protects the display.
To run an application in untrusted mode:
Note Object Manager and Array Manager do not work correctly in untrusted mode. Do not enable the X Security Extension for these applications.
The X Security Extension only works with versions of SSH that support -Y
option.
Copyright © 1997-2006 Sun Microsystems, Inc. All rights reserved.