Similarly, means that the command is typable in the security context .
Jobs inherit the security context of the application that creates them.
In case of the file systems, mapping between files and the security contexts is called labeling.
Since a security context exists, the service provider returns the resource to the user agent.
If a valid security context at the service provider already exists, skip steps 2-7.
So the developers said, hey, that's fine because we can have a renegotiation any time because it will always be under the existing security context.
There was no provision for carrying forward the security context that had been established as part of the renegotiation.
The mistake is the renegotiation did not require any security context from the previous secure context.
A security context in a domain is defined by a domain security policy.
A chroot-like utility for descending into security contexts is provided.