Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Handling Devices in Trusted Extensions

The following task map links to task maps for administrators and users for handling peripheral devices.

Table 21-1  Handling Devices in Trusted Extensions Task Map
Task
Description
For Instructions
Use devices.
Uses a device as a role or as a regular user.
Administer devices.
Configures devices for regular users.
Customize device authorizations.
The Security Administrator role creates new device authorizations, adds them to the device, places them in a rights profile and assigns this profile to the user.