Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Managing Devices in Trusted Extensions

The following task map describes procedures to protect devices at your site.

Table 21-3  Managing Devices in Trusted Extensions Task Map
Task
Description
For Instructions
Set or modify device policy.
Changes the privileges that are required to access a device.
Authorize users to allocate a device.
The Security Administrator role assigns a rights profile with the Allocate Device authorization to the user.
The Security Administrator role assigns a profile with the site-specific authorizations to the user.
Configure a device.
Chooses security features to protect the device.
Revoke or reclaim a device.
Uses the Device Manager to make a device available for use.
Uses Oracle Solaris commands to make a device available or unavailable for use.
Prevent access to an allocatable device.
Provides fine–grained access control to a device.
Denies everyone access to an allocatable device.
Protect printers and frame buffers.
Ensures that nonallocatable devices are not allocatable.
Use a new device-clean script.
Places a new script in the appropriate places.