Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Devices in Trusted Extensions (Reference)

Trusted Extensions device protection uses Oracle Solaris interfaces and Trusted Extensions interfaces.

For Oracle Solaris command-line interfaces, see Device Protection Reference in Securing Systems and Attached Devices in Oracle Solaris 11.2 .

Administrators who do not have access to the Device Allocation Manager can administer allocatable devices by using the command line. The allocate and deallocate commands have administrative options. For examples, see How to Forcibly Allocate a Device in Securing Systems and Attached Devices in Oracle Solaris 11.2 and How to Forcibly Deallocate a Device in Securing Systems and Attached Devices in Oracle Solaris 11.2 .

For Trusted Extensions command-line interfaces, see the add_allocatable(1M) and remove_allocatable(1M) man pages.