Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Configurable Security Features

Trusted Extensions uses the same security features that Oracle Solaris provides, and adds some features. For example, the Oracle Solaris OS provides eeprom protection, password requirements and strong password algorithms, system protection by locking out a user, and protection from keyboard shutdown.

Trusted Extensions differs from Oracle Solaris in that you typically administer systems by assuming a limited role.