Solaris Trusted Extensions Administrator's Procedures

ProcedureVerify That the Trusted Extensions Roles Work

To verify each role, assume the role. Then, perform tasks that only that role can perform.

Before You Begin

If you have configured DNS or routing, you must reboot after you create the roles and before you verify that the roles work.

  1. For each role, log in as a user who can assume the role.

  2. Open the Trusted Path menu.

    In the following trusted stripe, the user name is tester.

    Illustration shows the trusted stripe with the user name,
tester.
    1. Click your user name in the trusted stripe.

    2. From the list of roles that are assigned to you, select a role.

  3. In the role workspace, start the Solaris Management Console.


    $ /usr/sbin/smc &
    
  4. Select the appropriate scope for the role that you are testing.

  5. Click System Services, and navigate to Users.

    You are prompted for a password.

    1. Type the role password.

    2. Double-click User Accounts.

  6. Click a user.

    • The System Administrator role should be able to modify fields under the General, Home Directory, and Group tabs.

      If you configured the roles to enforce separation of duty, then the System Administrator role cannot set the user's initial password.

    • The Security Administrator role should be able to modify fields under all tabs.

      If you configured the roles to enforce separation of duty, then the Security Administrator role cannot create a user.

    • The Primary Administrator role should be able to modify fields under all tabs.

  7. (Optional) If you are enforcing separation of duty, prevent the default rights profiles from being used.


    Note –

    When the system is upgraded to a newer version of the Solaris OS, the System Administrator, User Management, and User Security default profiles are replaced.


    In the trusted editor, perform one of the following steps:

    • Remove the three rights profiles from the prof_attr file.

      Removal prevents an administrator from viewing or assigning these profiles. Also, remove the prof_attr.orig file.

    • Comment out the three rights profiles in the prof_attr file.

      Commenting out the rights profiles prevents these profiles from being viewed in the Solaris Management Console or from being used in commands that manage users. The profiles and their contents can still be viewed in the prof_attr file.

    • Type a different description for the three rights profiles in the prof_attr file.

      Edit the prof_attr file to change the description field of these rights profiles. For example, you might replace the descriptions with Do not use this profile. This change warns an administrator to not use the profile, but does not prevent the profile from being used.