Administration on a system that is configured with Trusted Extensions uses many of the same tools that are available in the Solaris OS. Trusted Extensions offers security-enhanced tools as well. Administration tools are available only to roles in a role workspace.
Within a role workspace, you can access commands, applications, and scripts that are trusted. The following table summarizes these administrative tools.
Table 8–1 Trusted Extensions Administrative Tools
Tool |
Description |
For More Information |
---|---|---|
Provides a menu-based wizard for creating, installing, initializing, and booting zones. The script also provides menu items for networking options, name services options, and for clienting the global zone to an existing LDAP server. txzonemgr uses the zenity command. |
See also the zenity(1) man page. |
|
Used to administer the label ranges of devices, and to allocate or deallocate devices. |
See Device Manager and Handling Devices in Trusted Extensions (Task Map). |
|
Solaris Management Console |
Used to configure users, roles, rights, hosts, zones, and networks. This tool can update local files or LDAP databases. This tool can also launch the dtappsession legacy application. |
For basic functionality, see Chapter 2, Working With the Solaris Management Console (Tasks), in System Administration Guide: Basic Administration. For information that is specific to Trusted Extensions, see Solaris Management Console Tools. |
Solaris Management Console commands, such as smuser and smtnzonecfg |
Is the command-line interface for the Solaris Management Console. |
For a list, see Table 8–2. |
Label Builder |
Is also a user tool. Appears when a program requires you to choose a label. |
For an example, see How to Modify a User's Label Range in the Solaris Management Console. |
Trusted Extensions commands |
Used to perform tasks that are not covered by Solaris Management Console tools. |
For the list of administrative commands, see Table 8–3. |