Trusted Extensions software uses rights profiles, roles, auditing, privileges, and other security features of the Solaris OS. You can use Solaris Secure Shell (SSH), BART, the Solaris cryptographic framework, IPsec, and IPfilter with Trusted Extensions.
As in the Solaris OS, users can be limited to using applications that are necessary for performing their jobs. Other users can be authorized to do more.
As in the Solaris OS, capabilities that were formerly assigned to superuser are assigned to separate, discrete “roles.”
As in the Solaris OS, privileges protect processes. Zones are also used to separate processes.
As in the Solaris OS, events on the system can be audited.
Trusted Extensions uses the system configuration files of the Solaris OS, such as policy.conf and exec_attr.