Oracle Solaris Trusted Extensions Administrator's Procedures

Enforcement of Device Security in Trusted Extensions

The security administrator decides who can allocate devices and makes sure that any user who is authorized to use devices is trained. The user is trusted to do the following:

The security administrator is also responsible for enforcing proper compliance with these security requirements.