Solaris Trusted Extensions Installation and Configuration

ProcedureVerify That the Trusted Extensions Roles Work

To verify each role, assume the role. Then, perform tasks that only that role can perform.

Before You Begin

If you have configured DNS or routing, you must reboot after you create the roles and before you verify that the roles work.

  1. For each role, log in as a user who can assume the role.

  2. Open the Trusted Path menu.

    • In Trusted CDE, click the workspace switch area.

    • In Trusted JDS, click the trusted symbol.

    Illustration shows the Trusted Path menu in CDE.
  3. From the menu, assume the role.

  4. In the role workspace, start the Solaris Management Console.


    $ /usr/sbin/smc &
    
  5. Select the appropriate scope for the role that you are testing.

  6. Click System Services, and navigate to Users.

    You are prompted for a password.

    1. Type the role password.

    2. Double-click User Accounts.

  7. Click a user.

    • The System Administrator role should be able to modify fields under the General, Home Directory, and Group tabs.

    • The Security Administrator role should be able to modify fields under all tabs.

    • The Primary Administrator role should be able to modify fields under all tabs.