Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Performing Common Tasks in Trusted Extensions

The following task map describes common administrative procedures in Trusted Extensions.

Table 9-2  Performing Common Administrative Tasks in Trusted Extensions Task Map
Task
Description
For Instructions
Change the password for root.
Specifies a new password for the root role.
Reflect a password change in a labeled zone.
Reboots the zone to update the zone that a password has changed.
Use the Secure Attention key combination.
Gets control of the mouse or keyboard. Also, tests whether the mouse or keyboard is trusted.
Determine the hexadecimal number for a label.
Displays the internal representation for a text label.
Determine the text representation for a label.
Displays the text representation for a hexadecimal label.
Allocate a device.
Enables users to allocate devices.
Uses a peripheral device to add information to or remove information from the system.
Change a system configuration file.
Changes default Trusted Extensions and Oracle Solaris security values.
Administer a system remotely.
Administers Trusted Extensions systems from a remote system.