Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Results of Enabling Trusted Extensions From an Administrator's Perspective

    After the Trusted Extensions software is enabled and the system is optionally rebooted, the following security features are in place. Many features are configurable by the security administrator.

  • A label_encodings file is installed and configured.

  • Three Trusted Extensions network databases, tnrhdb, tnrhtp, and tnzonecfg are added. The tncfg command enables administrators to view and modify these trusted databases.

  • Devices must be allocated for use.

  • If you install the windowing system, the software creates a trusted desktop, Solaris Trusted Extensions (GNOME). This labeled windowing environment provides administrative workspaces in the global zone. These workspaces are protected by the Trusted Path, visible in the trusted stripe.

    Also, Trusted Extensions provides GUIs to administer the system. For a list, see Chapter 7, Trusted Extensions Administration Tools.