Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: November 2020
 
 

Customizing the User Environment for Security

The following task map describes common tasks that you can perform when customizing a system for all users, or when customizing an individual user's account. Many of these tasks are performed before regular users can log in.


Note -  If you are using the account-policy SMF stencil and config/etc_security_policyconf is enabled, then system-wide security policy is determined by the rbac/* SMF properties, not by the variables in the policy.conf file. For examples of viewing and changing account-policy properties, see the procedures in Modifying Rights System-Wide As SMF Properties in Securing Users and Processes in Oracle Solaris 11.4. See also the account-policy(8S) man page.
Table 15  Customizing the User Environment for Security Task Map
Task
Description
For Instructions
Change label attributes.
Modify label attributes, such as minimum label and default label view, for a user account.
Change Trusted Extensions policy for all users of a system.
See the preceding note.
Changes the policy.conf file.
Removes unnecessary privileges from all regular users of a system.
Prevents labels from appearing on printed output at a public kiosk.
Configure initialization files for users.
Configures startup files, such as .bashrc, .cshrc, and .copy_files for all users.