Managing Devices in Trusted Extensions
The following task map describes procedures to protect devices at your
site.
Table 32 Managing Devices in Trusted Extensions Task Map
| | |
Set or modify device policy.
| Changes the privileges that are required to access a device.
|
|
Authorize users to allocate a device.
| The Security Administrator role assigns a rights profile with the Allocate
Device authorization to the user.
|
|
The Security Administrator role assigns a profile with the site-specific
authorizations to the user.
|
|
Configure a device.
| Chooses security features to protect the device.
|
|
Revoke or reclaim a device.
| Uses the Device Manager to make a device available for use.
|
|
Uses Oracle Solaris commands to make a device available or unavailable for use.
|
|
Prevent access to an allocatable device.
| Provides fine–grained access control to a device.
|
|
Denies everyone access to an allocatable device.
|
|
Protect printers and frame buffers.
| Ensures that nonallocatable devices are not allocatable.
|
|
Use a new device-clean script.
| Places a new script in the appropriate places.
|
|
|