Solaris Trusted Extensions Administrator's Procedures

ProcedureHow to Copy Files From Portable Media in Trusted Extensions

It is safe practice to rename the original Trusted Extensions file before replacing the file. When configuring a system, the root role renames and copies administrative files.

Before You Begin

To copy administrative files, you must be superuser or in a role in the global zone.

  1. Allocate the appropriate device.

    For details, see How to Allocate a Device in Trusted Extensions in Solaris Trusted Extensions User’s Guide.

    In Solaris Trusted Extensions (GNOME), a File Browser displays the contents.

  2. Insert the media that contains the administrative files.

  3. If the system has a file of the same name, copy the original file to a new name.

    For example, add .orig to the end of the original file:


    # cp /etc/security/tsol/tnrhtp /etc/security/tsol/tnrhtp.orig
    
  4. Open a File Browser.

  5. Navigate to the desired destination directory, such as /etc/security/tsol

  6. For each file that you want to copy, do the following:

    1. In the File Browser for the mounted media, highlight the icon for the file.

    2. Then, drag the file to the destination directory in the second File Browser.

  7. Deallocate the device.

    For details, see How to Deallocate a Device in Trusted Extensions in Solaris Trusted Extensions User’s Guide.

  8. When prompted, eject and remove the media.


Example 4–8 Loading Audit Configuration Files in Trusted Extensions

In this example, roles are not yet configured on the system. The root user needs to copy configuration files to portable media. The contents of the media will then be copied to other systems. These files are to be copied to each system that is configured with Trusted Extensions software.

The root user allocates the floppy_0 device in the Device Allocation Manager and responds yes to the mount query. Then, the root user inserts the diskette with the configuration files and copies them to the disk. The diskette is labeled Trusted Path.

To read from the media, the root user allocates the device on the receiving host, then downloads the contents.

If the configuration files are on a tape, the root user allocates the mag_0 device. If the configuration files are on a CD-ROM, the root user allocates the cdrom_0 device.