Trusted Solaris Administrator's Procedures

Types of Software

The following types of software can be added to the Trusted Solaris operating environment:

Two distinct roles handle software evaluation and installation, the System Administrator role and the Security Administrator role.

Administrator Role Responsibilities

The System Administrator role installs software that meets the following criteria:

The System Administrator role also controls who can bring in software by granting or denying the device allocation authorization to individual users. An account with the device allocation authorization can import or export data at any single label within that user's clearance.

Security Administrator Role Responsibilities

The Security Adminstrator evaluates software for its ability to be trusted. As configured in the default system, the Security Administrator role can do the following:

See the Trusted Solaris Developer's Guide for how programmers can manipulate privileges.