This procedure enables you to administer users, roles, hosts, zones, and the network on this system. On the first system that you configure, only the files scope is available.
You must be superuser.
Start the Solaris Management Console.
# /usr/sbin/smc &
The first time the Solaris Management Console is started, it performs several registration tasks. These tasks can take a few minutes.
If the Navigation pane is not visible:
In the Open Toolbox dialog box that is displayed, click Load next to this system's name under Server.
If this system does not have the recommended amount of memory and swap, it might take a few minutes for the toolboxes to display. For recommendations, see Installing or Upgrading the Solaris OS for Trusted Extensions.
From the list of toolboxes, select a toolbox whose Policy=TSOL.
Figure 4–1 shows a This Computer (this-host: Scope=Files, Policy=TSOL) toolbox. Trusted Extensions modifies tools under the System Configuration node.
Do not choose a toolbox that has no policy. Toolboxes without a listed policy do not support Trusted Extensions.
Your toolbox choice depends on which scope you want to influence.
To edit local files, choose the Files scope.
To edit LDAP databases, choose the LDAP scope.
After you complete Edit the LDAP Toolbox in the Solaris Management Console, the LDAP scope is available.
If the Navigation pane is visible, but the toolbox icons are stop signs:
If you have not yet done so, select a toolbox whose Policy=TSOL.
The following figure shows a This Computer (this-host: Scope=Files, Policy=TSOL) toolbox. Trusted Extensions modifies tools under the System Configuration node.
(Optional) Save the current toolbox.
Saving a Policy=TSOL toolbox enables a Trusted Extensions toolbox to load by default. Preferences are saved per role, per host. The host is the Solaris Management Console server.
Exit the Solaris Management Console.
For an overview of the Trusted Extensions additions to the Solaris Management Console, see Solaris Management Console Tools in Solaris Trusted Extensions Administrator’s Procedures. To use the Solaris Management Console to create security templates, see Configuring Trusted Network Databases (Task Map) in Solaris Trusted Extensions Administrator’s Procedures.