|Skip Navigation Links|
|Exit Print View|
|Oracle Solaris Trusted Extensions Configuration and Administration Oracle Solaris 11 Express 11/10|
After the Trusted Extensions software is enabled and the system is rebooted, the following security features are in place. Many features are configurable by the security administrator.
Auditing is enabled.
An Oracle label_encodings file is installed and configured.
A trusted desktop, Solaris Trusted Extensions (GNOME), creates a labeled windowing environment that provides administrative workspaces in the global zone. These workspaces are protected by the Trusted Path, visible in the trusted stripe.
As in the Oracle Solaris OS, rights profiles for roles are defined. As in the Oracle Solaris OS, root is the only defined role.
To use additional roles to administer Trusted Extensions, you must create the roles. During configuration, you create the Security Administrator role.
Three Trusted Extensions network databases, tnrhdb, tnrhtp, and tnzonecfg are added.
Trusted Extensions provides GUIs to administer the system. Some GUIs are extensions to an Oracle Solaris OS GUI.
The txzonemgr script enables administrators to configure Trusted Extensions zones and networking. For more information, see the txzonemgr(1M) man page.
The Device Manager manages the allocation and labeling of attached devices.