|Skip Navigation Links|
|Exit Print View|
|Trusted Extensions Configuration and Administration Oracle Solaris 11 Information Library|
Trusted Extensions software is designed to be configured by two people with distinct responsibilities. This task division can be enforced by roles. Because discrete roles and additional users are not created until after installation, it is a good practice to have an initial setup team of at least two people present to enable and configure Trusted Extensions software.