|Skip Navigation Links|
|Exit Print View|
|Trusted Extensions Configuration and Administration Oracle Solaris 11.1 Information Library|
After the Trusted Extensions software is enabled and the system is rebooted, the following security features are in place. Many features are configurable by the security administrator.
An Oracle label_encodings file is installed and configured.
A trusted desktop, Solaris Trusted Extensions (GNOME), creates a labeled windowing environment that provides administrative workspaces in the global zone. These workspaces are protected by the Trusted Path, visible in the trusted stripe.
As in the Oracle Solaris OS, rights profiles for roles are defined. As in the Oracle Solaris OS, root is the only defined role.
To use additional roles to administer Trusted Extensions, you must create the roles. During configuration, you create the Security Administrator role.
Three Trusted Extensions network databases, tnrhdb, tnrhtp, and tnzonecfg are added. The tncfg command enables administrators to view and modify these trusted databases.
Trusted Extensions provides GUIs to administer the system. For a full list, see Chapter 7, Trusted Extensions Administration Tools.
The txzonemgr script enables administrators to configure Trusted Extensions zones and networking. For more information, see the txzonemgr(1M) man page.
The Device Manager manages the allocation and labeling of attached devices.