Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Getting Started as a Trusted Extensions Administrator on a Desktop System

Familiarize yourself with the following procedures before administering Trusted Extensions.

Table 9-1  Logging In and Using a Trusted Extensions Desktop
Task
Description
For Instructions
Log in to a Trusted Extensions system.
Logs you in securely.
Perform common user tasks on a desktop.
These tasks include:
  • Configuring your workspaces

  • Using workspaces at different labels

  • Using Trusted Extensions man pages

Perform tasks that require the trusted path.
These tasks include:
  • Allocating a device

  • Changing your password

  • Changing the label of a workspace

Assume a role.
Places you in the global zone in a role. All administrative tasks are performed in the global zone.
Select a user workspace.
Exits you from the global zone.