Creating Roles and Users in Trusted Extensions
Role creation in
Trusted Extensions is identical to role creation in Oracle Solaris.
Table 4-4 Creating Roles and Users in Trusted Extensions Task Map
| | |
| Creates seven roles that are defined by the ARMOR standard and assigns them.
|
|
Create a security administrator role.
|
Creates a role to handle security-relevant tasks.
|
|
Create a system administrator role.
| Creates a role to handle system administration tasks that are not related
to security.
|
|
Create users to assume the administrative roles.
| Creates one or more users who can assume roles.
|
|
Verify that the roles can perform their tasks.
| Tests the roles.
|
|
Enable users to log in to a labeled zone.
| Starts the zones service so that regular users can
log in.
|
|
|