Administration Tools for Trusted Extensions
Administration on a system that is configured with Trusted Extensions uses
many of the same tools that are available in the Oracle Solaris OS. Trusted Extensions offers
security-enhanced tools as well. Administration tools are available only to
roles.
On a desktop system in a role workspace, you can
access commands, applications, and scripts that are trusted. The following
table summarizes these administrative tools. Command line tools are available on systems that are not running a desktop.
Table 7-1 Trusted Extensions Administrative
Tools
| | |
| Enables and disables Trusted Extensions. Also used to install a label encodings file.
|
|
|
Creates the Labeled Zone Manager GUI for creating and configuring labeled zones, including
networking.
Command-line options enable automatic creation of user-named zones.
|
txzonemgr is a zenity (1) script.
|
| Used to administer the label ranges of devices, and to allocate and
deallocate devices.
|
|
Label Builder
| Is also a user tool. Appears when a program requires you to choose a
label.
|
|
Selection Manager
| Is also a tool for users who are authorized to change the security level
of data. Appears when a program requires you to change the security level
of data.
|
|
Trusted Extensions commands
| Used to perform administrative tasks
|
|
|