Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: March 2019

Customizing the User Environment for Security

The following task map describes common tasks that you can perform when customizing a system for all users, or when customizing an individual user's account. Many of these tasks are performed before regular users can log in.

Note -  If you are using the account-policy SMF stencil and config/etc_security_policyconf is enabled, then system-wide security policy is determined by the rbac/* SMF properties, not by the variables in the policy.conf file. For examples of viewing and changing account-policy properties, see the procedures in Modifying Rights System-Wide As SMF Properties in Securing Users and Processes in Oracle Solaris 11.4. See also the account-policy(8S) man page.
Table 15  Customizing the User Environment for Security Task Map
For Instructions
Change label attributes.
Modify label attributes, such as minimum label and default label view, for a user account.
Change Trusted Extensions policy for all users of a system.
See the preceding note.
Changes the policy.conf file.
Removes unnecessary privileges from all regular users of a system.
Prevents labels from appearing on printed output at a public kiosk.
Configure initialization files for users.
Configures startup files, such as .bashrc, .cshrc, and .copy_files for all users.