Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: March 2019
 
 
Part II

Administration of Trusted Extensions

The chapters in this part describe how to administer Trusted Extensions.

Trusted Extensions Administration Concepts introduces the Trusted Extensions feature.

Trusted Extensions Administration Tools describes the administrative programs that are specific to Trusted Extensions.

About Security Requirements on a Trusted Extensions System describes the fixed and configurable security requirements in Trusted Extensions.

Common Tasks in Trusted Extensions introduces Trusted Extensions administration.

About Users, Rights, and Roles in Trusted Extensions introduces role-based access control (RBAC) in Trusted Extensions.

Managing Users, Rights, and Roles in Trusted Extensions provides instructions on managing regular users of Trusted Extensions.

Managing Zones in Trusted Extensions provides instructions on managing labeled zones.

Managing and Mounting Files in Trusted Extensions provides instructions on managing mounting, backing up the system, and other file-related tasks in Trusted Extensions.

Trusted Networking provides an overview of the network databases and routing in Trusted Extensions.

Managing Networks in Trusted Extensions provides instructions on managing the network databases and routing in Trusted Extensions.

About Multilevel Mail in Trusted Extensions describes mail-specific issues in Trusted Extensions.

Managing Labeled Printing provides instructions on handling printing in Trusted Extensions.

Trusted Extensions and Auditing provides Trusted Extensions-specific information about auditing.

Software Management in Trusted Extensions describes how to administer applications on a Trusted Extensions system.

Chapter 7

Trusted Extensions Administration Concepts

This chapter introduces you to administering a system that is configured with the Trusted Extensions feature.