It is safe practice to rename the original Trusted Extensions file before replacing the file. When configuring a system, the root role renames and copies administrative files.
Before You Begin
To copy administrative files, you must be in the root role in the global zone.
# allocate cdrom0
On a windowed system, you can use the Device Manager. For details, see How to Allocate a Device in Trusted Extensions in Trusted Extensions User’s Guide.
For example, add .orig to the end of the original file:
# cp /etc/security/policy.conf /etc/security/policy.conf.orig
For example, transfer the policy.conf file.
# cp /dev/rdsk/cdrom0/trusted/* /tmp # cp /tmp/policy.conf /etc/security/policy.conf
# deallocate cdrom0
To deallocate from the Device Manager, see How to Deallocate a Device in Trusted Extensions in Trusted Extensions User’s Guide.
# eject cdrom0