Performing Common Tasks in Trusted Extensions
The following task map describes common administrative procedures in Trusted Extensions.
Table 15 Performing Common Administrative Tasks in Trusted Extensions Task Map
| | |
Change the password for root.
| Specifies a new password for the root role.
|
|
Reflect a password change in a labeled zone.
| Reboots the zone to update the zone that a password has changed.
|
|
Use the Secure Attention key combination.
| Gets control of the mouse or keyboard. Also, tests whether the mouse
or keyboard is trusted.
|
|
Determine the hexadecimal number for a label.
| Displays the internal representation for a text label.
|
|
Determine the text representation for a label.
| Displays the text representation for a hexadecimal label.
|
|
Allocate a device.
| Enables users to allocate devices. Uses a peripheral device to add information to or remove information
from the system.
|
|
Change a system configuration file.
| Changes default Trusted Extensions and Oracle Solaris security values.
|
|
Administer a system remotely.
| Administers Trusted Extensions systems from a remote system.
|
|
|