Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017

Performing Common Tasks in Trusted Extensions

The following task map describes common administrative procedures in Trusted Extensions.

Table 15  Performing Common Administrative Tasks in Trusted Extensions Task Map
For Instructions
Change the password for root.
Specifies a new password for the root role.
Reflect a password change in a labeled zone.
Reboots the zone to update the zone that a password has changed.
Use the Secure Attention key combination.
Gets control of the mouse or keyboard. Also, tests whether the mouse or keyboard is trusted.
Determine the hexadecimal number for a label.
Displays the internal representation for a text label.
Determine the text representation for a label.
Displays the text representation for a hexadecimal label.
Allocate a device.
Enables users to allocate devices.
Uses a peripheral device to add information to or remove information from the system.
Change a system configuration file.
Changes default Trusted Extensions and Oracle Solaris security values.
Administer a system remotely.
Administers Trusted Extensions systems from a remote system.