Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017

Handling Devices in Trusted Extensions

The following task map links to task maps for administrators and users for handling peripheral devices.

Table 30  Handling Devices in Trusted Extensions Task Map
For Instructions
Use devices.
Uses a device as a role or as a regular user.
Administer devices.
Configures devices for regular users.
Customize device authorizations.
The Security Administrator role creates new device authorizations, adds them to the device, places them in a rights profile and assigns this profile to the user.