Handling Devices in Trusted Extensions
The following task map links to task maps for administrators and users
for handling peripheral devices.
Table 30 Handling Devices in Trusted Extensions Task Map
| | |
Use devices.
| Uses a device as a role or as a regular user.
|
|
Administer devices.
| Configures devices for regular users.
|
|
Customize device authorizations.
| The Security Administrator role creates new device authorizations, adds
them to the device, places them in a rights profile and assigns this profile
to the user.
|
|
|