Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017
 
 

Managing Devices in Trusted Extensions

The following task map describes procedures to protect devices at your site.

Table 32  Managing Devices in Trusted Extensions Task Map
Task
Description
For Instructions
Set or modify device policy.
Changes the privileges that are required to access a device.
Authorize users to allocate a device.
The Security Administrator role assigns a rights profile with the Allocate Device authorization to the user.
The Security Administrator role assigns a profile with the site-specific authorizations to the user.
Configure a device.
Chooses security features to protect the device.
Revoke or reclaim a device.
Uses the Device Manager to make a device available for use.
Uses Oracle Solaris commands to make a device available or unavailable for use.
Prevent access to an allocatable device.
Provides fine–grained access control to a device.
Denies everyone access to an allocatable device.
Protect printers and frame buffers.
Ensures that nonallocatable devices are not allocatable.
Use a new device-clean script.
Places a new script in the appropriate places.