Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017

Administration Tools for Trusted Extensions

Administration on a system that is configured with Trusted Extensions uses many of the same tools that are available in the Oracle Solaris OS. Trusted Extensions offers security-enhanced tools as well. Administration tools are available only to roles.

On a desktop system in a role workspace, you can access commands, applications, and scripts that are trusted. The following table summarizes these administrative tools. Command line tools are available on systems that are not running a desktop.

Table 13  Trusted Extensions Administrative Tools
For More Information
Enables and disables Trusted Extensions.
Also used to install a label encodings file.
Creates the Labeled Zone Manager GUI for creating and configuring labeled zones, including networking.
Command-line options enable automatic creation of user-named zones.
txzonemgr is a zenity (1) script.
Device Manager
Used to administer the label ranges of devices, and to allocate and deallocate devices.
Label Builder
Is also a user tool. Appears when a program requires you to choose a label.
Selection Manager
Is also a tool for users who are authorized to change the security level of data. Appears when a program requires you to change the security level of data.
Trusted Extensions commands
Used to perform administrative tasks
For the list of administrative commands and configuration files, see List of Trusted Extensions Man Pages.