Additional Trusted Extensions Configuration Tasks
The following tasks can be helpful in configuring a Trusted Extensions system
to your requirements. The final task enables you to remove the Trusted Extensions feature
from an Oracle Solaris.
Table 8 Additional Trusted Extensions Configuration Task Map
| | |
Inform users of site security.
| Displays a security message at login.
|
|
Create a labeled zone to contain a service that operates at the same
label as an existing zone.
| Creates a secondary zone at the same label as a primary zone.
|
|
Create a dataset to hold directories and files at all labels.
| Creates and mounts a dataset where files can be relabeled with minimal
overhead.
|
|
Create a home directory server at every label.
| Creates several home directory servers, one for every label. Or, creates
a multilevel home directory server.
|
|
Create initial users who can assume roles.
| Creates users whom you trust to administer the system when they assume
a role.
|
|
Remove Trusted Extensions.
| Removes Trusted Extensions and all trusted data from your system. Also readies
the Oracle Solaris system to run Trusted Extensions.
|
|
|