Decisions to Make Before Creating Users in Trusted Extensions
The following decisions affect what users are able to do in Trusted
Extensions and how much effort is required. Some decisions are the same as
the decisions that you would make when installing the Solaris OS. However, decisions
that are specific to Trusted Extensions can affect site security and ease of
Decide whether to change default user security attributes in the policy.conf file. User defaults in the label_encodings file were configured by the initial setup team. For a description of the defaults, see Default User Security Attributes in Trusted Extensions.
Decide which startup files, if any, to copy or link from each user's minimum-label home directory to the user's higher-level home directories. For the procedure, see How to Configure Startup Files for Users in Trusted Extensions.
Decide if users can access peripheral devices, such as the microphone, CD-ROM drive, and JAZ drive.
If access is permitted to some users, decide if your site requires additional authorizations to satisfy site security. For the default list of device-related authorizations, see How to Assign Device Authorizations. For a finer-grained set of device authorizations, see Customizing Device Authorizations in Trusted Extensions (Task Map).