<?Pub UDT _bookmark _target?><chapter id="roles-1"><?Pub Tag atict:info tracking="on" ref="10"?><?Pub Tag atict:user
user="sharonr" fullname="Sharon Veach"?><title>Getting Started as a Trusted Extensions Administrator
(Tasks)</title><highlights><para>This chapter introduces you to administering a system that is configured
with Solaris Trusted Extensions.</para><itemizedlist remap="jumplist"><listitem><para><olink targetptr="tx-new-2" remap="internal">What's New in Trusted Extensions</olink></para>
</listitem><listitem><para><olink targetptr="roles-2" remap="internal">Security Requirements When Administering
Trusted Extensions</olink></para>
</listitem><listitem><para><olink targetptr="roles-4" remap="internal">Getting Started as a Trusted Extensions
Administrator (Task Map)</olink></para>
</listitem>
</itemizedlist>
</highlights><sect1 id="tx-new-2"><title>What's New in Trusted Extensions</title><indexterm><primary>mounting</primary><secondary>NFSv3 file systems</secondary>
</indexterm><indexterm><primary>file systems</primary><secondary>NFSv3</secondary>
</indexterm><indexterm><primary>service management facility (SMF)</primary><secondary>Trusted Extensions service</secondary>
</indexterm><indexterm><primary>enabling</primary><secondary>DOI different from <literal>1</literal></secondary>
</indexterm><indexterm><primary>Trusted Extensions DOI</primary><secondary>enabling DOI different from <literal>1</literal></secondary>
</indexterm><para><emphasis role="strong">Solaris Express Community Edition &ndash;</emphasis> In
this release, Trusted Extensions provides the following features:</para><itemizedlist><listitem><para>The Trusted Extensions shared IP stack allows default routes to
isolate labeled zones from each other and from the global zone.</para>
</listitem><listitem><para>The loopback interface, <literal>lo0</literal>, is an <literal>all-zones</literal> interface.</para>
</listitem><listitem><para>Separation of duty can be enforced by role. The System Administrator
role creates users, but cannot assign passwords. The Security Administrator
role assigns passwords, but cannot create users. For details, see <olink targetptr="txconf-95" remap="internal">Create Rights
Profiles That Enforce Separation of Duty</olink>.</para>
</listitem><listitem><para>This guide includes a list of Trusted Extensions man pages in <olink targetptr="txmp-1" remap="internal">Appendix&nbsp;E, List of Trusted Extensions Man Pages</olink>.</para>
</listitem>
</itemizedlist><para><emphasis role="strong">Solaris Express Developer Edition&nbsp;1/08 &ndash;</emphasis> In this release, Trusted Extensions provides the following features:</para><itemizedlist><listitem><para>The service management facility (SMF) manages Trusted Extensions as
the <literal>svc:/system/labeld</literal> service. By default, the <literal>labeld</literal> service is disabled. When the service is enabled, the system must
still be configured and rebooted to enforce Trusted Extensions security policies.</para>
</listitem><listitem><itemizedlist><para>The CIPSO Domain of Interpretation (DOI) number that your system uses
is configurable.</para><listitem><para>For information about the DOI, see <olink targetptr="tnetov-40" remap="internal">Network
Security Attributes in Trusted Extensions</olink>.</para>
</listitem><listitem><para>To specify a DOI that differs from the default, see <olink targetptr="txconf-92" remap="internal">Configure the
Domain of Interpretation</olink>.</para>
</listitem>
</itemizedlist>
</listitem><listitem><para>Trusted Extensions recognizes CIPSO labels in NFS Version 3 (NFSv3)
mounted file systems, as well as in NFS Version 4 (NFSv4). Therefore, you
can mount NFSv3 file systems on a Trusted Extensions system as a labeled file
system. To use udp as an underlying protocol for multilevel mounts in NFSv3,
see <olink targetptr="managezones-28" remap="internal">How to Configure a Multilevel Port for
NFSv3 Over udp</olink>.</para>
</listitem><listitem><para>The name service cache daemon, <command>nscd</command>, can
be configured to run in every labeled zone at the label of the zone.</para>
</listitem>
</itemizedlist>
</sect1><sect1 id="roles-2"><title>Security Requirements When Administering Trusted Extensions</title><indexterm><primary>login</primary><secondary>by roles</secondary>
</indexterm><indexterm><primary>roles</primary><secondary>assuming</secondary>
</indexterm><indexterm><primary>roles</primary><secondary>workspaces</secondary>
</indexterm><indexterm><primary>workspaces</primary><secondary>global zone</secondary>
</indexterm><indexterm><primary>role workspace</primary><secondary>global zone</secondary>
</indexterm><para>In Trusted Extensions, roles are the conventional way to administer the
system. Typically, superuser is not used. Roles are created just as they are
in the Solaris OS, and most tasks are performed by roles. In Trusted Extensions,
the <literal>root</literal> user is not used to perform administrative tasks.</para><itemizedlist><para>The following roles are typical of a Trusted Extensions site:</para><listitem><para><literal>root</literal> <emphasis role="strong">role &ndash;</emphasis> Created
by the initial setup team</para>
</listitem><listitem><para><emphasis role="strong">Security Administrator role &ndash;</emphasis> Created
during or after initial configuration by the initial setup team</para>
</listitem><listitem><para><emphasis role="strong">System Administrator role &ndash;</emphasis> Created
by the Security Administrator role</para>
</listitem>
</itemizedlist><para>As in the Solaris OS, you might also create a Primary Administrator role,
an Operator role, and so on. With the exception of the <literal>root</literal> role,
the roles that you create can be administered in a naming service.</para><para>As in the Solaris OS, only users who have been assigned a role can assume
that role. In Solaris Trusted Extensions (CDE), you can assume a role from a desktop menu called the
Trusted Path menu. In Solaris Trusted Extensions (GNOME), you can
assume a role when your user name is displayed in the Trusted Stripe. The
role choices appear when you click your user name.</para><sect2 id="roles-13"><title>Role Creation in Trusted Extensions</title><indexterm><primary>roles</primary><secondary>creating</secondary>
</indexterm><para>To administer Trusted Extensions, you create roles that divide system and
security functions. The initial setup team created the Security Administrator
role during configuration. For details, see <olink targetptr="txconf-23" remap="internal">Create the
Security Administrator Role in Trusted Extensions</olink>.</para><itemizedlist><para>The process of creating a role in Trusted Extensions is identical to the Solaris OS process.
As described in <olink targetptr="txtool-1" remap="internal">Chapter&nbsp;8, Trusted Extensions Administration Tools</olink>, the Solaris Management Console is the GUI for managing roles in Trusted Extensions.</para><listitem><para>For an overview of role creation, see <olink targetdoc="group-sa" targetptr="rbacref-1" remap="external">Chapter 10, <citetitle remap="chapter">Role-Based Access Control (Reference),</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink> and <olink targetdoc="group-sa" targetptr="rbactask-14" remap="external"><citetitle remap="section">Using RBAC (Task Map)</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink>.</para>
</listitem><listitem><para>To create a powerful role that is equivalent to superuser,
see <olink targetdoc="group-sa" targetptr="smcover-61" remap="external"><citetitle remap="section">Creating the Primary Administrator Role</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>. At sites that
use Trusted Extensions, the Primary Administrator role might violate security
policy. These sites would turn <literal>root</literal> into a role, and create
a Security Administrator role.</para>
</listitem><listitem><para>To create the <literal>root</literal> role, see <olink targetdoc="group-sa" targetptr="rbactask-20" remap="external"><citetitle remap="section">How to Make root User Into a Role</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink>.</para>
</listitem><listitem><para>To create roles by using the Solaris Management Console, see <olink targetdoc="group-sa" targetptr="rbactask-32" remap="external"><citetitle remap="section">How to Create and Assign a Role by Using the GUI</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink>. </para>
</listitem>
</itemizedlist>
</sect2><sect2 id="roles-12"><title>Role Assumption in Trusted Extensions</title><indexterm><primary>restricting</primary><secondary>access to global zone</secondary>
</indexterm><para>Unlike the Solaris OS, Trusted Extensions provides an Assume <replaceable>Rolename</replaceable> Role menu item from the Trusted Path menu. After confirming
the role password, the software activates a role workspace with the trusted
path attribute. Role workspaces are administrative workspaces. Such workspaces
are in the global zone.</para>
</sect2>
</sect1><sect1 id="roles-4"><title>Getting Started as a Trusted Extensions Administrator
(Task Map)</title><indexterm><primary>accessing</primary><secondary>administrative tools</secondary>
</indexterm><indexterm><primary>administrative tools</primary><secondary>accessing</secondary>
</indexterm><indexterm><primary>Getting Started as a Trusted Extensions Administrator (Task Map)</primary>
</indexterm><indexterm><primary>tasks and task maps</primary><secondary>Getting Started as a Trusted Extensions Administrator (Task Map)</secondary>
</indexterm><para>Familiarize yourself with the following procedures before administering Trusted Extensions.</para><informaltable frame="all" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><colspec colwidth="28.71*"/><colspec colwidth="32.95*"/><colspec colwidth="37.35*"/><thead><row><entry><para>Task</para>
</entry><entry><para>Description</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry><para>Log in.</para>
</entry><entry><para>Logs you in securely.</para>
</entry><entry><para><olink targetdoc="trssug" targetptr="uglog-18" remap="external"><citetitle remap="section">Logging In to Trusted Extensions</citetitle> in <citetitle remap="book">Solaris Trusted Extensions User&rsquo;s Guide</citetitle></olink></para>
</entry>
</row><row><entry><para>Perform common user tasks on a desktop.</para>
</entry><entry><para>These tasks include:</para><itemizedlist><listitem><para>Configuring your workspaces</para>
</listitem><listitem><para>Using workspaces at different labels</para>
</listitem><listitem><para>Accessing Trusted Extensions man pages</para>
</listitem><listitem><para>Accessing Trusted Extensions online help</para>
</listitem>
</itemizedlist>
</entry><entry><para><olink targetdoc="trssug" targetptr="txwork-6" remap="external"><citetitle remap="section">Working on a Labeled System</citetitle> in <citetitle remap="book">Solaris Trusted Extensions User&rsquo;s Guide</citetitle></olink></para>
</entry>
</row><row><entry><para>Perform tasks that require the trusted path.</para>
</entry><entry><para>These tasks include:</para><itemizedlist><listitem><para>Allocating a device</para>
</listitem><listitem><para>Changing your password</para>
</listitem><listitem><para>Changing the label of a workspace</para>
</listitem>
</itemizedlist>
</entry><entry><para><olink targetdoc="trssug" targetptr="ugelem-16" remap="external"><citetitle remap="section">Performing Trusted Actions</citetitle> in <citetitle remap="book">Solaris Trusted Extensions User&rsquo;s Guide</citetitle></olink></para>
</entry>
</row><row><entry><para>Create useful roles.</para>
</entry><entry><para>Creates administrative roles for your site. Creating roles in LDAP is
a one-time task.</para><para>The Security Administrator role is a useful role.</para>
</entry><entry><para><olink targetptr="roles-13" remap="internal">Role Creation in Trusted Extensions</olink></para><para><olink targetptr="txconf-23" remap="internal">Create the Security Administrator Role in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>(Optional) Make <literal>root</literal> a role.</para>
</entry><entry><para>Prevents anonymous login by <literal>root</literal>. This task is done
once per system.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="rbactask-20" remap="external"><citetitle remap="section">How to Make root User Into a Role</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para>Assume a role.</para>
</entry><entry><para>Enters the global zone in a role. All administrative tasks are performed
in the global zone.</para>
</entry><entry><para><olink targetptr="commontasks-19" remap="internal">How to Enter the Global Zone in Trusted
Extensions</olink></para>
</entry>
</row><row><entry><para>Exit a role workspace and become regular user.</para>
</entry><entry><para>Leaves the global zone.</para>
</entry><entry><para><olink targetptr="roles-14" remap="internal">How to Exit the Global Zone in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Locally administer users, roles, rights, zones, and networks.</para>
</entry><entry><para>Uses the Solaris Management Console to manage the distributed system.</para>
</entry><entry><para><olink targetptr="roles-15" remap="internal">How to Administer the Local System With
the Solaris Management Console</olink></para>
</entry>
</row><row><entry><para>Administer the system by using Trusted CDE actions.</para>
</entry><entry><para>Uses the administrative actions in the Trusted_Extensions folder.</para>
</entry><entry><para><olink targetptr="commontasks-42" remap="internal">How to Start CDE Administrative Actions
in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Edit an administrative file.</para>
</entry><entry><para>Edits files in a trusted editor.</para>
</entry><entry><para><olink targetptr="roles-10" remap="internal">How to Edit Administrative Files in Trusted
Extensions</olink></para>
</entry>
</row><row><entry><para>Administer device allocation in Trusted CDE.</para>
</entry><entry><para>Uses the Device Allocation Manager &ndash; Device Administration GUI.</para>
</entry><entry><para><olink targetptr="managedev-33" remap="internal">Managing Devices in Trusted Extensions
(Task Map)</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable><task id="commontasks-19"><title>How to Enter the Global Zone in Trusted Extensions</title><indexterm><primary>privileges</primary><secondary>when executing commands</secondary>
</indexterm><indexterm><primary>commands</primary><secondary>executing with privilege</secondary>
</indexterm><indexterm><primary>roles</primary><secondary>assuming</secondary>
</indexterm><indexterm><primary>global zone</primary><secondary>entering</secondary>
</indexterm><indexterm><primary>administering</primary><secondary>from the global zone</secondary>
</indexterm><indexterm><primary>assuming</primary><secondary>roles</secondary>
</indexterm><indexterm><primary>accessing</primary><secondary>global zone</secondary>
</indexterm><indexterm><primary>Trusted Path menu</primary><secondary>Assume Role</secondary>
</indexterm><indexterm><primary>Assume Role menu item</primary>
</indexterm><tasksummary><para>By assuming a role, you enter the global zone in Trusted Extensions. Administration
of the entire system is possible only from the global zone. Only superuser
or a role can enter the global zone.</para><para>After assuming a role, the role can create a workspace at a user label
to edit administration files in a labeled zone.</para><para>For troubleshooting purposes, you can also enter the global zone by
starting a Failsafe session. For details, see <olink targetptr="manageusers-18" remap="internal">How
to Log In to a Failsafe Session in Trusted Extensions</olink>.</para>
</tasksummary><taskprerequisites><para>You have created one or more roles, or you plan to enter the global
zone as superuser. For pointers, see <olink targetptr="roles-13" remap="internal">Role Creation
in Trusted Extensions</olink>.</para>
</taskprerequisites><procedure><step><para>Use a trusted mechanism.</para><stepalternatives><step><para>In Solaris Trusted Extensions (GNOME), click your user
name in the trusted stripe and choose a role.</para><para>If you have been
assigned a role, the role names are displayed in a list.</para><para>For the location and significance of Trusted Extensions desktop features,
see <olink targetdoc="trssug" targetptr="ugelem-1" remap="external">Chapter 4, <citetitle remap="chapter">Elements of Trusted Extensions (Reference),</citetitle> in <citetitle remap="book">Solaris Trusted Extensions User&rsquo;s Guide</citetitle></olink>.</para>
</step><step><para>In Solaris Trusted Extensions (CDE), open the Trusted Path menu.</para><substeps><step id="step-tpmenu-1"><para>Click mouse button 3 over the workspace switch
area.</para><mediaobject><imageobject><imagedata entityref="WorkspaceSwitchArea.tiff"/>
</imageobject><textobject><simpara>The illustration shows the Workspace Switch Area in Trusted
CDE.</simpara>
</textobject>
</mediaobject>
</step><step><para>Choose Assume <replaceable>rolename</replaceable> Role from the
Trusted Path menu.</para>
</step>
</substeps>
</step>
</stepalternatives>
</step><step><para>At the prompt, type the role password.</para><para><indexterm><primary>desktops</primary><secondary>workspace color changes</secondary></indexterm><indexterm><primary>workspaces</primary><secondary>color changes</secondary></indexterm>In Trusted CDE, a new role workspace is created, the workspace switch
button changes to the color of the role desktop, and the title bar above each
window shows <literal>Trusted Path</literal>. In Trusted GNOME,
the current workspace changes to the role workspace.</para><para>In Trusted CDE, you leave a role workspace by using the mouse to choose a
regular user workspace. You can also delete the last role workspace to exit
a role. In Trusted GNOME, you can click the role
name on the trusted stripe, and from the menu, select a different role or
user. This action changes the current workspace to the process of the new
role or user.</para>
</step>
</procedure>
</task><task id="roles-14"><title>How to Exit the Global Zone in Trusted Extensions</title><indexterm><primary>global zone</primary><secondary>exiting</secondary>
</indexterm><indexterm><primary>roles</primary><secondary>leaving role workspace</secondary>
</indexterm><tasksummary><para>The menu locations for exiting a role are different in Trusted GNOME and Trusted CDE.</para>
</tasksummary><taskprerequisites><para>You are in the global zone.</para>
</taskprerequisites><procedure remap="single-step"><step><para>On both desktops, you can click a user workspace in the Workspace
Switch area.</para><para>You can also exit the role workspace, and therefore
the global zone, by doing one of the following:</para><stepalternatives><step><para>In Trusted GNOME, click your role
name in the trusted stripe.</para><para>When you click the role name, your
user name and a list of roles that you can assume is displayed. When you select
your user name, all subsequent windows that you create in that workspace are
created by the selected name. The windows that you previously created on the
current desktop continue to display at the name and label of the role.</para><para>If you choose a different role name, you remain in the global zone in
a different role.</para>
</step><step><para>In Trusted CDE, delete the role workspace.</para><para>Click mouse
button 3 over the workspace button and select Delete. You are returned to
the last workspace you occupied.</para>
</step>
</stepalternatives>
</step>
</procedure>
</task><task id="roles-15"><title>How to Administer the Local System With the Solaris Management Console</title><indexterm><primary>Solaris Management Console</primary><secondary>starting</secondary>
</indexterm><indexterm><primary>administrative tools</primary><secondary>Solaris Management Console</secondary>
</indexterm><indexterm><primary>accessing</primary><secondary>Solaris Management Console</secondary>
</indexterm><tasksummary><para>The first time that you launch the Solaris Management Console on a system, a delay occurs
while the tools are registered and various directories are created. This delay
typically occurs during system configuration. For the procedure, see <olink targetptr="confsys-21" remap="internal">Initialize
the Solaris Management Console Server in Trusted Extensions</olink>.</para><para>To administer a remote system, see <olink targetptr="remotead-21" remap="internal">Administering
Trusted Extensions Remotely (Task Map)</olink>.</para>
</tasksummary><taskprerequisites><para>You must have assumed a role. For details, see <olink targetptr="commontasks-19" remap="internal">How to Enter the Global Zone in Trusted Extensions</olink>.</para>
</taskprerequisites><procedure><step><para>Start the Solaris Management Console.</para><para>In Solaris Trusted Extensions (GNOME),
use the command line. In Trusted CDE, you have three choices. </para><stepalternatives><step><para>Use the <command>smc</command> command in a terminal
window.</para><screen>$ <userinput>/usr/sbin/smc &amp;</userinput></screen>
</step><step><para>From the Tools pull-up menu on the Front Panel, click
the Solaris Management Console icon.</para>
</step><step><para>In the Trusted_Extensions folder, double-click the Solaris Management Console icon.</para>
</step>
</stepalternatives>
</step><step><para>Choose Console -&gt; Open Toolbox.</para>
</step><step><para>From the list, select a Trusted Extensions toolbox of the appropriate
scope.</para><para>A Trusted Extensions toolbox has <literal>Policy=TSOL</literal> as
part of its name. The Files scope updates local files on the current system.
The LDAP scope updates LDAP directories on the Sun <trademark>Java</trademark> System Directory Server. The toolbox names
appear similar to the following:</para><screen>This Computer (<replaceable>this-host</replaceable>: <literal>Scope=Files, Policy=TSOL</literal>)
This Computer (<replaceable>ldap-server</replaceable>: <literal>Scope=LDAP, Policy=TSOL</literal>)</screen>
</step><step><para>Navigate to the desired Solaris Management Console tool.</para><para>The password prompt
is displayed.</para><para>For tools that Trusted Extensions has modified, click System Configuration.</para>
</step><step><para>Type the password.</para><para>Refer to the online help for additional
information about Solaris Management Console tools. For an introduction to the tools that Trusted Extensions modifies,
see <olink targetptr="txtool-8" remap="internal">Solaris Management Console Tools</olink>.</para>
</step><step><para>To close the GUI, choose Exit from the Console menu.</para>
</step>
</procedure>
</task><task id="commontasks-42"><title>How to Start CDE Administrative Actions in Trusted Extensions</title><indexterm><primary>administrative actions</primary><secondary>in Trusted_Extensions folder</secondary>
</indexterm><indexterm><primary>administrative tools</primary><secondary>in Trusted_Extensions folder</secondary>
</indexterm><indexterm><primary>accessing</primary><secondary>trusted CDE actions</secondary>
</indexterm><indexterm><primary>Trusted_Extensions folder</primary><secondary>using actions in</secondary>
</indexterm><procedure><step><para>Assume a role.</para><para>For details, see <olink targetptr="commontasks-19" remap="internal">How to Enter the Global Zone in Trusted Extensions</olink>.</para>
</step><step><para>In Trusted CDE, bring up the Application Manager.</para><substeps><step><para>Click mouse button 3 on the background to bring up the Workspace
menu.</para>
</step><step><para>Click Applications, then click the Application Manager menu item.</para><mediaobject><imageobject><imagedata entityref="appmgr.tiff"/>
</imageobject><textobject><simpara>Dialog box titled Application Manager shows folders,
including the Trusted_Extensions folder.</simpara>
</textobject>
</mediaobject><para>The Trusted_Extensions folder is in the Application Manager.</para>
</step>
</substeps>
</step><step><para>Open the Trusted_Extensions folder.</para>
</step><step><para>Double-click the appropriate icon.</para><para>For a list of administrative
actions, see <olink targetptr="txtool-3" remap="internal">Trusted CDE Actions</olink>.</para>
</step>
</procedure>
</task><task id="roles-10"><title>How to Edit Administrative Files in Trusted Extensions</title><indexterm><primary>actions</primary><secondary>Admin Editor</secondary>
</indexterm><indexterm><primary>editing</primary><secondary>using trusted editor</secondary>
</indexterm><indexterm><primary>files</primary><secondary>editing with trusted editor</secondary>
</indexterm><indexterm><primary>administrative actions</primary><secondary>accessing</secondary>
</indexterm><indexterm><primary>Admin Editor action</primary><secondary>opening</secondary>
</indexterm><indexterm><primary>accessing</primary><secondary>Admin Editor action</secondary>
</indexterm><indexterm><primary>system files</primary><secondary>editing</secondary>
</indexterm><indexterm><primary>Trusted_Extensions folder</primary><secondary>using Admin Editor from</secondary>
</indexterm><indexterm><primary><filename>/usr/dt/bin/trusted_edit</filename> trusted editor</primary>
</indexterm><indexterm><primary><filename>trusted_edit</filename> trusted editor</primary>
</indexterm><indexterm><primary>commands </primary><secondary><filename>trusted_edit</filename> trusted editor</secondary>
</indexterm><indexterm><primary>trusted editor</primary><secondary>starting</secondary>
</indexterm><tasksummary><para>Administrative files are edited with a trusted editor that incorporates
auditing. This editor also prevents the user from executing shell commands
and from saving to any file name other than the name of the original file.</para>
</tasksummary><procedure><step><para>Assume a role.</para><para>For details, see <olink targetptr="commontasks-19" remap="internal">How to Enter the Global Zone in Trusted Extensions</olink>.</para>
</step><step><para>Open a trusted editor.</para><stepalternatives><step><para>In Solaris Trusted Extensions (CDE), do the following:</para><substeps><step><para>To bring up the editor, click mouse button 3 on the background
to bring up the Workspace menu.</para>
</step><step><para>Click Applications, then click the Application Manager menu item.</para><para>The Trusted_Extensions folder is in the Application Manager.</para>
</step><step><para>Open the Trusted_Extensions folder.</para>
</step><step><para>Double-click the Admin Editor action.</para><para>You are prompted
to provide a file name. For the format, see <olink targetptr="roles-edit-1" remap="internal">Step&nbsp;3</olink> and <olink targetptr="roles-edit-2" remap="internal">Step&nbsp;4</olink>.</para>
</step>
</substeps>
</step><step><para>In Solaris Trusted Extensions (GNOME), do the following:</para><stepalternatives><step performance="optional"><para>To use <filename>gedit</filename> as the
trusted editor, modify the <envar>EDITOR</envar> variable.</para><para>For
details, see <olink targetptr="commontasks-24" remap="internal">How to Assign the Editor of
Your Choice as the Trusted Editor</olink>.</para>
</step><step><para>Use the command line to bring up the trusted editor.</para><screen># /usr/dt/bin/trusted_edit <replaceable>filename</replaceable></screen><para>You must provide a <replaceable>filename</replaceable> argument.</para>
</step>
</stepalternatives>
</step>
</stepalternatives>
</step><step id="roles-edit-1"><para>To create a new file, type the full path name
for the new file.</para><para>When you save the file, the editor creates a
temporary file.</para>
</step><step id="roles-edit-2"><para>To edit an existing file, type the full path
name for the existing file.</para><note><para>If your editor provides a Save As option, do not use it. Use the
editor's Save option to save the file.</para>
</note>
</step><step><para>To save the file to the specified path name, close the editor.</para>
</step>
</procedure>
</task>
</sect1>
</chapter><?Pub *0000029279 0?>