This chapter describes how to administer and use devices on a system that is configured with Solaris Trusted Extensions.
Handling Devices in Trusted Extensions (Task Map)
Using Devices in Trusted Extensions (Task Map)
Managing Devices in Trusted Extensions (Task Map)
Customizing Device Authorizations in Trusted Extensions (Task Map)