This chapter introduces you to administering a system that is configured with Solaris Trusted Extensions.
What's New in Trusted Extensions
Security Requirements When Administering Trusted Extensions
Getting Started as a Trusted Extensions Administrator (Task Map)