JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration Guide
search filter icon
search icon

Document Information

Preface

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

A.  Site Security Policy

B.  Using CDE Actions to Install Zones in Trusted Extensions

C.  Configuration Checklist for Trusted Extensions

Glossary

Index

A

B

C

D

E

F

H

I

L

M

N

P

R

S

T

U

V

W

Z

S

screens, initial display, Reboot and Log In to Trusted Extensions
security
initial setup team, Initial Setup Team Responsibilities
publications, Additional Security References
root password, Prepare an Installed Solaris System for Trusted Extensions
site security policy, Site Security Policy
Security Administrator role, creating, Create the Security Administrator Role in Trusted Extensions
separation of duty
creating rights profiles, Create Rights Profiles That Enforce Separation of Duty
planning for, Devising a Configuration Strategy for Trusted Extensions
planning for LDAP, Populate the Sun Java System Directory Server
service management framework (SMF)
dpadm, Install the Sun Java System Directory Server
dsadm, Install the Sun Java System Directory Server
labeld service, Enable Trusted Extensions
Share Logical Interface action, Specify Two IP Addresses for the System by Using a CDE Action
Share Physical Interface action, Specify One IP Address for the System by Using a CDE Action
Shut Down Zone action, Customize a Booted Zone in Trusted Extensions
site security policy
common violations, Common Security Violations
personnel recommendations, Personnel Security Recommendations
physical access recommendations, Physical Security Recommendations
recommendations, Computer Security Recommendations
tasks involved, Site Security Policy
Trusted Extensions configuration decisions, Site Security Policy and Trusted Extensions
understanding, Understanding Your Site's Security Policy
Solaris installation options, requirements, Install a Solaris System to Support Trusted Extensions
Solaris installed systems, requirements for Trusted Extensions, Prepare an Installed Solaris System for Trusted Extensions
Solaris Management Console
configuring for LDAP, Configuring the Solaris Management Console for LDAP (Task Map)
configuring LDAP toolbox, Edit the LDAP Toolbox in the Solaris Management Console
enabling LDAP toolbox to be used, Enable the Solaris Management Console to Accept Network Communications
initializing, Initialize the Solaris Management Console Server in Trusted Extensions
loading a Trusted Extensions toolbox, Initialize the Solaris Management Console Server in Trusted Extensions
registering LDAP credentials, Register LDAP Credentials With the Solaris Management Console
troubleshooting
Initialize the Solaris Management Console Server in Trusted Extensions
Initialize the Solaris Management Console Server in Trusted Extensions
using Trusted Network Zone Configuration tool
Name and Label the Zone
Specify Zone Names and Zone Labels by Using a CDE Action
working with Sun Java System Directory Server, Configuring the Solaris Management Console for LDAP (Task Map)
Solaris Trusted Extensions, See Trusted Extensions
Start Zone action, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
starting
zones
Boot the Labeled Zone
Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
Sun Java System Directory Server, See LDAP server
Sun Ray systems
LDAP servers, and, Configuring the Sun Java System Directory Server on a Trusted Extensions System
web site for documentation, Task Map: Preparing For and Enabling Trusted Extensions
svcs: Pattern 'labeld' doesn't match any instances, Enable Trusted Extensions
System Administrator role, restricting, Create a Restricted System Administrator Role