1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
Task Map: Preparing a Solaris System for Trusted Extensions
Task Map: Configuring Trusted Extensions
3. Adding Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
B. Using CDE Actions to Install Zones in Trusted Extensions
To prepare a Trusted Extensions system before configuring it, complete the tasks that are described in the following task map.
|