Trusted Solaris Installation and Configuration

Use Solaris and Trusted Solaris Installation Books

Installing the Trusted Solaris operating environment requires Solaris installation books as well as Trusted Solaris ones. See Chapter 2, Installation Task Maps for which books cover which tasks. Because Trusted Solaris software modifies Solaris software for security, Trusted Solaris books often supplement Solaris ones. Administrators should have access to both.

For example, to install the first one or two workstations, Chapter 4, Installing a Workstation supplements the Solaris installation guides.

If you are installing and configuring a network of workstations, you can choose from several installation methods after installing the first workstation. Solaris 8 Advanced Installation Guide, 806-0957-10, contains background information for networked installation, and describes interactive installations: network, JumpStart, and custom JumpStart. Some of the instructions are modified in the Trusted Solaris environment. See "Trusted Solaris Modifications to Network Installation" for a list of commands and procedures that the Trusted Solaris environment secures or enhances for network and JumpStart installations.


Note -

Instructions for setting up hardware and peripherals is described in hardware guides, such as the Solaris 8 Sun Hardware Platform Guide.


How This Book is Organized

This section describes the chapters in this book.

Chapter 1, Security Overview describes the security issues when installing the Trusted Solaris operating environment on one or more hosts.

Chapter 2, Installation Task Maps identifies where various installation tasks and methods are documented.

Chapter 3, Basic Procedures describes procedures specific to the Trusted Solaris environment when installing and configuring Trusted Solaris software.

Chapter 4, Installing a Workstation provides instructions for shutting down a Trusted Solaris host and installing the Trusted Solaris 8 operating environment.

Chapter 5, Configuring a Workstation with No Name Service provides step-by-step instructions for installing a host that will use files, not a naming service, for administration.

Chapter 6, Configuring the NIS+ Domain provides step-by-step instructions for installing a server for the NIS+ naming service.

Chapter 7, Configuring a NIS Network provides step-by-step instructions for installing a server for the NIS naming service.

Chapter 8, Configuring a NIS or NIS+ Client provides step-by-step instructions for installing a client for the naming services. It includes instructions for setting up a NIS slave server.

Chapter 9, Installing Trusted Solaris Over a Network lists differences in Trusted Solaris network installation from Solaris network installation, including JumpStart and Custom JumpStart.

Appendix A, Site Security Policy addresses site security policy and places the Trusted Solaris operating environment in the context of wider organizational and site security.

Appendix B, Checklists for Configuring and Installing Trusted Solaris provides a checklist for the install team when installing and configuring the Trusted Solaris environment.

Appendix C, Example Worksheets provides sample answers to Trusted Solaris installation program questions.

Glossary defines selected terms and phrases used in this book.