Trusted Solaris Installation and Configuration

Log In and Protect the Workstation

  1. Log in as a user who can assume the root role and assume it.

    See "How to Log In" if you are unsure of the steps.

  2. Protect the workstation.

    See "How to Protect Machine Hardware" if you are unsure of the steps.