Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Task Map: Choosing a Trusted Extensions Configuration

Configure Trusted Extensions on your system using one of the methods in the following task map.

Task
For Instructions
Create a demonstration Trusted Extensions system.
Create an enterprise Trusted Extensions system.
Configure Trusted Extensions on a remote system.
Enable Trusted Extensions but do not reboot. Follow instructions in Chapter 12, Remote Administration in Trusted Extensions. Then, continue with the instructions for systems with a monitor.
Configure Trusted Extensions on a Sun Ray server from Oracle.
To configure initial client-server communications, see Labeling Hosts and Networks.