This chapter covers how to configure Trusted Extensions on a system with a monitor. To work properly, Trusted Extensions software requires configuration of labels and zones. You can also configure network communications, roles, and users who can assume roles.
For other configuration tasks, see Part II, Administration of Trusted Extensions.