| Skip Navigation Links | |
| Exit Print View | |
|
Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases |
1. Security Planning for Trusted Extensions
2. Installation and Configuration Roadmap for Trusted Extensions
3. Installing Solaris Trusted Extensions Software (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
B. Using CDE Actions to Install Zones in Trusted Extensions
Reboot and Log In to Trusted Extensions
Enable Users to Log In to a Labeled Zone
Register LDAP Credentials With the Solaris Management Console
How to Remove Trusted Extensions From the System
Install a Solaris System to Support Trusted Extensions
Prepare an Installed Solaris System for Trusted Extensions
Task Map: Configuring Trusted Extensions
Task Map: Preparing a Solaris System for Trusted Extensions
Task Map: Preparing For and Installing Trusted Extensions
Create the Security Administrator Role in Trusted Extensions
Create the Security Administrator Role in Trusted Extensions
Create the Security Administrator Role in Trusted Extensions
Make System and Security Decisions Before Installing Trusted Extensions
Verify That the Trusted Extensions Roles Work
Prepare an Installed Solaris System for Trusted Extensions