JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases
search filter icon
search icon

Document Information

Preface

1.  Security Planning for Trusted Extensions

2.  Installation and Configuration Roadmap for Trusted Extensions

3.  Installing Solaris Trusted Extensions Software (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

A.  Site Security Policy

B.  Using CDE Actions to Install Zones in Trusted Extensions

C.  Configuration Checklist for Trusted Extensions

Glossary

Index

A

B

C

D

E

F

H

I

J

L

M

N

P

R

S

T

U

V

W

Z

S

screens, initial display, Reboot and Log In to Trusted Extensions
security
install team, Install Team Responsibilities
publications, Additional Security References
root password, Prepare an Installed Solaris System for Trusted Extensions
site security policy, Site Security Policy
Security Administrator role, creating, Create the Security Administrator Role in Trusted Extensions
Share Logical Interface action, Specify Two IP Addresses for the System by Using a CDE Action
Share Physical Interface action, Specify One IP Address for the System by Using a CDE Action
Shut Down Zone action, Customize a Booted Zone in Trusted Extensions
site security policy
common violations, Common Security Violations
personnel recommendations, Personnel Security Recommendations
physical access recommendations, Physical Security Recommendations
recommendations, Computer Security Recommendations
tasks involved, Site Security Policy
Trusted Extensions configuration decisions, Site Security Policy and Trusted Extensions
understanding, Understanding Your Site's Security Policy
Solaris installation options, requirements, Install a Solaris System to Support Trusted Extensions
Solaris installed systems, requirements for Trusted Extensions, Prepare an Installed Solaris System for Trusted Extensions
Solaris Management Console
configuring for LDAP, Configuring the Solaris Management Console for LDAP (Task Map)
configuring LDAP toolbox, Edit the LDAP Toolbox in the Solaris Management Console
enabling LDAP toolbox to be used, Enable an LDAP Client to Administer LDAP
initializing, Initialize the Solaris Management Console Server in Trusted Extensions
loading a Trusted Extensions toolbox, Initialize the Solaris Management Console Server in Trusted Extensions
registering LDAP credentials, Register LDAP Credentials With the Solaris Management Console
troubleshooting
Initialize the Solaris Management Console Server in Trusted Extensions
Initialize the Solaris Management Console Server in Trusted Extensions
using Trusted Network Zone Configuration tool
Name and Label the Zone
Specify Zone Names and Zone Labels by Using a CDE Action
working with Sun Java System Directory Server, Configuring the Solaris Management Console for LDAP (Task Map)
Solaris OS installation, options that affect Trusted Extensions, Installing Solaris Trusted Extensions Software (Tasks)
Solaris Trusted Extensions, See Trusted Extensions
Start Zone action, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
starting
zones
Boot the Labeled Zone
Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
Sun Java System Directory Server, See LDAP server