JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases
search filter icon
search icon

Document Information

Preface

1.  Security Planning for Trusted Extensions

Planning for Security in Trusted Extensions

Understanding Trusted Extensions

Understanding Your Site's Security Policy

Devising an Administration Strategy for Trusted Extensions

Devising a Label Strategy

For International Customers of Trusted Extensions

Planning System Hardware and Capacity for Trusted Extensions

Planning Your Trusted Network

Planning for Zones in Trusted Extensions

Trusted Extensions Zones and Solaris 10 Zones

Zone Creation in Trusted Extensions

Planning for Multilevel Access

Planning for the LDAP Naming Service in Trusted Extensions

Planning for Auditing in Trusted Extensions

Planning User Security in Trusted Extensions

Devising an Installation and Configuration Strategy for Trusted Extensions

Collecting Information Before Installing Trusted Extensions

Backing Up the System Before Installing Trusted Extensions

Installing Solaris Trusted Extensions Software

Results of Installing Trusted Extensions From an Administrator's Perspective

2.  Installation and Configuration Roadmap for Trusted Extensions

3.  Installing Solaris Trusted Extensions Software (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

A.  Site Security Policy

B.  Using CDE Actions to Install Zones in Trusted Extensions

C.  Configuration Checklist for Trusted Extensions

Glossary

Index

Chapter 1

Security Planning for Trusted Extensions

Solaris Trusted Extensions implements a portion of your site's security policy in software. This chapter provides an overview of the security and administrative aspects of configuring the software.