Skip Navigation Links | |
Exit Print View | |
Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases |
1. Security Planning for Trusted Extensions
2. Installation and Configuration Roadmap for Trusted Extensions
3. Installing Solaris Trusted Extensions Software (Tasks)
Installing or Upgrading the Solaris OS for Trusted Extensions
Install a Solaris System to Support Trusted Extensions
Prepare an Installed Solaris System for Trusted Extensions
Collecting Information and Making Decisions Before Installing Trusted Extensions
Collect System Information Before Installing Trusted Extensions
Make System and Security Decisions Before Installing Trusted Extensions
Installing the Solaris Trusted Extensions Packages (Tasks)
Install the Solaris Trusted Extensions Packages
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
B. Using CDE Actions to Install Zones in Trusted Extensions
Trusted Extensions software is designed to be installed and configured by two people with distinct responsibilities. However, the installation program does not enforce this two-role task division. Instead, task division is enforced by roles. Because roles and users are not created until after installation, it is a good practice to have an install team of at least two people present to install Trusted Extensions software.