JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases
search filter icon
search icon

Document Information

Preface

1.  Security Planning for Trusted Extensions

2.  Installation and Configuration Roadmap for Trusted Extensions

3.  Installing Solaris Trusted Extensions Software (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

Configuring an LDAP Server on a Trusted Extensions Host (Task Map)

Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)

Configuring the Sun Java System Directory Server on a Trusted Extensions System

Collect Information for the Directory Server for LDAP

Install the Sun Java System Directory Server

Protect Access Logs for the Sun Java System Directory Server

Protect Error Logs for the Sun Java System Directory Server

Configure a Multilevel Port for the Sun Java System Directory Server

Populate the Sun Java System Directory Server

Creating a Trusted Extensions Proxy for an Existing Sun Java System Directory Server

Create an LDAP Proxy Server

Configuring the Solaris Management Console for LDAP (Task Map)

Register LDAP Credentials With the Solaris Management Console

Enable an LDAP Client to Administer LDAP

Edit the LDAP Toolbox in the Solaris Management Console

Verify That the Solaris Management Console Contains Trusted Extensions Information

6.  Configuring a Headless System With Trusted Extensions (Tasks)

A.  Site Security Policy

B.  Using CDE Actions to Install Zones in Trusted Extensions

C.  Configuration Checklist for Trusted Extensions

Glossary

Index

Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)

Use this task map if you have an existing Sun Java System Directory Server that is running on a Solaris system.

Task
Description
For Instructions
Add Trusted Extensions databases to the server.
The Trusted Extensions network databases, tnrhdb and tnrhtp, need to be added to the LDAP server.
Set up an LDAP proxy server.
Make one Trusted Extensions system the proxy server for the other Trusted Extensions systems. The other Trusted Extensions systems use this proxy server to reach the LDAP server.
Configure the proxy server to have a multilevel port for LDAP.
Enable the Trusted Extensions proxy server to communicate with the LDAP server at specific labels.
Configure the Solaris Management Console to work with the LDAP proxy server.
You manually set up an LDAP toolbox for the Solaris Management Console. The toolbox can be used to modify Trusted Extensions attributes on network objects.
Configure all other Trusted Extensions systems as clients of the LDAP proxy server.
When you configure another system with Trusted Extensions, make the system a client of the LDAP proxy server.