JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration Guide
search filter icon
search icon

Document Information

Preface

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

A.  Site Security Policy

B.  Using CDE Actions to Install Zones in Trusted Extensions

C.  Configuration Checklist for Trusted Extensions

Glossary

Index

A

B

C

D

E

F

H

I

L

M

N

P

R

S

T

U

V

W

Z

R

rebooting
activating labels, Reboot and Log In to Trusted Extensions
enabling login to labeled zone, Enable Users to Log In to a Labeled Zone
registering, LDAP credentials with the Solaris Management Console, Register LDAP Credentials With the Solaris Management Console
remote logins, enabling for roles, Enable Remote Login by a Role in Trusted Extensions
removing, zone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone
removing Trusted Extensions, See disabling
requirements for Trusted Extensions
Solaris installation options, Install a Solaris System to Support Trusted Extensions
Solaris installed systems, Prepare an Installed Solaris System for Trusted Extensions
resolv.conf file, loading during configuration, Make the Global Zone an LDAP Client in Trusted Extensions
rights profiles, customizing for separation of duty, Create Rights Profiles That Enforce Separation of Duty
roadmaps
Task Map: Configuring Trusted Extensions, Task Map: Configuring Trusted Extensions
Task Map: Preparing a Solaris System for Trusted Extensions, Task Map: Preparing a Solaris System for Trusted Extensions
Task Map: Preparing For and Enabling Trusted Extensions, Task Map: Preparing For and Enabling Trusted Extensions
roleadd command, Create the Security Administrator Role in Trusted Extensions
roles
adding local role with roleadd, Create the Security Administrator Role in Trusted Extensions
creating Security Administrator, Create the Security Administrator Role in Trusted Extensions
determining when to create, Make System and Security Decisions Before Enabling Trusted Extensions
logging in remotely, Enable Remote Login by a Role in Trusted Extensions
separation of duty
Create Rights Profiles That Enforce Separation of Duty
Create a Restricted System Administrator Role
verifying they work, Verify That the Trusted Extensions Roles Work
root passwords, required in Trusted Extensions, Prepare an Installed Solaris System for Trusted Extensions
routing, specifying default routes for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone