1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
B. Using CDE Actions to Install Zones in Trusted Extensions
The Oracle Solaris Trusted Extensions Configuration Guide guide provides procedures for configuring Trusted Extensions on the Solaris Operating System (Solaris OS). This guide also describes preparing the Solaris system to support a secure installation of Trusted Extensions.
Note - This Solaris release supports systems that use the SPARC and x86 families of processor architectures. The supported systems appear in the Solaris OS: Hardware Compatibility Lists. This document cites any implementation differences between the platform types.
In this document these x86 related terms mean the following:
“x86” refers to the larger family of 64-bit and 32-bit x86 compatible products.
“x64” relates specifically to 64-bit x86 compatible CPUs.
“32-bit x86” points out specific 32-bit information about x86 based systems.
For supported systems, see the Solaris OS: Hardware Compatibility Lists.
This guide is for knowledgeable system administrators and security administrators who are configuring Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.
Successfully configuring Trusted Extensions on a system in a way that is consistent with site security requires understanding the security features of Trusted Extensions and your site security policy. Before you start, read Chapter 1, Security Planning for Trusted Extensions for information about how to ensure site security when configuring the software.
Trusted Extensions runs on top of the Solaris OS. Because Trusted Extensions software can modify the Solaris OS, Trusted Extensions can require specific settings for Solaris installation options. For details, see Chapter 3, Adding Trusted Extensions Software to the Solaris OS (Tasks). Also, Trusted Extensions guides supplement Solaris guides. As administrators, you need access to Solaris guides and Trusted Extensions guides.
Chapter 1, Security Planning for Trusted Extensions describes the security issues that you need to consider when configuring Trusted Extensions software on one or more Solaris systems.
Chapter 2, Configuration Roadmap for Trusted Extensions contains task maps for adding Trusted Extensions software to Solaris systems.
Chapter 3, Adding Trusted Extensions Software to the Solaris OS (Tasks) provides instructions on preparing a Solaris system for Trusted Extensions software. It also includes instructions on enabling Trusted Extensions.
Chapter 4, Configuring Trusted Extensions (Tasks) provides instructions on configuring Trusted Extensions software on a system with a monitor.
Chapter 5, Configuring LDAP for Trusted Extensions (Tasks) provides instructions on configuring LDAP for Trusted Extensions.
Chapter 6, Configuring a Headless System With Trusted Extensions (Tasks) describes how to configure and administer Trusted Extensions software on a headless system.
Appendix A, Site Security Policy addresses site security policy and places Trusted Extensions in the context of wider organizational and site security.
Appendix B, Using CDE Actions to Install Zones in Trusted Extensions describes how to configure labeled zones by using Trusted CDE actions.
Appendix C, Configuration Checklist for Trusted Extensions provides a configuration checklist for the initial setup team.
Glossary defines selected terms and phrases that are used in this guide.
The following table lists the topics that are covered in the Trusted Extensions guides and the audience for each guide.
|
The following guides contain information that is useful when you prepare for Trusted Extensions software.
Oracle Solaris 10 9/10 Installation Guide: Basic Installations – Provides guidance on the installation options for the Solaris OS
Oracle Solaris 10 9/10 Installation Guide: Custom JumpStart and Advanced Installations – Provides guidance on installation methods and configuration options
Oracle Solaris 10 9/10 Installation Guide: Planning for Installation and Upgrade – Provides guidance on installing an upgrade of the Solaris OS
Your site security policy document – Describes the security policy and security procedures at your site
Solaris Common Desktop Environment: Advanced User's and System Administrator's Guide – Describes the Common Desktop Environment (CDE)
The administrator guide for your currently installed operating system – Describes how to back up system files
Third-party URLs are referenced in this document and provide additional, related information.
Note - Oracle is not responsible for the availability of third-party web sites that are mentioned in this document. Oracle does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Oracle will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
See the following web sites for additional resources:
Training – Click the Sun link in the left navigation bar.
Oracle welcomes your comments and suggestions on the quality and usefulness of its documentation. If you find any errors or have any other suggestions for improvement, go to http://docs.sun.com and click Feedback. Indicate the title and part number of the documentation along with the chapter, section, and page number, if available. Please let us know if you want a reply.
Oracle Technology Network offers a range of resources related to Oracle software:
Discuss technical problems and solutions on the Discussion Forums.
Get hands-on step-by-step tutorials with Oracle By Example.
Download Sample Code.
The following table describes the typographic conventions that are used in this book.
Table P-1 Typographic Conventions
|
The following table shows the default UNIX system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.
Table P-2 Shell Prompts
|