Trusted Solaris Installation and Configuration

About This Book

This book is for knowledgeable system administrators and security administrators who are installing the Trusted SolarisTMoperating environment at networked or non-networked sites. Level of trust required by site security policy and level of expertise will determine who can perform the tasks required to install Trusted Solaris software.

Implement Trusted Solaris in Accordance with Site Security

Successfully installing and configuring Trusted Solaris consistent with site security requires understanding the security features of Trusted Solaris and your site security policy. Before attempting to install Trusted Solaris, read Chapter 1, Overview for the steps to implement your site security when installing and configuring the Trusted Solaris environment at your site.

Read This Book Strategically

If you are installing and configuring a network of workstations, you can choose from several installation methods after installing the first workstation. The installation methods you choose determine what parts of the book you should read. "Install the Trusted Solaris Software." describes the methods.


Note -

This book does not include instructions for setting up computer hardware or peripherals. Setting up hardware and peripherals is described in your hardware guides, such as the Solaris 7 Sun Hardware Platform Guide.


Planning a Secure Installation

Chapter 1, Overview

Common Installation and Configuration Procedures

Chapter 2, Basic Procedures

Installing Trusted Solaris

Chapter 3, Installing a Workstation

Configuring the NIS+ Root Master

Chapter 5, Configuring the NIS+ Root Master

Configuring a Non-Networked Workstation

Chapter 4, Configuring a Workstation without the NIS+ Name Service

Configuring NIS+ Clients

Chapter 6, Configuring a NIS+ Client

Installing NIS+ Clients Over the Network

Chapter 6, Configuring a NIS+ Client, Chapter 3, Installing a Workstation, and Chapter 7, Preparing to Install Trusted Solaris Over a Network

Installing and Configuring NIS+ Clients Using Custom JumpStart

Chapter 8, Preparing Custom JumpStart Installations, Chapter 9, Using Optional Custom JumpStart Features, and Chapter 3, Installing a Workstation

Configuring and Booting Diskless Clients

Chapter 10, Configuring Diskless Clients

Related Books

The following books contain information useful when installing Trusted Solaris software. The Solaris 7 AnswerBook CD and the Trusted Solaris 7 AnswerBook CD are shipped with the product. Solaris 7 books can be accessed from the Solaris 7 AnswerBook CD.

Books from Sun Microsystems

Books from Elsewhere

Ordering Sun Documents

Fatbrain.com, the Internet's most comprehensive professional bookstore, stocks select product documentation from Sun Microsystems, Inc.

For a list of documents and how to order them, visit the Sun Documentation Center on Fatbrain.com at http://www1.fatbrain.com/documentation/sun.

Accessing Sun Documentation Online

The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.

What Typographic Conventions Mean

The following table describes the typographic changes used in this book.

Table P-1 Typographic Conventions

Typeface or Symbol 

Meaning 

Example 

AaBbCc123

 The names of commands, files, and directories; on-screen computer output

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

 What you type, contrasted with on-screen computer outputmachine_name% su Password:

AaBbCc123

 Command-line placeholder: replace with a real name or value

To delete a file, type rm filename.

AaBbCc123

Book titles, new words, or terms, or words to be emphasized. 

Read Chapter 6 in User's Guide.

These are called class options.

You must be root to do this.

Shell Prompts in Command Examples

The following table shows the default system prompt for the C shell, Bourne shell, and Korn shell, and the prompts for administrative roles.

Table P-2 Shell Prompts

Shell 

Prompt 

 C shell promptmachine_name%
 secadmin and admin role prompt$
 Bourne shell and Korn shell prompt$
 root role prompt#