Trusted Solaris Installation and Configuration

Devise an Installation and Configuration Strategy.

The Trusted Solaris software is initially loaded by root. Since root cannot log into the Trusted Solaris environment, a local user named "install" has been provided for the first part of the configuration process. Subsequent configuration is a two-person process (by default) using the security administrator and the system administrator roles. Once the roles have been assigned to users, and the workstation is rebooted, the software enforces task division by role.

If two-person installation is not a site security requirement, assigning the two administrative roles to one person enables that person to configure both security and system information.

In a networked environment, consider installing and configuring workstations in the order NIS+ master, other NIS+ servers, other servers, and finally end user workstations.