Trusted Solaris Installation and Configuration

Log In and Protect the Workstation

  1. Log in as a user who can assume the role root and assume it.

    See "How to Log In" if you are unsure of the steps.

  2. Protect the workstation.

    See "How to Protect Machine Hardware" if you are unsure of the steps.

  3. Limit contact with other tsol hosts if required by site security.

    See "How to Limit Contact During Booting" for an explanation and reference.