Trusted Solaris Installation and Configuration

Edit the rules file.

The security administrator must define the rules file. The Trusted Solaris installation program will use the contents of this file to select the proper installation for each department.

At this site, each department is on its own subnet and network address. The administrator uses this information to control how systems are installed. The engineering department is on subnet 255.222.43.0, and marketing is on 255.222.44.0.

In the /jumpstart directory, the administrator in the role secadmin at the label ADMIN_LOW using the Admin Editor edits the rules file, deletes all of the example rules, and enters:

network 255.222.43.0 - eng_profile    -
network 255.222.44.0 - marketing_profile -

Note -

These are sample rules in which an administrator uses a network address to identify which systems will be installed with the eng_profile and marketing_profile, respectively. The administrator could also have chosen to use host names, memory size, or model type as the rule keyword. See "Rule Keyword and Rule Value Descriptions"for a complete list of keywords you can use in a rules file.