Trusted Solaris Installation and Configuration

About This Book

This book is for knowledgeable system administrators and security administrators who are installing the Trusted SolarisTM operating environment at networked or non-networked sites. Level of trust required by site security policy and level of expertise will determine who can perform the tasks required to install Trusted Solaris software.

Implement Trusted Solaris in Accordance with Site Security

Successfully installing and configuring a Trusted Solaris system consistent with site security requires understanding the security features of the Trusted Solaris operating environment and your site security policy. Before attempting to install Trusted Solaris 8, read Chapter 1, Security Overview for how to ensure site security when installing and configuring the Trusted Solaris environment.

Use Solaris and Trusted Solaris Installation Books

Installing the Trusted Solaris operating environment requires Solaris installation books as well as Trusted Solaris ones. See Chapter 2, Installation Task Maps for which books cover which tasks. Because Trusted Solaris software modifies Solaris software for security, Trusted Solaris books often supplement Solaris ones. Administrators should have access to both.

For example, to install the first one or two workstations, Chapter 4, Installing a Workstation supplements the Solaris installation guides.

If you are installing and configuring a network of workstations, you can choose from several installation methods after installing the first workstation. Solaris 8 Advanced Installation Guide, 806-0957-10, contains background information for networked installation, and describes interactive installations: network, JumpStart, and custom JumpStart. Some of the instructions are modified in the Trusted Solaris environment. See "Trusted Solaris Modifications to Network Installation" for a list of commands and procedures that the Trusted Solaris environment secures or enhances for network and JumpStart installations.


Note -

Instructions for setting up hardware and peripherals is described in hardware guides, such as the Solaris 8 Sun Hardware Platform Guide.


How This Book is Organized

This section describes the chapters in this book.

Chapter 1, Security Overview describes the security issues when installing the Trusted Solaris operating environment on one or more hosts.

Chapter 2, Installation Task Maps identifies where various installation tasks and methods are documented.

Chapter 3, Basic Procedures describes procedures specific to the Trusted Solaris environment when installing and configuring Trusted Solaris software.

Chapter 4, Installing a Workstation provides instructions for shutting down a Trusted Solaris host and installing the Trusted Solaris 8 operating environment.

Chapter 5, Configuring a Workstation with No Name Service provides step-by-step instructions for installing a host that will use files, not a naming service, for administration.

Chapter 6, Configuring the NIS+ Domain provides step-by-step instructions for installing a server for the NIS+ naming service.

Chapter 7, Configuring a NIS Network provides step-by-step instructions for installing a server for the NIS naming service.

Chapter 8, Configuring a NIS or NIS+ Client provides step-by-step instructions for installing a client for the naming services. It includes instructions for setting up a NIS slave server.

Chapter 9, Installing Trusted Solaris Over a Network lists differences in Trusted Solaris network installation from Solaris network installation, including JumpStart and Custom JumpStart.

Appendix A, Site Security Policy addresses site security policy and places the Trusted Solaris operating environment in the context of wider organizational and site security.

Appendix B, Checklists for Configuring and Installing Trusted Solaris provides a checklist for the install team when installing and configuring the Trusted Solaris environment.

Appendix C, Example Worksheets provides sample answers to Trusted Solaris installation program questions.

Glossary defines selected terms and phrases used in this book.

Related Books from Sun Microsystems

The following books contain information useful when installing Trusted Solaris software. The Solaris 8 AnswerBook CD and the Trusted Solaris 8 AnswerBook CD are shipped with the product. Solaris 8 books are available from the Solaris 8 AnswerBook CD.

Release Notes

Trusted Solaris 8 Release Notes -- Describes late-breaking news about installing and running Trusted Solaris software, including known problems.

Solaris 8 (SPARC Platform Edition) Release Notes -- Describes bugs, known problems, software being discontinued, and patches related to the Solaris release on the SPARCTM platform.

Solaris 8 (Intel Platform Edition) Release Notes -- Describes bugs, known problems, software being discontinued, and patches related to the Solaris release on the Intel platform.

Hardware and Devices Guides

Solaris 8 Sun Hardware Platform Guide, 806-2221-10 -- Describes hardware supported in the Solaris and Trusted Solaris environments.

Solaris 8 (Intel Platform Edition) Device Configuration Guide, 806-1053-10 -- Describes Intel hardware configurations supported in the Solaris and Trusted Solaris environments.

Solaris 8 (Intel Platform Edition) Hardware Compatibility List, 806-1054-10 -- Describes Intel hardware compatibility with the Solaris and Trusted Solaris environments.

Installation Guides

Trusted Solaris Label Administration -- Describes labels and includes a copy of Compartmented Mode Workstation Labeling: Encodings Format issued by the U.S. government.

Solaris 8 (SPARC Platform Edition) Installation Guide, 806-0955-10 -- Describes how to install the Solaris environment on a SPARC platform. See Trusted Solaris Documentation Roadmap for additional AnswerBook2 server setup required for the Trusted Solaris environment.

Solaris 8 (Intel Platform Edition) Installation Guide, 806-0956-10 -- Describes how to install the Solaris environment on an Intel platform. See Trusted Solaris Documentation Roadmap for additional AnswerBook2 server setup required for the Trusted Solaris environment.

Solaris 8 Advanced Installation Guide, 806-0957-10 -- Describes interactive installations: network, JumpStart, and custom JumpStart. Contains background information for networked installation. Forms the basis for Trusted Solaris interactive installation -- see Chapter 9, Installing Trusted Solaris Over a Network for Trusted Solaris modifications to the Solaris procedures.

Configuration Guides

Trusted Solaris Audit Administration -- Describes how to set up and administer auditing on one or more Trusted Solaris hosts.

Trusted Solaris Administrator's Procedures -- Describes administration tasks in the Trusted Solaris environment in detail.

"Planning Your TCP/IP Network" in System Administration Guide, Volume 3, 805-7229-10 -- Describes how to set up a network. Required for networked sites only.

Solaris Naming Administration Guide, 806-1391-10 -- Describes how to administer naming services.

Solaris Naming Setup and Configuration Guide, 806-1386-10 -- Describes how to set up and configure naming services.

Other Books

What's New in the Solaris 8 Operating Environment, 805-6332-10 -- Describes new features in the Solaris environment.

System Administration Guide, Volume 1: Basic Administration, 806-7228-10 -- Describes basic administrative tasks in Solaris 8, such as creating and mounting file systems.

System Administration Guide, Volume 2: Advanced Administration, 805-7229-10 -- Describes more advanced administrative tasks in Solaris 8, such as print management.

Books from Elsewhere

Your site security policy document -- Describes the security policy and security procedures at your site.

Solaris Common Desktop Environment: Advanced User's and System Administrator's Guide -- Describes the Common Desktop Environment.

The administrator guide for your currently installed operating system. -- Describes how to back up system files.

Automating Solaris® Installations: A Custom JumpStartTM Guide by Paul Anthony Kasper and Alan L. McClellan, published by Prentice Hall (SunSoft Press), 1995. -- Describes how to set up "hands-off" network installations. ISBN .0-13-312505-X

Ordering Sun Documents

Fatbrain.com, the Internet's most comprehensive professional bookstore, stocks select product documentation from Sun Microsystems, Inc.

For a list of documents and how to order them, visit the Sun Documentation Center on Fatbrain.com at http://www1.fatbrain.com/documentation/sun.

Accessing Sun Documentation Online

The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.

What Typographic Conventions Mean

The following table describes the typographic changes used in this book.

Table P-1 Typographic Conventions

Typeface or Symbol 

Meaning 

Example 

AaBbCc123

 The names of commands, files, and directories; on-screen computer output

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

 What you type, contrasted with on-screen computer outputmachine_name% su Password:

AaBbCc123

 Command-line placeholder: replace with a real name or value

To delete a file, type rm filename.

AaBbCc123

Book titles, new words, or terms, or words to be emphasized. 

Read Chapter 6 in User's Guide.

These are called class options.

You must be root to do this.

Profile Shell Prompts in Command Examples

The following table shows the default system prompts for administrative roles.

Table P-2 Shell Prompts

Shell 

Prompt 

 administrative role prompt$
 root role prompt#