Trusted Solaris Installation and Configuration

Using Installation Books

Installing the Trusted Solaris operating environment requires Solaris installation books as well as Trusted Solaris ones. See Chapter 2, Installation and Configuration Task Maps for information on which books cover which tasks. Because Trusted Solaris software modifies Solaris software for security, Trusted Solaris books often supplement Solaris ones. Administrators should have access to both.

For example, to install the first one or two systems, Chapter 3, Installing the Trusted Solaris Operating Environment supplements the Solaris installation guides.

If you are installing and configuring a network of hosts, you can choose from several installation methods after installing the first system. Solaris 8 Advanced Installation Guide, 806-0957-10, contains background information for networked installation, and describes interactive installations: network, JumpStart, and custom JumpStart. Some of the instructions are modified in the Trusted Solaris environment. See "Trusted Solaris Modifications to Network Installation" for a list of commands and procedures that the Trusted Solaris environment secures or enhances for network and JumpStart installations.


Note -

Instructions for setting up hardware and peripherals are provided in hardware guides, such as the Solaris 8 Sun Hardware Platform Guide.


How This Book is Organized

This section describes the chapters in this book.

Chapter 1, Security Overview describes the security issues when installing the Trusted Solaris operating environment on one or more systems.

Chapter 2, Installation and Configuration Task Maps contains task maps for installing and configuring non-networked and networked systems.

Chapter 3, Installing the Trusted Solaris Operating Environment provides instructions for shutting down a Trusted Solaris system and installing the Trusted Solaris 8 4/01 operating environment.

Chapter 4, Configuring a System with No Name Service provides step-by-step instructions for installing a system that will use files, not a naming service, for administration.

Chapter 5, Configuring a Name Service Master provides step-by-step instructions for installing the master server for a name service.

Chapter 6, Configuring a Name Service Client provides step-by-step instructions for installing a client for the naming services. It includes instructions for setting up a NIS slave server.

Chapter 7, Installing a Trusted Solaris System Over a Network describes the differences between Trusted Solaris network installation from Solaris network installation, including JumpStart and Custom JumpStart.

Chapter 8, Configuring a Headless Trusted Solaris System describes how to configure and administer the Trusted Solaris environment on a headless system.

Chapter 9, Common Procedures describes procedures and administration tools specific to Trusted Solaris software that are useful to know when configuring the operating environment .

Appendix A, Site Security Policy addresses site security policy and places the Trusted Solaris operating environment in the context of wider organizational and site security.

Appendix B, Checklists for a Secure Trusted Solaris Environment provides a checklist for the install team when installing and configuring the Trusted Solaris environment.

Appendix C, Example Worksheets provides sample answers to Trusted Solaris installation program questions.

Glossary defines selected terms and phrases used in this book.