Trusted Solaris Installation and Configuration

Devising an Installation and Configuration Strategy

The Trusted Solaris software is initially loaded by root. Since root cannot log into the Trusted Solaris environment, a local user named "install" has been provided for the first part of the configuration process. Subsequent configuration is a two-person process (by default) using the security administrator and the system administrator roles. Once the roles have been assigned to users, and the computer is rebooted, the software enforces task division by role.

If two-person installation is not a site security requirement, assigning the two administrative roles to one person enables that person to configure both security and system information.

In a name service environment, you should install and configure systems in the order:

  1. Name service master

  2. Home directory server

  3. Install server

  4. Other name service servers

  5. Other servers

  6. End user systems