Documentation Home
> Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases
Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases
Book Information
Index
A
B
C
D
E
F
H
I
J
L
M
N
P
R
S
T
U
V
W
Z
Preface
Chapter 1 Security Planning for Trusted Extensions
Planning for Security in Trusted Extensions
Understanding Trusted Extensions
Understanding Your Site's Security Policy
Devising an Administration Strategy for Trusted Extensions
Devising a Label Strategy
For International Customers of Trusted Extensions
Planning System Hardware and Capacity for Trusted Extensions
Planning Your Trusted Network
Planning for Zones in Trusted Extensions
Trusted Extensions Zones and Solaris 10 Zones
Zone Creation in Trusted Extensions
Planning for Multilevel Access
Planning for the LDAP Naming Service in Trusted Extensions
Planning for Auditing in Trusted Extensions
Planning User Security in Trusted Extensions
Devising an Installation and Configuration Strategy for Trusted Extensions
Collecting Information Before Installing Trusted Extensions
Backing Up the System Before Installing Trusted Extensions
Installing Solaris Trusted Extensions Software
Results of Installing Trusted Extensions From an Administrator's Perspective
Chapter 2 Installation and Configuration Roadmap for Trusted Extensions
Task Map: Preparing a Solaris System for Trusted Extensions
Task Map: Preparing For and Installing Trusted Extensions
Task Map: Configuring Trusted Extensions
Chapter 3 Installing Solaris Trusted Extensions Software (Tasks)
Install Team Responsibilities
Installing or Upgrading the Solaris OS for Trusted Extensions
Install a Solaris System to Support Trusted Extensions
Prepare an Installed Solaris System for Trusted Extensions
Collecting Information and Making Decisions Before Installing Trusted Extensions
Collect System Information Before Installing Trusted Extensions
Make System and Security Decisions Before Installing Trusted Extensions
Installing the Solaris Trusted Extensions Packages (Tasks)
Install the Solaris Trusted Extensions Packages
Chapter 4 Configuring Trusted Extensions (Tasks)
Setting Up the Global Zone in Trusted Extensions
Check and Install Your Label Encodings File
Enable IPv6 Networking in Trusted Extensions
Create ZFS Pool for Cloning Zones
Reboot and Log In to Trusted Extensions
Initialize the Solaris Management Console Server in Trusted Extensions
Make the Global Zone an LDAP Client in Trusted Extensions
Creating Labeled Zones
Run the txzonemgr Script
Configure the Network Interfaces in Trusted Extensions
Name and Label the Zone
Install the Labeled Zone
Boot the Labeled Zone
Verify the Status of the Zone
Customize the Labeled Zone
Create Another Zone in Trusted Extensions
Add a Network Interface to an Existing Labeled Zone
Creating Roles and Users in Trusted Extensions
Create the Security Administrator Role in Trusted Extensions
Create Users Who Can Assume Roles in Trusted Extensions
Verify That the Trusted Extensions Roles Work
Enable Users to Log In to a Labeled Zone
Creating Home Directories in Trusted Extensions
Create the Home Directory Server in Trusted Extensions
Enable Users to Access Their Home Directories in Trusted Extensions
Adding Users and Hosts to an Existing Trusted Network
Add an NIS User to the LDAP Server
Troubleshooting Your Trusted Extensions Configuration
netservices limited Was Run After Trusted Extensions Was Installed
Cannot Open the Console Window in a Labeled Zone
Labeled Zone Is Unable to Access the X Server
Additional Trusted Extensions Configuration Tasks
How to Copy Files to Portable Media in Trusted Extensions
How to Copy Files From Portable Media in Trusted Extensions
How to Remove Trusted Extensions From the System
Chapter 5 Configuring LDAP for Trusted Extensions (Tasks)
Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
Configuring the Sun Java System Directory Server on a Trusted Extensions System
Collect Information for the Directory Server for LDAP
Install the Sun Java System Directory Server
Protect Access Logs for the Sun Java System Directory Server
Protect Error Logs for the Sun Java System Directory Server
Configure a Multilevel Port for the Sun Java System Directory Server
Populate the Sun Java System Directory Server
Creating a Trusted Extensions Proxy for an Existing Sun Java System Directory Server
Create an LDAP Proxy Server
Configuring the Solaris Management Console for LDAP (Task Map)
Register LDAP Credentials With the Solaris Management Console
Enable an LDAP Client to Administer LDAP
Edit the LDAP Toolbox in the Solaris Management Console
Verify That the Solaris Management Console Contains Trusted Extensions Information
Chapter 6 Configuring a Headless System With Trusted Extensions (Tasks)
Headless System Configuration in Trusted Extensions (Task Map)
Enable Remote Login in Trusted Extensions
Use the rlogin Command to Log In to a Headless System in Trusted Extensions
Use the ssh Command to Log In to a Headless System in Trusted Extensions
Set Up Administration by Serial Login in Trusted Extensions
Appendix A Site Security Policy
Creating and Managing a Security Policy
Site Security Policy and Trusted Extensions
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
U.S. Government Publications
UNIX Security Publications
General Computer Security Publications
General UNIX Publications
Appendix B Using CDE Actions to Install Zones in Trusted Extensions
Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
Specify Two IP Addresses for the System by Using a CDE Action
Specify One IP Address for the System by Using a CDE Action
Preparing to Create Zones by Using CDE Actions (Task Map)
Specify Zone Names and Zone Labels by Using a CDE Action
Creating Labeled Zones by Using CDE Actions (Task Map)
Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
Customize a Booted Zone in Trusted Extensions
Use the Copy Zone Method in Trusted Extensions
Use the Clone Zone Method in Trusted Extensions
Appendix C Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
Glossary
© 2010, Oracle Corporation and/or its affiliates