| Skip Navigation Links | |
| Exit Print View | |
|
Trusted Extensions Configuration Guide Oracle Solaris 10 8/11 Information Library |
1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
B. Using CDE Actions to Install Zones in Trusted Extensions
Create Users Who Can Assume Roles in Trusted Extensions
Add an NIS User to the LDAP Server
Create Users Who Can Assume Roles in Trusted Extensions
Create Users Who Can Assume Roles in Trusted Extensions
Create Rights Profiles That Enforce Separation of Duty
Create a Restricted System Administrator Role