|Skip Navigation Links|
|Exit Print View|
|Trusted Extensions Configuration and Administration Oracle Solaris 11.1 Information Library|
Trusted Extensions Configuration and Administration provides procedures for enabling and initially configuring the Trusted Extensions feature on the Oracle Solaris operating system (Oracle Solaris OS). This guide also provides procedures for managing users, zones, devices, and hosts on a Trusted Extensions system.
Note - This Oracle Solaris release supports systems that use the SPARC and x86 families of processor architectures. The supported systems appear in the Oracle Solaris OS: Hardware Compatibility Lists. This document cites any implementation differences between the platform types.
This guide is for knowledgeable system administrators and security administrators who are configuring and administering Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determine who can perform the configuration tasks.
Administrators should be familiar with Oracle Solaris administration. In addition, administrators should understand the following:
The security features of Trusted Extensions and your site security policy
Basic concepts and procedures for using a host that is configured with Trusted Extensions, as described in the Trusted Extensions User’s Guide
How administrative tasks are divided among roles at your site
Trusted Extensions runs on top of the Oracle Solaris OS. Because Trusted Extensions software can modify the Oracle Solaris OS, Trusted Extensions can require specific settings for Oracle Solaris installation options. Part I of this guide describes how to prepare the Oracle Solaris OS for Trusted Extensions, how to enable Trusted Extensions, and how to initially configure the software. Part II of this guide describes how to administer the uniquely Trusted Extensions features of the system.
The Oracle Solaris guides that are published in this library.
Your site security policy document – Describes the security policy and security procedures at your site
The administrator guide for your currently installed operating system – Describes how to back up system files
Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
The following table describes the typographic conventions that are used in this book.
Table P-1 Typographic Conventions
The following table shows the default UNIX system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.
Table P-2 Shell Prompts