Here are other security-related considerations when installing a Sun Ray server:
Secure by default - When using the utsetup installation program to install Sun Ray Software, the Sun Ray Software is automatically activated. When activated, security-related policy settings are set to default values, which try to maintain a good balance between security and usability. If more relaxed settings are appropriate for the particular deployment, then you must specifically adjust those settings. Conversely, you can adjust the settings the other way if you require enhanced security. See Chapter 4, Client-to-Server Security for details.
If you do not use utsetup for installation, Sun Ray Software is activated on the server by using the utconfig, utadm, or utstart command.
Preserving data before
upgrade - Before you upgrade a Sun Ray server,
you need to back up the configuration data to a
utpreserve
tar file. This tar file
contains sensitive information, so make sure to use
sufficient security precautions when copying or storing this
file. See How to Preserve Sun Ray Software Configuration Data
in the Administration
Guide for details.
Cloning installations - When cloning a Sun Ray server
using the utsetup command, make sure to use sufficient security
precautions when copying or storing the *.utdialog_responses.props
files, because they may contain passwords. See How to Clone a Sun Ray Server in the Administration Guide for details.
Restricting Oracle Linux privileges - Oracle Linux comes preconfigured with liberal administrative privileges for non-root users. These privileges should not be made available to users who log in using a Sun Ray Client. To prevent this, see How to Limit Administrative Privileges for Non-root Users (Oracle Linux) in the Administration Guide.