Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017
 
 

Task Map: Choosing a Trusted Extensions Configuration

Configure Trusted Extensions on your system using one of the methods in the following task map.

Task
For Instructions
Create a demonstration Trusted Extensions system.
Create an enterprise Trusted Extensions system.
Configure Trusted Extensions on a remote system.
Enable Trusted Extensions but do not reboot. Follow instructions in Remote Administration in Trusted Extensions. Then, continue with the instructions for systems with a monitor.
Configure Trusted Extensions on a Sun Ray server from Oracle.
To configure initial client-server communications, see Labeling Hosts and Networks.