Document Information
Preface
1. Security Planning for Trusted Extensions
Planning for Security in Trusted Extensions
Results of Installing Trusted Extensions From an Administrator's Perspective
2. Installation and Configuration Roadmap for Trusted Extensions
3. Installing Solaris Trusted Extensions Software (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
A. Site Security Policy
B. Using CDE Actions to Install Zones in Trusted Extensions
C. Configuration Checklist for Trusted Extensions
Glossary
Index
SolarisTM Trusted Extensions implements a portion of your site's security policy in software. This chapter provides an overview of the security and administrative aspects of configuring the software.