Document Information
Preface
1. Security Planning for Trusted Extensions
2. Installation and Configuration Roadmap for Trusted Extensions
Task Map: Preparing a Solaris System for Trusted Extensions
Task Map: Preparing For and Installing Trusted Extensions
Task Map: Configuring Trusted Extensions
3. Installing Solaris Trusted Extensions Software (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
A. Site Security Policy
B. Using CDE Actions to Install Zones in Trusted Extensions
C. Configuration Checklist for Trusted Extensions
Glossary
Index
This chapter outlines the tasks for installing and configuring SolarisTM Trusted Extensions software.