|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions Task Map: Preparing a Solaris System for Trusted Extensions Task Map: Preparing For and Installing Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
Task Map: Configuring Trusted ExtensionsFor a secure installation, create roles early in the configuration process. The order of tasks when roles configure the system is shown in the following task map.
Skip the next set of tasks if you are using local files administer the system.
Many of the next set of tasks are described in Solaris Trusted Extensions Administrator’s Procedures.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|