|
||||||||||||||||||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions Task Map: Preparing a Solaris System for Trusted Extensions Task Map: Configuring Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
Task Map: Preparing For and Installing Trusted ExtensionsTo securely install a Trusted Extensions system before configuring it, complete the tasks that are described in the following task map.
|
|||||||||||||||||
|