|
|||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) Setting Up the Global Zone in Trusted Extensions Check and Install Your Label Encodings File Enable IPv6 Networking in Trusted Extensions Create ZFS Pool for Cloning Zones Reboot and Log In to Trusted Extensions Initialize the Solaris Management Console Server in Trusted Extensions Make the Global Zone an LDAP Client in Trusted Extensions Configure the Network Interfaces in Trusted Extensions Create Another Zone in Trusted Extensions Add a Network Interface to an Existing Labeled Zone Creating Roles and Users in Trusted Extensions Create the Security Administrator Role in Trusted Extensions Create Users Who Can Assume Roles in Trusted Extensions Verify That the Trusted Extensions Roles Work Enable Users to Log In to a Labeled Zone Creating Home Directories in Trusted Extensions Create the Home Directory Server in Trusted Extensions Enable Users to Access Their Home Directories in Trusted Extensions Adding Users and Hosts to an Existing Trusted Network Add an NIS User to the LDAP Server Troubleshooting Your Trusted Extensions Configuration Additional Trusted Extensions Configuration Tasks How to Copy Files to Portable Media in Trusted Extensions 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
Additional Trusted Extensions Configuration TasksThe following two tasks enable you to transfer exact copies of configuration files to every Trusted Extensions system at your site. The final task enables you to remove Trusted Extensions customizations from a Solaris system. How to Copy Files to Portable Media in Trusted ExtensionsWhen copying to portable media, label the media with the sensitivity label of the information. Note - During installation, superuser or an equivalent role copies administrative files to and from portable media. Label the media with Trusted Path. Before You BeginTo copy administrative files, you must be superuser or in a role in the global zone.
The system administrator wants to ensure that every machine is configured with the same settings. So, on the first machine that is configured, she creates a directory that cannot be deleted between reboots. In that directory, the administrator places the files that should be identical or very similar on all systems. For example, she copies the Trusted Extensions toolbox that the Solaris Management Console uses for the LDAP scope, /var/sadm/smc/toolboxes/tsol_ldap/tsol_ldap.tbx. She has customized remote host templates in the tnrhtp file, has a list of DNS servers, and audit configuration files. She also modified the policy.conf file for her site. So, she copies the files to the permanent directory. # mkdir /export/commonfiles # cp /etc/security/policy.conf \ /etc/security/audit_control \ /etc/security/audit_startup \ /etc/security/tsol/tnrhtp \ /etc/resolv.conf \ /etc/nsswitch.conf \ /export/commonfiles She uses the Device Allocation Manager to allocate a diskette in the global zone, and transfers the files to the diskette. On a separate diskette, labeled ADMIN_HIGH, she puts the label_encodings file for the site. When she copies the files onto a system, she modifies the dir: entries in the /etc/security/audit_control file for that system. How to Copy Files From Portable Media in Trusted ExtensionsIt is safe practice to rename the original Trusted Extensions file before replacing the file. When configuring a system, the root role renames and copies administrative files. Before You BeginTo copy administrative files, you must be superuser or in a role in the global zone.
In this example, roles are not yet configured on the system. The root user needs to copy configuration files to portable media. The contents of the media will then be copied to other systems. These files are to be copied to each system that is configured with Trusted Extensions software. The root user allocates the floppy_0 device in the Device Allocation Manager and responds yes to the mount query. Then, the root user inserts the diskette with the configuration files and copies them to the disk. The diskette is labeled Trusted Path. To read from the media, the root user allocates the device on the receiving host, then downloads the contents. If the configuration files are on a tape, the root user allocates the mag_0 device. If the configuration files are on a CD-ROM, the root user allocates the cdrom_0 device. How to Remove Trusted Extensions From the SystemTo remove Trusted Extensions from your Solaris system, you perform specific steps to remove Trusted Extensions customizations to the Solaris system.
|
||
|