Chapter 4
Configuring Trusted Extensions (Tasks)
This chapter covers how to configure SolarisTM Trusted Extensions on a system
with a monitor. To work properly, Trusted Extensions software requires configuration of the following:
labels, zones, the network, users who can assume roles, roles, and tools.
For other configuration tasks, see Part II, Administration of Trusted Extensions.