Checklist for Configuring Trusted Extensions
The following list summarizes what is required to install and configure Trusted
Extensions at your site. Tasks that are covered in other books are cross-referenced.
- Read. 
- Prepare. - Decide the root password. 
- Decide the PROM or BIOS security level. 
- Decide the PROM or BIOS password. 
- Decide if attached peripherals are permitted. 
- Decide if access to remote printers is permitted. 
- Decide if access to unlabeled networks is permitted. 
- Decide the zone creation method. 
 
- Install Trusted Extensions. - Install the Solaris OS. - For remote administration, install the Developer Group or larger group of Solaris packages. 
- For the Clone Zone creation method, select Custom Install, then lay out a /zone partition. 
 
- Add Trusted Extensions packages. 
 
- If using IPv6, enable IPv6 for Trusted Extensions. 
- (Optional) Create ZFS pool for cloning zones. 
- Configure labels. - Finalize your site's label_encodings file. 
- Check and install the file. 
- Reboot. 
 
- Configure interfaces for the global zone and for labeled zones. 
- Configure the Solaris Management Console. 
- Configure the naming service. 
- Configure network connections for LDAP. - Assign an LDAP server or proxy server to the cipso host type in a remote host template. 
- Assign the local system to the cipso host type in a remote host template. 
- Make the local system a client of the LDAP server. 
 
- Create labeled zones. 
- Configure the network. See Configuring Trusted Network Databases (Task Map) in Solaris Trusted Extensions Administrator’s Procedures. - Identify single-label hosts and limited-range hosts. 
- Determine the labels to apply to incoming data from unlabeled hosts. 
- Customize the remote host templates. 
- Assign individual hosts to templates. 
- Assign subnets to templates. 
 
- Establish static routing. See Configuring Routes and Checking Network Information in Trusted Extensions (Task Map) in Solaris Trusted Extensions Administrator’s Procedures. 
- Configure local users and local administrative roles. - Create the Security Administrator role. 
- Create a local user who can assume the Security Administrator role. 
- Create other roles, and possibly other local users to assume these roles. 
 
- Create home directories on the NFS server. 
- Configure printing. See Managing Printing in Trusted Extensions (Task Map) in Solaris Trusted Extensions Administrator’s Procedures. 
- Configure devices. See Handling Devices in Trusted Extensions (Task Map) in Solaris Trusted Extensions Administrator’s Procedures. - Assign the Device Management profile or the System Administrator profile to a role. 
- To make devices usable, do one of the following: - Per system, make devices allocatable. 
- Assign the Allocate Device authorization to selected users and roles. 
 
 
- Configure Solaris features.