Document Information
Preface
1. Security Planning for Trusted Extensions
2. Installation and Configuration Roadmap for Trusted Extensions
3. Installing Solaris Trusted Extensions Software (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
A. Site Security Policy
B. Using CDE Actions to Install Zones in Trusted Extensions
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
Glossary
Index
|
F
H
I
- Initialize Zone for LDAP action, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- initializing
- Solaris Management Console, Initialize the Solaris Management Console Server in Trusted Extensions
- zones, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- zones for LDAP, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- install team, checklist for configuring Trusted Extensions, Checklist for Configuring Trusted Extensions
- Install Zone action, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- troubleshooting, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- installation, See Trusted Extensions installation
- installation menu
- Create a new zone
- Name and Label the Zone
- Create Another Zone in Trusted Extensions
- Zone Console, Boot the Labeled Zone
- installing
- See also Trusted Extensions installation
- label_encodings file, Check and Install Your Label Encodings File
- Solaris OS for Trusted Extensions, Installing Solaris Trusted Extensions Software (Tasks)
- Sun Java System Directory Server, Configuring the Sun Java System Directory Server on a Trusted Extensions System
- Trusted Extensions packages, Install the Solaris Trusted Extensions Packages
- zones
- Install the Labeled Zone
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- IPv6
- entry in /etc/system file, Enable IPv6 Networking in Trusted Extensions
- troubleshooting, Enable IPv6 Networking in Trusted Extensions
J
L
- label_encodings file
- checking, Check and Install Your Label Encodings File
- installing, Check and Install Your Label Encodings File
- localizing, For International Customers of Trusted Extensions
- modifying, Check and Install Your Label Encodings File
- Labeled Zone Manager, See txzonemgr script
- labeling
- turning on labels, Reboot and Log In to Trusted Extensions
- zones
- Name and Label the Zone
- Specify Zone Names and Zone Labels by Using a CDE Action
- labels
- assigning to named zones
- Name and Label the Zone
- Specify Zone Names and Zone Labels by Using a CDE Action
- on trusted stripe, Reboot and Log In to Trusted Extensions
- planning, Devising a Label Strategy
- specifying for zones
- Name and Label the Zone
- Specify Zone Names and Zone Labels by Using a CDE Action
- LDAP
- enabling administration from a client, Enable an LDAP Client to Administer LDAP
- planning, Planning for the LDAP Naming Service in Trusted Extensions
- LDAP configuration
- creating client, Make the Global Zone an LDAP Client in Trusted Extensions
- for Trusted Extensions, Configuring the Sun Java System Directory Server on a Trusted Extensions System
- LDAP server
- collecting information for, Collect Information for the Directory Server for LDAP
- configuring multilevel port, Configure a Multilevel Port for the Sun Java System Directory Server
- configuring naming service, Install the Sun Java System Directory Server
- configuring proxy for Trusted Extensions clients, Creating a Trusted Extensions Proxy for an Existing Sun Java System Directory Server
- creating proxy for Trusted Extensions clients, Create an LDAP Proxy Server
- installing in Trusted Extensions, Install the Sun Java System Directory Server
- protecting access logs, Protect Access Logs for the Sun Java System Directory Server
- protecting error logs, Protect Error Logs for the Sun Java System Directory Server
- registering credentials with Solaris Management Console, Register LDAP Credentials With the Solaris Management Console
- logging in, to a home directory server, Enable Users to Access Their Home Directories in Trusted Extensions
- lpaddent command, Add an NIS User to the LDAP Server
M
N
P
- planning
- account creation, Planning User Security in Trusted Extensions
- administration strategy, Devising an Administration Strategy for Trusted Extensions
- auditing, Planning for Auditing in Trusted Extensions
- data migration, Backing Up the System Before Installing Trusted Extensions
- hardware, Planning System Hardware and Capacity for Trusted Extensions
- installation, Planning for Security in Trusted Extensions
- labels, Devising a Label Strategy
- LDAP naming service, Planning for the LDAP Naming Service in Trusted Extensions
- network, Planning Your Trusted Network
- NFS server, Planning for Multilevel Access
- printing, Planning for Multilevel Access
- Trusted Extensions configuration strategy, Devising an Installation and Configuration Strategy for Trusted Extensions
- Trusted Extensions installation, Planning for Security in Trusted Extensions
- zones, Planning for Zones in Trusted Extensions
- Preparing to Create Zones by Using CDE Actions (Task Map), Preparing to Create Zones by Using CDE Actions (Task Map)
- printing, planning, Planning for Multilevel Access
- publications, security and UNIX, Additional Security References
R
- rebooting
- activating labels, Reboot and Log In to Trusted Extensions
- enabling login to labeled zone, Enable Users to Log In to a Labeled Zone
- registering, LDAP credentials with the Solaris Management Console, Register LDAP Credentials With the Solaris Management Console
- removing Trusted Extensions, How to Remove Trusted Extensions From the System
- requirements for Trusted Extensions
- Solaris installation options, Install a Solaris System to Support Trusted Extensions
- Solaris installed systems, Prepare an Installed Solaris System for Trusted Extensions
- roadmaps
- Task Map: Configuring Trusted Extensions, Task Map: Configuring Trusted Extensions
- Task Map: Preparing a Solaris System for Trusted Extensions, Task Map: Preparing a Solaris System for Trusted Extensions
- Task Map: Preparing For and Installing Trusted Extensions, Task Map: Preparing For and Installing Trusted Extensions
- roleadd command, Create the Security Administrator Role in Trusted Extensions
- roles
- adding local role with roleadd, Create the Security Administrator Role in Trusted Extensions
- creating Security Administrator, Create the Security Administrator Role in Trusted Extensions
- determining when to create, Make System and Security Decisions Before Installing Trusted Extensions
- verifying they work, Verify That the Trusted Extensions Roles Work
- root passwords, required in Trusted Extensions, Prepare an Installed Solaris System for Trusted Extensions
|