Document Information
Preface
1. Security Planning for Trusted Extensions
2. Installation and Configuration Roadmap for Trusted Extensions
3. Installing Solaris Trusted Extensions Software (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
A. Site Security Policy
B. Using CDE Actions to Install Zones in Trusted Extensions
C. Configuration Checklist for Trusted Extensions
Checklist for Configuring Trusted Extensions
Glossary
Index
|
S
- screens, initial display, Reboot and Log In to Trusted Extensions
- security
- install team, Install Team Responsibilities
- publications, Additional Security References
- root password, Prepare an Installed Solaris System for Trusted Extensions
- site security policy, Site Security Policy
- Security Administrator role, creating, Create the Security Administrator Role in Trusted Extensions
- Share Logical Interface action, Specify Two IP Addresses for the System by Using a CDE Action
- Share Physical Interface action, Specify One IP Address for the System by Using a CDE Action
- Shut Down Zone action, Customize a Booted Zone in Trusted Extensions
- site security policy
- common violations, Common Security Violations
- personnel recommendations, Personnel Security Recommendations
- physical access recommendations, Physical Security Recommendations
- recommendations, Computer Security Recommendations
- tasks involved, Site Security Policy
- Trusted Extensions configuration decisions, Site Security Policy and Trusted Extensions
- understanding, Understanding Your Site's Security Policy
- Solaris installation options, requirements, Install a Solaris System to Support Trusted Extensions
- Solaris installed systems, requirements for Trusted Extensions, Prepare an Installed Solaris System for Trusted Extensions
- Solaris Management Console
- configuring for LDAP, Configuring the Solaris Management Console for LDAP (Task Map)
- configuring LDAP toolbox, Edit the LDAP Toolbox in the Solaris Management Console
- enabling LDAP toolbox to be used, Enable an LDAP Client to Administer LDAP
- initializing, Initialize the Solaris Management Console Server in Trusted Extensions
- loading a Trusted Extensions toolbox, Initialize the Solaris Management Console Server in Trusted Extensions
- registering LDAP credentials, Register LDAP Credentials With the Solaris Management Console
- troubleshooting
- Initialize the Solaris Management Console Server in Trusted Extensions
- Initialize the Solaris Management Console Server in Trusted Extensions
- using Trusted Network Zone Configuration tool
- Name and Label the Zone
- Specify Zone Names and Zone Labels by Using a CDE Action
- working with Sun Java System Directory Server, Configuring the Solaris Management Console for LDAP (Task Map)
- Solaris OS installation, options that affect Trusted Extensions, Installing Solaris Trusted Extensions Software (Tasks)
- Solaris Trusted Extensions, See Trusted Extensions
- Start Zone action, Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- starting
- zones
- Boot the Labeled Zone
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- Sun Java System Directory Server, See LDAP server
T
- tape devices, allocating, How to Copy Files From Portable Media in Trusted Extensions
- Task Map: Configuring Trusted Extensions, Task Map: Configuring Trusted Extensions
- Task Map: Preparing a Solaris System for Trusted Extensions, Task Map: Preparing a Solaris System for Trusted Extensions
- Task Map: Preparing For and Installing Trusted Extensions, Task Map: Preparing For and Installing Trusted Extensions
- tasks and task maps
- Additional Trusted Extensions Configuration Tasks, Additional Trusted Extensions Configuration Tasks
- Associating Network Interfaces With Zones by Using CDE Actions (Task Map), Associating Network Interfaces With Zones by Using CDE Actions (Task Map)
- Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
- Configuring an LDAP Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
- Configuring the Solaris Management Console for LDAP (Task Map), Configuring the Solaris Management Console for LDAP (Task Map)
- Creating Labeled Zones, Creating Labeled Zones
- Creating the Labeled Zones by Using CDE Actions (Task Map), Creating Labeled Zones by Using CDE Actions (Task Map)
- Headless System Configuration in Trusted Extensions (Task Map), Headless System Configuration in Trusted Extensions (Task Map)
- Preparing to Create Zones by Using CDE Actions (Task Map), Preparing to Create Zones by Using CDE Actions (Task Map)
- tcp_listen=true LDAP setting, Enable an LDAP Client to Administer LDAP
- toolboxes
- adding LDAP server to tsol_ldap.tbx, Edit the LDAP Toolbox in the Solaris Management Console
- loading in Trusted Extensions, Initialize the Solaris Management Console Server in Trusted Extensions
- Scope=LDAP, Register LDAP Credentials With the Solaris Management Console
- troubleshooting
- accessing X server, Labeled Zone Is Unable to Access the X Server
- console window not opening, Cannot Open the Console Window in a Labeled Zone
- Exception in thread "main" java.lang.NoClassDefFoundError: wizard, Install the Solaris Trusted Extensions Packages
- Installation of these packages generated errors: SUNWpkgname
- Install the Labeled Zone
- Install, Initialize, and Boot a Labeled Zone by Using CDE Actions
- IPv6 configuration, Enable IPv6 Networking in Trusted Extensions
- Solaris Management Console
- Initialize the Solaris Management Console Server in Trusted Extensions
- Initialize the Solaris Management Console Server in Trusted Extensions
- Trusted Extensions configuration, Troubleshooting Your Trusted Extensions Configuration
- Trusted Network Zones Properties, Specify Zone Names and Zone Labels by Using a CDE Action
- Trusted Extensions
- See also Trusted Extensions installation
- differences from Solaris administrator's perspective, Results of Installing Trusted Extensions From an Administrator's Perspective
- installing, Install the Solaris Trusted Extensions Packages
- preparing to install
- Installing or Upgrading the Solaris OS for Trusted Extensions
- Collecting Information and Making Decisions Before Installing Trusted Extensions
- uninstalling, How to Remove Trusted Extensions From the System
- Trusted Extensions configuration
- adding network databases to LDAP server, Populate the Sun Java System Directory Server
- databases for LDAP, Configuring the Sun Java System Directory Server on a Trusted Extensions System
- evaluated configuration, Understanding Your Site's Security Policy
- headless systems, Configuring a Headless System With Trusted Extensions (Tasks)
- initial procedures, Configuring Trusted Extensions (Tasks)
- labeled zones
- Creating Labeled Zones
- Using CDE Actions to Install Zones in Trusted Extensions
- LDAP, Configuring the Sun Java System Directory Server on a Trusted Extensions System
- troubleshooting, Troubleshooting Your Trusted Extensions Configuration
- Trusted Extensions installation
- collecting information before, Collect System Information Before Installing Trusted Extensions
- decisions to make before, Make System and Security Decisions Before Installing Trusted Extensions
- division of tasks, Install Team Responsibilities
- headless systems, Configuring a Headless System With Trusted Extensions (Tasks)
- install team responsibilities, Install Team Responsibilities
- Java wizard, Install the Solaris Trusted Extensions Packages
- memory requirements, Planning System Hardware and Capacity for Trusted Extensions
- pkgadd commands, Install the Solaris Trusted Extensions Packages
- planning, Planning for Security in Trusted Extensions
- planning hardware, Planning System Hardware and Capacity for Trusted Extensions
- planning installation and configuration strategy, Devising an Installation and Configuration Strategy for Trusted Extensions
- planning network, Planning Your Trusted Network
- reboot to activate labels, Reboot and Log In to Trusted Extensions
- results before configuration, Results of Installing Trusted Extensions From an Administrator's Perspective
- task maps, Installation and Configuration Roadmap for Trusted Extensions
- two-role configuration strategy, Devising an Installation and Configuration Strategy for Trusted Extensions
- uninstalling, How to Remove Trusted Extensions From the System
- Trusted Extensions network
- adding zone-specific interface, Add a Network Interface to an Existing Labeled Zone
- enabling IPv6, Enable IPv6 Networking in Trusted Extensions
- planning, Planning Your Trusted Network
- Trusted Extensions requirements
- root password, Prepare an Installed Solaris System for Trusted Extensions
- Solaris installation, Install a Solaris System to Support Trusted Extensions
- Solaris installed systems, Prepare an Installed Solaris System for Trusted Extensions
- Trusted Network Zones tool
- assigning labels to named zones
- Name and Label the Zone
- Specify Zone Names and Zone Labels by Using a CDE Action
- troubleshooting, Specify Zone Names and Zone Labels by Using a CDE Action
- tsol_ldap.tbx file, Edit the LDAP Toolbox in the Solaris Management Console
- txzonemgr script
- Run the txzonemgr Script
- Labeled Zone Is Unable to Access the X Server
|