|
|||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
Implementing Site SecuritySuccessfully configuring Trusted Extensions on a system in a way that is consistent with site security requires understanding the security features of Trusted Extensions and your site security policy. Before you install the Solaris Trusted Extensions packages, read Chapter 1, Security Planning for Trusted Extensions for information about how to ensure site security when configuring the software. |
||
|