|
|||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
PrefaceThe Solaris Trusted Extensions Installation and Configuration guide provides procedures for configuring SolarisTM Trusted Extensions on the Solaris Operating System. This guide also describes preparing the Solaris system to support a secure installation of Solaris Trusted Extensions. Note - This Solaris release supports systems that use the SPARC® and x86 families of processor architectures: UltraSPARC® , SPARC64, AMD64, Pentium, and Xeon EM64T. The supported systems appear in the Solaris 10 Hardware Compatibility List at http://www.sun.com/bigadmin/hcl. This document cites any implementation differences between the platform types. In this document these x86 related terms mean the following:
For supported systems, see the Solaris 10 Hardware Compatibility List. |
||
|