|
|||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
Who Should Use This BookThis book is for knowledgeable system administrators and security administrators who are installing Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks. |
||
|