|
|||||||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions Task Map: Preparing For and Installing Trusted Extensions Task Map: Configuring Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
Task Map: Preparing a Solaris System for Trusted ExtensionsEnsure that the Solaris OS on which you are installing Trusted Extensions supports the features of Trusted Extensions that you plan to use. Complete one of the two tasks that are described in the following task map.
|
||||||
|