<?Pub UDT _bookmark _target?><?Pub EntList bsol dash hellip gt lt minus?><?Pub CX solbook(book(title()bookinfo()chapter()?><chapter id="tmap-1"><?Pub Tag atict:info tracking="on" ref="0"?><?Pub Tag atict:user
user="sharonr" fullname="Sharon Veach"?><title>Configuration Roadmap for Trusted Extensions</title><indexterm><primary>Trusted Extensions configuration</primary><secondary>task maps</secondary>
</indexterm><indexterm><primary>configuring Trusted Extensions</primary><secondary>task maps</secondary>
</indexterm><highlights><para>This chapter outlines the tasks for enabling and configuring <trademark>Solaris</trademark> Trusted Extensions software.</para>
</highlights><sect1 id="tmap-4"><title>Task Map: Preparing a Solaris System for Trusted Extensions</title><indexterm><primary>roadmaps</primary><secondary>Task Map: Preparing a Solaris System for Trusted Extensions</secondary>
</indexterm><indexterm><primary>Task Map: Preparing a Solaris System for Trusted Extensions</primary>
</indexterm><para>Ensure that the Solaris OS on which you plan to run Trusted Extensions supports
the features of Trusted Extensions that you plan to use. Complete one of the two
tasks that are described in the following task map.</para><informaltable frame="topbot" pgwide="1"><tgroup cols="2" colsep="1" rowsep="1"><colspec colname="colspec2" colwidth="47.81*"/><colspec colname="colspec3" colwidth="52.19*"/><thead><row><entry><para>Task</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry colname="colspec2"><para>Prepare an existing or upgraded Solaris installation for Trusted Extensions.</para>
</entry><entry colname="colspec3"><para><olink targetptr="startinst-5" remap="internal">Prepare an Installed Solaris System for
Trusted Extensions</olink></para>
</entry>
</row><row><entry colname="colspec2"><para>Install the Solaris OS with Trusted Extensions features in mind.</para>
</entry><entry colname="colspec3"><para><olink targetptr="startinst-7" remap="internal">Install a Solaris System to Support Trusted
Extensions</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect1><sect1 id="tmap-2"><title>Task Map: Preparing For and Enabling Trusted Extensions</title><indexterm><primary>roadmaps</primary><secondary>Task Map: Preparing For and Enabling Trusted Extensions</secondary>
</indexterm><indexterm><primary>Task Map: Preparing For and Enabling Trusted Extensions</primary>
</indexterm><para>To prepare a Trusted Extensions system before configuring it, complete the
tasks that are described in the following task map.</para><informaltable frame="topbot" pgwide="1"><tgroup cols="2" colsep="1" rowsep="1"><colspec colname="colspec2" colwidth="44.79*"/><colspec colname="colspec3" colwidth="55.21*"/><thead><row><entry><para>Task</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry colname="colspec2"><para>Complete the preparation of your Solaris system.</para>
</entry><entry colname="colspec3"><para><olink targetptr="tmap-4" remap="internal">Task Map: Preparing a Solaris System for Trusted
Extensions</olink></para>
</entry>
</row><row><?PubTbl row rht="0.89in"?><entry colname="colspec2" morerows="1" rowsep="1"><para>Back up your system.</para>
</entry><entry colname="colspec3"><para>For a Trusted Solaris 8 system, back up the system as described in the documentation
for your release. A labeled backup can be restored to each identically labeled
zone.</para>
</entry>
</row><row><entry><para>For a Solaris system, see <olink targetdoc="sysadv1" remap="external"><citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>.</para>
</entry>
</row><row><entry><para>Gather information and make decisions about your system and your Trusted Extensions network.</para>
</entry><entry><para><olink targetptr="startinst-6" remap="internal">Collecting Information and Making Decisions
Before Enabling&nbsp;Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Enable Trusted Extensions.</para>
</entry><entry><para><olink targetptr="startinst-8" remap="internal">Enable Solaris Trusted Extensions</olink></para>
</entry>
</row><row><entry morerows="4" rowsep="1"><para>Configure the system.</para>
</entry><entry><para>For a system with a monitor, see <olink targetptr="tmap-12" remap="internal">Task Map:
Configuring Trusted Extensions</olink>.</para>
</entry>
</row><row><entry><para>For a headless system, see <olink targetptr="headl-2" remap="internal">Headless System
Configuration in Trusted Extensions (Task Map)</olink>.</para>
</entry>
</row><row><entry><para>For a Sun <trademark>Ray</trademark>, see   <olink targetdoc="820-3770" remap="external"><citetitle remap="book">Sun Ray Server Software 4.1 Installation and Configuration Guide for the Solaris Operating System</citetitle></olink>. To configure initial client-server communication,
see <olink targetptr="managetnet-3" remap="internal">Configuring Trusted Network Databases (Task Map)</olink>.</para>
</entry>
</row><row><entry><para>For a laptop, go to the <ulink url="http://opensolaris.org/os/community/security" type="text_url">OpenSolaris
Community: Security web page</ulink>. Click Trusted Extensions. On the Trusted Extensions page
under Laptop Configurations, click <literal>Laptop instructions</literal>.</para>
</entry>
</row><row><?PubTbl row rht="1.47in"?><entry><para>To prevent networks from communicating with the global zone, configure
the <literal>vni0</literal> interface. For an example, see the <literal>Laptop
instructions</literal>.</para><para>In the Solaris Express Community Edition, you do not need to configure the <literal>vni0</literal> interface.
By default, the <literal>lo0</literal> interface is an <literal>all-zones</literal> interface.
You can make your external connection, <literal>dhcp</literal>, be an <literal>all-zones</literal> interface. For instructions, see the <literal>Laptop
instructions</literal>.</para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect1><sect1 id="tmap-12"><title>Task Map: Configuring Trusted Extensions</title><indexterm><primary>roadmaps</primary><secondary>Task Map: Configuring Trusted Extensions</secondary>
</indexterm><indexterm><primary>Task Map: Configuring Trusted Extensions</primary>
</indexterm><para>For a secure configuration process, create roles early. The order of
tasks when roles configure the system is shown in the following task map.</para><informaltable frame="topbot" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><?PubTbl tgroup rth="0.00pt"?><colspec colname="colspec2" colwidth="4.88*"/><colspec colname="colspec1" colwidth="46.56*"/><colspec colname="colspec0" colwidth="47.54*"/><thead><row><entry namest="colspec2" nameend="colspec0" colsep="1"><para>1. Configure the global zone.</para>
</entry>
</row><row><entry rowsep="0">
</entry><entry><para>Tasks</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry morerows="7" rowsep="1">
</entry><entry><para>Protect machine hardware by requiring a password to change hardware
settings.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="secsystask-46" remap="external"><citetitle remap="section">Controlling Access to System Hardware</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para>Configure labels. Labels <emphasis>must</emphasis> be configured for
your site. If you plan to use the default <filename>label_encodings</filename> file,
you can skip this task.</para>
</entry><entry><para><olink targetptr="confsys-17" remap="internal">Check and Install Your Label Encodings
File</olink></para>
</entry>
</row><row><entry><para>If you are running an IPv6 network, you modify  the <filename>/etc/system</filename> file
to enable IP to recognize labeled packets.</para>
</entry><entry><para><olink targetptr="txconf-35" remap="internal">Enable IPv6 Networking in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>If the CIPSO Domain of Interpretation (DOI) of your network nodes is
different from <literal>1</literal>, specify the DOI in the <filename>/etc/system</filename> file.</para>
</entry><entry><para><olink targetptr="txconf-92" remap="internal">Configure the Domain of Interpretation</olink></para>
</entry>
</row><row><entry><para>If you plan to use a Solaris ZFS snapshot to clone zones, create
the ZFS pool.</para>
</entry><entry><para><olink targetptr="txconf-42" remap="internal">Create ZFS Pool for Cloning Zones</olink></para>
</entry>
</row><row><entry><para>Boot to activate a labeled environment. Upon login, you are in the global
zone. The system's  <filename>label_encodings</filename> file  enforces mandatory
access control (MAC).</para>
</entry><entry><para><olink targetptr="confsys-3" remap="internal">Reboot and Log In to Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Initialize the Solaris Management Console. This GUI is used to label zones, among other tasks.</para>
</entry><entry><para><olink targetptr="confsys-21" remap="internal">Initialize the Solaris Management Console
Server in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Create the Security Administrator role and other roles that you plan
to use locally. You create these roles just as you would create them in the Solaris OS.</para><para>You can delay this task until the end. For the consequences, see <olink targetptr="ovw-27" remap="internal">Devising a Configuration Strategy for Trusted Extensions</olink>.</para>
</entry><entry><para><olink targetptr="txconf-14" remap="internal">Creating Roles and Users in Trusted Extensions</olink></para><para><olink targetptr="txconf-29" remap="internal">Verify That the Trusted Extensions Roles
Work</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable><para>Skip the next set of tasks if you are using local files administer the
system.</para><informaltable frame="topbot" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><?PubTbl tgroup rth="0.00pt"?><colspec colname="colspec2" colwidth="4.88*"/><colspec colname="colspec1" colwidth="46.56*"/><colspec colname="colspec0" colwidth="47.54*"/><thead><row><entry namest="colspec2" nameend="colspec0" colsep="1"><para>2. Configure a naming service.</para>
</entry>
</row><row><entry rowsep="0">
</entry><entry><para>Tasks</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry morerows="4" rowsep="1">
</entry><entry><para>If you plan to use files to administer Trusted Extensions, you can skip
the following tasks.</para>
</entry><entry><para>No configuration is required for the files naming service.</para>
</entry>
</row><row><entry><para>If you have an existing Sun <trademark>Java</trademark> System Directory Server (LDAP server),  add Trusted Extensions databases
to the server. Then  make your first Trusted Extensions  system a proxy of the
LDAP server.</para><para>If you do not have an LDAP server, then  configure your first system
as the server.</para>
</entry><entry><para><olink targetptr="txldap-1" remap="internal">Chapter&nbsp;5, Configuring LDAP for Trusted
Extensions (Tasks)</olink></para>
</entry>
</row><row><entry><para>Manually set up an LDAP toolbox for the Solaris Management Console. The toolbox can be used
to modify Trusted Extensions attributes on network objects.</para>
</entry><entry><para><olink targetptr="confsys-10" remap="internal">Configuring the Solaris Management Console
for LDAP (Task Map)</olink></para>
</entry>
</row><row><entry><para>For systems that are not the LDAP server or proxy server, make them
an LDAP client.</para>
</entry><entry><para><olink targetptr="txldap-8" remap="internal">Make the Global Zone an LDAP Client in Trusted
Extensions</olink></para>
</entry>
</row><row><entry><para>In the LDAP scope, create the Security Administrator role and other
roles that you plan to use.</para><para>You can delay this task until the end. For the consequences, see <olink targetptr="ovw-27" remap="internal">Devising a Configuration Strategy for Trusted Extensions</olink>.</para>
</entry><entry><para><olink targetptr="txconf-14" remap="internal">Creating Roles and Users in Trusted Extensions</olink></para><para><olink targetptr="txconf-29" remap="internal">Verify That the Trusted Extensions Roles
Work</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable><informaltable frame="topbot" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><?PubTbl tgroup rth="0.00pt"?><colspec colname="colspec2" colwidth="4.88*"/><colspec colname="colspec1" colwidth="46.56*"/><colspec colname="colspec0" colwidth="47.54*"/><thead><row><entry namest="colspec2" nameend="colspec0" colsep="1"><para>3. Create labeled zones.</para>
</entry>
</row><row><entry rowsep="0">
</entry><entry><para>Tasks</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry morerows="2" rowsep="1"><?Pub _cellfont Shading="white"?>
</entry><entry><para>Run the <command>txzonemgr</command> command.  </para><para>Follow the menus to configure the network interfaces, then create and
customize the first labeled zone. Then, copy or clone the rest of the zones.</para>
</entry><entry><para><olink targetptr="txconf-20" remap="internal">Creating Labeled Zones</olink></para>
</entry>
</row><row><entry><para>Or, use Trusted CDE actions.</para>
</entry><entry><para><olink targetptr="aptxconf-1" remap="internal">Appendix&nbsp;B, Using CDE Actions to
Install Zones in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>(Optional) After all zones are successfully customized, add zone-specific
network addresses and default routing to the labeled zones.</para>
</entry><entry><para><olink targetptr="txconf-98" remap="internal">Adding Network Interfaces and Routing to
Labeled Zones</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable><para>The
following tasks might be necessary in your environment.</para><informaltable frame="topbot" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><?PubTbl tgroup rth="0.00pt"?><colspec colname="colspec2" colwidth="4.88*"/><colspec colname="colspec1" colwidth="46.56*"/><colspec colname="colspec0" colwidth="47.54*"/><thead><row><entry namest="colspec2" nameend="colspec0" colsep="1"><para>4. Complete system setup.</para>
</entry>
</row><row><entry rowsep="0">
</entry><entry><para>Tasks</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry morerows="4" rowsep="1">
</entry><entry><para>Identify additional remote hosts that require a label, one or more multilevel
ports, or a different control message policy.</para>
</entry><entry><para><olink targetptr="managetnet-3" remap="internal">Configuring Trusted Network Databases (Task Map)</olink></para>
</entry>
</row><row><entry><para>Create a multilevel home directory server, then automount the installed
zones.</para>
</entry><entry><para><olink targetptr="txconf-50" remap="internal">Creating Home Directories in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Configure auditing, mount file systems, and perform other tasks before
enabling users to log in to the system.</para>
</entry><entry><para><olink targetptr="trp-part-2" remap="internal">Part&nbsp;II, Administration of Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Add users from an NIS environment to your LDAP server.</para>
</entry><entry><para><olink targetptr="txconf-65" remap="internal">Add an NIS User to the LDAP Server</olink></para>
</entry>
</row><row><entry><para>Add a host and its labeled zones to the LDAP server.</para>
</entry><entry><para><olink targetptr="managetnet-3" remap="internal">Configuring Trusted Network Databases (Task Map)</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect1>
</chapter><?Pub *0000016444 0?>