<?Pub UDT _bookmark _target?><?Pub EntList bsol dash hellip gt lt minus?><?Pub CX solbook(book(title()bookinfo()?><part id="trp-part-1"><?Pub Tag atict:info tracking="on" ref="0"?><?Pub Tag
atict:user user="sharonr" fullname="Sharon Veach"?><title>Initial Configuration of Trusted Extensions</title><partintro><para>This section describes how to prepare for running Trusted Extensions. The
chapters cover enabling Trusted Extensions and initial setup. For networked systems,
initial setup includes configuring LDAP for Trusted Extensions.</para><para><olink targetptr="ovw-1" remap="internal">Chapter&nbsp;1, Security Planning for Trusted
Extensions</olink> describes the security issues that you need to consider
when configuring Trusted Extensions software on one or more Solaris systems.</para><para><olink targetptr="tmap-1" remap="internal">Chapter&nbsp;2, Configuration Roadmap for
Trusted Extensions</olink> contains task maps for adding Trusted Extensions software
to Solaris systems.</para><para><olink targetptr="startinst-1" remap="internal">Chapter&nbsp;3, Adding Solaris Trusted
Extensions Software to the Solaris OS (Tasks)</olink> provides instructions
on preparing a Solaris system for Trusted Extensions software. It also includes
instructions on enabling Trusted Extensions.</para><para><olink targetptr="txconf-1" remap="internal">Chapter&nbsp;4, Configuring Trusted Extensions
(Tasks)</olink> provides instructions on configuring Trusted Extensions software
on a system with a monitor.</para><para><olink targetptr="txldap-1" remap="internal">Chapter&nbsp;5, Configuring LDAP for Trusted
Extensions (Tasks)</olink> provides instructions on configuring LDAP for Trusted Extensions.</para><para><olink targetptr="headl-1" remap="internal">Chapter&nbsp;6, Configuring a Headless System
With Trusted Extensions (Tasks)</olink> describes how to configure and administer Trusted Extensions software
on a headless system.</para>
</partintro>&ovw;&tmap;&startinst;&txconf;&txldap;&headl;
</part><?Pub *0000002363 0?>