Task Map: Configuring Trusted Extensions
For a secure configuration process, create roles early. The order of tasks when
roles configure the system is shown in the following task map.
Skip the next set of tasks if you are using local files
administer the system.
The following tasks might be necessary in your environment.