Implementing Site Security
Successfully configuring Trusted Extensions on a system in a way that is consistent
with site security requires understanding the security features of Trusted Extensions and your
site security policy. Before you install the Solaris Trusted Extensions packages, read Chapter 1, Security Planning for Trusted Extensions
for information about how to ensure site security when configuring the software.