Task Map: Configuring Trusted Extensions
For a secure installation, create roles early in the configuration process. The order
of tasks when roles configure the system is shown in the following task
Skip the next set of tasks if you are using local files
administer the system.
Many of the next set of tasks are described in Solaris Trusted Extensions Administrator’s Procedures.