[AIX HP-UX Linux Solaris Windows]This topic applies only on the z/OS operating system.

Preparing for security at installation time

Complete the following tasks to implement security before, during, and after installing WebSphere Application Server.

Procedure

  1. [AIX HP-UX Linux Solaris Windows] Secure your environment before installation. This step describes how to perform WebSphere Application Server installation with proper authority on different platforms. For more information refer to Securing your environment before installation.
  2. [AIX HP-UX Linux Solaris Windows] Prepare the operating system for installation of WebSphere Application Server. This step describes how to prepare the different operating systems for installation of WebSphere Application Server. For more information, see Preparing the operating system for product installation.
  3. [z/OS] Install WebSphere Application Server. This step describes how to install WebSphere Application Server on the z/OS platform. For more information, see Installing the product and additional software.
  4. [AIX HP-UX Linux Solaris Windows] Optional: You can create a profile during install time. If you elect to do so, administrative security is enabled for that profile "out of the box" by default. A panel is displayed during profile creation time and enabling administrative security is selected by default. If you elect to keep this as the default, you must supply an administrative user ID and password. This user ID is created in a federated repository, which is the default user registry when enabling administrative security at profile creation time.
  5. [z/OS] Optional: During customization of a standalone application server or Network Deployment cell, you can enable administrative security "out of the box" by using either a z/OS security product or WebSphere Application Server to manage users, groups, and the security policy. For more information, see Initial security configuration.
  6. Secure your environment after installation. This step provides information on how to protect password information after you install WebSphere Application Server. For more information, see Securing your environment after installation.
  7. [z/OS] For information about enabling security after customization is complete, see Enabling security.



In this information ...


IBM Redbooks, demos, education, and more

(Index)

Use IBM Suggests to retrieve related content from ibm.com and beyond, identified for your convenience.

This feature requires Internet access.

Task topic    

Terms of Use | Feedback

Last updated: Feb 19, 2011 5:25:36 AM CST
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=v610web&product=was-nd-mp&topic=tsecinstall
File name: tsec_install.html