IBM Endpoint Manager, Version 9.0

Installing on Linux systems

After understanding the terms and the administrative roles, you are ready to actually get authorized and install the programs.

Because IBM Endpoint Manager is powerful, you might want to limit access to trusted, authorized personnel only. The program depends on a central repository of Fixlet actions called the Action site, which uses public/private key encryption to protect against spoofing and other unauthorized usage. To get started, you need authorization from IBM by getting a License Authorization file, which will have a name like CompanyName.BESLicenseAuthorization.

The installation program collects further information about your deployment and then creates a file called the action site masthead. This file establishes a chain of authority from the IBM Endpoint Manager root all the way down to the Console operators in your organization. The masthead combines configuration information (IP addresses, ports, and so on) and license information (how many Clients are authorized and for how long) together with a public key used to verify the digital signatures.



Feedback