[AIX Solaris HP-UX Linux Windows]

Securing your environment before installation

The following instructions explain how to perform a product installation with proper authority.

About this task

Complete the following steps when you plan to use the local operating system as your user registry:

Procedure

  • [Windows]Secure your environment.
    1. The Windows Administrative Tools selection can be found under the Windows Control Panel, depending on which version of Windows you have installed. Under Administrative Tools, select Local Security Policy (for domain configuration, select Domain Security Policies, instead).
    2. From the Local Security Settings panel, click Local Policies > User Rights Assignment and from the Local Security Settings panel, add Login as a service rights to the login ID. The logon user must be a member of the administrator group with the rights of Log on as a service.
  • [Linux][AIX][HP-UX][Solaris]Secure your environment.
    1. Log on as root and verify that the umask value is 022.
    2. To verify that the umask value is 022, run the umask command.
    3. To set up the umask value as 022, run the umask 022 command.
    4. Optional: [Linux][Solaris]Make sure that the /etc directory contains a shadow password file.
      The shadow password file is named shadow and is in the /etc directory. If the shadow password file does not exist, an error occurs after enabling administrative security and configuring the user registry as local operating system.
    5. To create the shadow file, run the pwconv command (without any parameters).
      This command creates an /etc/shadow file from the /etc/passwd file. After creating the shadow file, you can configure local operating system security.

Results

These steps help secure your environment when you use the local operating system as your user registry