Depending on your security policy, you might need a user
ID and password to complete tasks such as creating files and folders
and accessing the database. Prepare secure user IDs to prevent problems
when the servers attempt to access protected data.
Before you begin
- Complete the design of your database.
- Determine the authentication system to use, for example, Lightweight
Directory Access Protocol (LDAP).
- Determine what controls are in place that affect the authorizations
required for your IBM® Business Process Manager installation.
- Identify the systems on which you are installing the product.
About this task
The security policies for your site enables global security
which indicates that you require specific authorities to install software,
create databases or tables, or access databases. To successfully install
and operate the product you must do these steps.
Procedure
To prepare security authorizations for an IBM Business
Process Manager database, complete the following steps:
- Prepare a list of user IDs and passwords that have authority
to install software on the systems. You must run the installation
wizards for IBM Business Process Manager user
IDs that have the authority to create files and folders.
- Prepare a list of user IDs, passwords, and roles that are
needed for daily operations of the system:
- Administrative console user IDs and roles to limit capabilities.
You can have user IDs for configuring, administering, or monitoring
roles.
- User IDs for each system bus to authenticate system communications.
- Administrative and monitoring user IDs or groups
for each Business Process Choreographer container for authentication
with Business Flow Manager and Human Task Manager.
- User IDs or groups for synchronous calls to authenticate
with Business Flow Manager and Human Task Manager.
- Prepare a list of user IDs and passwords that the system
uses to access the database tables that it uses during operation.
- Optional: Prepare a list of user IDs and passwords
that the system uses to create databases or database tables during
installation. Your site policies might restrict this authority to
the database administrator. In this case, you must provide generated
scripts to the administrator to create the databases or database tables.
Results
You can install and operate your servers in a secure environment.