IBM BPM, V8.0.1, All platforms > Install IBM BPM > IBM BPM Standard > Install IBM BPM Standard > On Windows > Network deployment environment
Modify an existing installation
After install the runtime environment on your system in IBM BPM, you might want to customize your configuration.
For example, you might want to customize settings, set up an additional security provider, set up user accounts, and change and encrypt passwords.
- Customize the Process Server settings used to connect to Process Center
After install IBM BPM, you can change the Process Server from an offline server to a Process Center connected server, and vice versa.- Customize the Process Server or Process Center cluster to work with a web server
After install IBM BPM, you must customize your environment so that it can function properly as a cluster with a web server.- Configure Oracle Real Application Cluster (RAC) for use with IBM BPM
Oracle Real Application Clusters (RAC) is an option of an Oracle database that brings together two or more computers to form a clustered database that behaves as a single system. In a RAC database, Oracle processes that are running in separate nodes access the same data from a shared disk storage.- Changing passwords after installation
To change the passwords that you specified when installed IBM BPM, use the Process Administrative console to change the password and the WebSphere Application Server administrative console to change the password in the corresponding authentication alias.- Modify the database password after configuration
You can reconfigure the database password, as needed, once your database configuration is completed.
- Encrypt passwords
When you install IBM Business Process Manager product components, passwords in the installed files are generally encrypted by default. If you need to change these passwords, you can use the IBM BPM EncryptPassword utility to encrypt the new passwords.
- Set up user accounts for stand-alone configurations
You can use an internal security provider in IBM BPM to create and maintain users and groups. Additionally, you can combine the internal security provider with an external security provider such as Lightweight Directory Access Protocol (LDAP).
Configure a stand-alone environment on Linux
Configure an ND environment on Linux
Configure a stand-alone environment on AIX
Configure an ND environment on AIX
Configure a stand-alone environment on Solaris
Configure an ND environment on Solaris