Securing your environment before installation


Before you begin

The following instructions explain how to perform a product installation with proper authority on UNIX platforms, Linux platforms, Solaris operating environments, and Windows platforms.

UNIX platforms

On UNIX platforms, log on as root and verify that the umask value is 022.

To verify that the umask value is 022, execute the umask command.

To set up the umask value as 022, execute the umask 022 command.

Linux platforms and Solaris operating environments

On Linux platforms or Solaris operating environments, make sure that the /etc directory contains a shadow password file. The shadow password file is named shadow and is in the /etc directory. If the shadow password file does not exist, an error occurs after enabling global security and configuring the user registry as local operating system.

To create the shadow file, run the pwconv command (with no parameters). This command creates an /etc/shadow file from the /etc/passwd file. After creating the shadow file, one can configure local operating system security.

Windows platforms

On Windows platforms, the logon user must be a member of the administrator group with the rights of Act as part of the operating system and Log on as a service.

To add the rights to a user on a Windows 2000 platform:



  1. Click Start > Programs > Administrative Tools > Local Security Policy (for domain configuration, select Domain Security Policies, instead).

  2. From the Local Security Settings Panel, click Local Policies > User Rights Assignment and add the following rights to the user ID:

    • Act as part of the operating system

    • Log on as a service