Operating Systems: AIX, HP-UX, Linux, Solaris, Windows
Requirements for using Remote Execution and Access
WebSphere Virtual Enterprise provides new management features, such as starting and stopping node agent and middleware processes, and initiating installations of product packages and maintenance for distributed platforms from the administrative console. To provide this new functionality, WebSphere XD utilizes Remote Execution and Access to access your remote workstations. In order for this facility to work, follow certain target-specific requirements.
Windows targets
Simple File SharingWindows XP system targets must have Simple File Sharing disabled for Remote Execution and Access to work. Simple Networking requires that you log in as guest. A guest login does not have the authorizations necessary for Remote Execution and Access to function correctly.
To disable Simple File Sharing, open Windows Explorer and click Tools > Folder Options > View > Use Simple File Sharing. Clear the check box that is located next to Use Simple File Sharing. Click Apply and OK. Firewalls
Windows XP systems include a built-in firewall that is called the Internet Connection Firewall (ICF), which is disabled by default. For Windows XP Service Pack 2 systems, the Windows firewall is enabled by default. If either firewall is enabled on a Windows target workstation, Remote Execution and Access cannot access the target workstation.
To disable the Windows firewall, click Start > Settings. Next, select your network connection, and click Change Windows Firewall Setting, which is located on the Network Task navigator. Select File and Printing Sharing from the Exceptions tab of the Windows firewall configuration and click OK. Administrative sharing
You must enable the remote registry administration, which is the default configuration, on the target workstation for Remote Execution and Access to run commands and scripts. To verify that the remote registry is enabled and started, click Start > Programs > Administrative Tools > Services. From Remote Registry, ensure the status of the service is started.
You must enable administrative sharing to successfully use Remote Execution and Access to connect to your Windows systems targets. Examples of the default administrative disk share are C$ and D$. If you disable sharing, Remote Execution and Access considers directories that are located within the drives as hidden. In this case, the following message is displayed:
XCIM0009E: Error connecting to remote target <host_name>. Exception: java.io.FileNotFoundException: CTGRI0003E The remote path name specified cannot be found: <file_or_directory_path>. Cause: com.starla.smb.SMBException: The network name is incorrect.
To enable administrative sharing, click Start > My Computer. Right click the disk drive that you are enabling for administrative sharing. Next, click Share and Security > Share this folder, specify the name of share, such as C$ or D$, and click OK. Windows Vista target workstationsTo connect to Windows Vista target workstations, use one of the following options. Before you begin, ensure that the Remote Registry in Windows Services is started, and port 445 is opened in the firewall.
Note: To save any configuration changes that you make, restart the workstation.
- Configure both the deployment manager and the Vista target workstation as members of a Windows domain. Use a user account in that domain, or in a trusted domain, when you connect to the target.
- Enable and use the built-in administrator account to connect to the target workstation.
Click Control Panel > Administrative Tools > Local Security Policy > Security Settings > Local Policies > Security Options. Next, double-click Accounts: Administrator account status, select Enable, and click OK.
- Disable the User Account Control that is enabled by default if you are using a different user account to connect to the target workstation.
Click Control Panel > Administrative Tools > Local Security Policy > Security Settings > Local Policies > Security Options. Next, double-click User Account Control: Run all administrators in Admin Approval Mode, select Disable, and click OK.
Linux and UNIX targets
Use Secure Shell (SSH) protocolRemote Execution and Access does not supply Secure Shell (SSH) code for UNIX workstations. Install and enable SSH on any target workstation to access. OpenSSH 3.7.1 or higher contains security enhancements that are not available in earlier releases.
Remote Execution and Access cannot establish connections with any UNIX target workstation that has all remote access protocols disabled. In all UNIX environments except Solaris, use the Bourne shell (sh) as the target shell. For Solaris target workstations, use the Korn shell (ksh) instead. For Remote Execution and Access to access Linux and other SSH targets by using password authentication, edit the /etc/ssh/sshd_config file on the target workstations. Set the password authentication to yes. Next, stop and restart the SSH daemon by using the following commands:
Note: The centralized installation manager uses SSH protocol to access UNIX and Linux target workstations.
- /etc/init.d/sshd stop
- /etc/init.d/sshd start
Related tasks
Installing the Secure Shell public key to access your remote workstations
Installing packages
Uninstall packages Use the centralized installation manager to manage your environment
Related reference
Centralized installation manager administrative tasks