Preparing for security at installation time
Complete the following tasks to implement security before, during, and after installing WAS.
- Secure the environment before installation.
This step describes how to perform WAS installation with proper authority on different platforms.
See refer to Secure the environment before installation.
- Prepare the operating system for installation of WAS. This step describes how to prepare the different operating systems for installation of WAS.
See "Preparing the operating system for product installation" in the InfoCenter.
- Migrate security configurations from previous releases during installation, when we are prompted to do so. This step describes how to migrate security configurations from a previous release of WAS to WAS V7.0.
See "Migrating product configurations" in the InfoCenter.
- We can create a profile during install time. If we elect to do so, administrative security is enabled for that profile "out of the box" by default. A panel is displayed during profile creation time and enabling admin security is selected by default. If we elect to keep this as the default, supply an administrative user ID and password. This user ID is created in a federated repository, which is the default user registry when enabling administrative security at profile creation time.
- If we go into the advanced profile creation, a panel is available for changing the default settings for the certificate, a root certificate (used to sign the personal certificate) and a personal certificate (used to sign/encrypt data over the network). Verify the root certificate has a long lifetime and the personal certificate a shorter one. Import the own personal certificate and or root certificate. If the personal certificate is signed by the CA, it is not important to change your root certificate. You should also change the default keystore password to something more secure.
- Secure the environment after installation. This step provides information on how to protect password information after you install WAS.
See Secure the environment after installation.
Secure the environment before installation
Secure the environment after installation