Secure the environment before installation
The following instructions explain how to perform a product installation with proper authority.
Complete the following steps when you plan to use the local operating system as the user registry:
- (Windows) Secure the environment.
- Click Start > Programs > Administrative Tools > Local Security Policy (for domain configuration, select Domain Security Policies, instead).
- From the Local Security Settings Panel, click Local Policies > User Rights Assignment and add Login as a service rights to the login ID. The logon user must be a member of the administrator group with the rights of Log on as a service.
- [AIX] [HP-UX] [Linux] [Solaris]
Secure the environment.
- Log on as root and verify that the umask value is 022.
- To verify that the umask value is 022, run the umask command.
- To set up the umask value as 022, run the umask 022 command.
- (Linux) [Solaris]
Make sure that the /etc directory contains a shadow password file. The shadow password file is named shadow and is in the /etc directory. If the shadow password file does not exist, an error occurs after enabling administrative security and configuring the user registry as local operating system.
- To create the shadow file, run the pwconv command (without any parameters). This command creates an /etc/shadow file from the /etc/passwd file. After creating the shadow file, we can configure local operating system security.
ResultsThese steps help secure the environment when you use the local operating system as the user registry