(Dist) Secure the environment before installation
The following instructions explain how to perform a product installation with proper authority.
Complete the following steps when we plan to use the local operating system as your user registry:
Tasks
- (Windows) Secure the environment.
- The Windows Administrative Tools selection can be found under the Windows Control Panel, depending on which version of Windows we have installed. Under Administrative Tools, select Local Security Policy (for domain configuration, select Domain Security Policies, instead).
- From the Local Security Settings panel, click Local Policies > User Rights Assignment and from the Local Security Settings panel, add Login as a service rights to the login ID. The logon user must be a member of the administrator group with the rights of Log on as a service.
- (UNIX) Secure the environment.
- Log on as root and verify that the umask value is 022.
- To verify that the umask value is 022, run the umask command.
- To set up the umask value as 022, run the umask 022 command.
- Optional: (Linux) (Solaris) Make sure that the /etc directory contains a shadow password file. The shadow password file is named shadow and is in the /etc directory. If the shadow password file does not exist, an error occurs after enabling administrative security and configuring the user registry as local operating system.
- To create the shadow file, run the pwconv command (without any parameters). This command creates an /etc/shadow file from the /etc/passwd file. After creating the shadow file, we can configure local operating system security.
These steps help secure the environment when using the local operating system as your user registry