Initial configuration
Several initial configuration tasks are required for your IBM Security Verify Access environment. After completing the Getting started tasks, including activating the product, continue with these steps:
- Manage application interfaces.
- Configure the environment based on your needs:
- Stand-alone web reverse proxy
- Member of a cluster of appliances
- Primary master in a cluster:
- Manage cluster configuration
- Configure the runtime environment.
- Configure web reverse proxy instances.
- Member of a cluster:
- Front-end load balancer:
- Set up communication between appliances
- If we have one appliance with Advanced Access Control activated and one without it: Add runtime listening interfaces.
- Configure the Administrative User Registry:
- To enforce password policies for the administrative users, see Configure management authentication.
Proceed with additional configuration tasks as the environment requires. Do not connect the ISAM appliance to public telecommunications network interfaces. Further certification might be required by law before you make any such connections. Do not use the appliance in Public Services Networks. Contact IBM at IBM Customer Support for more information.
Parent topic: Appliance administration