System types in a deployment
A typical deployment ISAM involves the installation of a number of systems. All deployments include several types ISAM systems that are set up in a secure domain, including:
- Base systems
- Web Security systems
Each system type has software prerequisites that include Security Verify Access components. We must successfully configure both the prerequisites and Security Verify Access components to avoid operational problems in the environment. For example, the ISAM policy server requires installation of the following components:
- IBM Global Security Kit (GSKit)
- IBM Security Directory Server client (depending on the registry used)
- IBM Security Utilities
- Security Verify Access License
- Security Verify Access Runtime
- Security Verify Access Policy Server
Parent topic: Verify the deployment