IBM BPM, V8.0.1, All platforms > Install IBM BPM > Plan for IBM BPM > Assess your requirements
Preparing necessary security authorizations
Depending on your security policy, you might need a user ID and password to complete tasks such as creating files and folders and accessing the database. Prepare secure user IDs to prevent problems when the servers attempt to access protected data.
- Complete the design of your database.
- Determine the authentication system to use, for example, Lightweight Directory Access Protocol (LDAP).
- Determine what controls are in place that affect the authorizations required for your IBM BPM installation.
- Identify the systems on which you are installing the product.
The security policies for your site enables global security which indicates that you require specific authorities to install software, create databases or tables, or access databases. To successfully install and operate the product you must do these steps.
Procedure
To prepare security authorizations for an IBM BPM database:
- Prepare a list of user IDs and passwords that have authority to install software on the systems. Run the installation wizards for IBM BPM user IDs that have the authority to create files and folders.
- Prepare a list of user IDs, passwords, and roles that are needed for daily operations of the system:
- Administrative console user IDs and roles to limit capabilities.
You can have user IDs for configuring, administering, or monitoring roles.
- User IDs for each system bus to authenticate system communications.
- Administrative and monitoring user IDs or groups for each Business Process Choreographer container for authentication with Business Flow Manager and Human Task Manager.
- User IDs or groups for synchronous calls to authenticate with Business Flow Manager and Human Task Manager.
- Prepare a list of user IDs and passwords that the system uses to access the database tables that it uses during operation.
- Optional: Prepare a list of user IDs and passwords that the system uses to create databases or database tables during installation. Your site policies might restrict this authority to the database administrator. In this case, you must provide generated scripts to the administrator to create the databases or database tables.
Results
You can install and operate your servers in a secure environment.
Related concepts:
Process and process application considerations
Resource considerations
Development and deployment version levels
Naming considerations for profiles, nodes, servers, hosts, and cells
Related reference:
Installation directories for the product and profiles