IBM BPM, V8.0.1, All platforms > Install IBM BPM > Plan for IBM BPM > Assess your requirements

Preparing necessary security authorizations

Depending on your security policy, you might need a user ID and password to complete tasks such as creating files and folders and accessing the database. Prepare secure user IDs to prevent problems when the servers attempt to access protected data.

The security policies for your site enables global security which indicates that you require specific authorities to install software, create databases or tables, or access databases. To successfully install and operate the product you must do these steps.


Procedure

To prepare security authorizations for an IBM BPM database:


Results

You can install and operate your servers in a secure environment.

Assess your requirements


Related concepts:
Process and process application considerations
Resource considerations
Development and deployment version levels
Naming considerations for profiles, nodes, servers, hosts, and cells


Related reference:
Installation directories for the product and profiles