Complete the following tasks
to implement security before,
during, and after installing WebSphere® Application Server.
Procedure
Install WebSphere Application Server. This
step describes how to install WebSphere Application Server
on the z/OS® platform. For more information, see "Installing
the product and additional software" in the InfoCenter.
Migrate security configurations from previous releases
during installation, when you are prompted to do so. This
step describes how to migrate security configurations from a previous
release of WebSphere Application Server to WebSphere Application ServerVersion 8.0.
For
more information, see "Migrating product configurations" in the InfoCenter.
If you go into the
advanced profile creation, a panel is
available for changing the default settings for your certificate,
a root certificate (used to sign your personal certificate)
and a personal certificate (used to sign/encrypt data over
the network). Ensure that the root certificate has a long lifetime
and the personal certificate a shorter one. Import your own personal
certificate and or root certificate. If your personal certificate
is signed by the certificate authority (CA), it is not important to
change your root certificate. You should also change the default keystore
password to something more secure.
Optional: During customization
of a stand-alone application server or WebSphere Application Server, Network Deployment cell, you
can enable administrative security "out of the box" by using either
a z/OS security product or WebSphere Application Server to manage users,
groups, and the security policy.
Secure your environment after installation. This
step provides information on how to protect password information after
you install WebSphere Application Server.
For more
information, see Securing your environment after installation.
For information about enabling security
after customization is complete, see Enabling security.
Use IBM Suggests to retrieve related content from ibm.com and beyond, identified for your convenience.
This feature requires Internet access.
Most of the following links will take you to information that is not part of the formal product documentation and is provided "as is." Some of these links go to non-IBM Web sites and are provided for your convenience only and do not in any manner serve as an endorsement by IBM of those Web sites, the material thereon, or the owner thereof.