![]() ![]() ![]() ![]() ![]() ![]() ![]() |
This section discusses the steps you need to take after installing the Administration Server.
The installer program offers you the option of installing the policy database schema as part of the installation procedure. There are two situations in which you should not install the database schema again:
If you have not installed the policy database schema, you must do so now; otherwise, you will not be able to the start the Administration Server processes.
Note: | In this release, the database-specific schema installation files (install_schema_oracle , install_schema_mssql , install_schema_pointbase , and install_schema_sybase ) internally call the install_ales_schema file. You can specify a database-specific schema installation file, or specify install_ales_schema .bat directly. There is no operational difference. |
For instructions for installing the database schema, see the following topics:
To install the policy database schema in a Microsoft Windows environment, perform the following steps:
cd \bea\ales25-admin\bin
install_ales_schema.bat
<db-user-name> <db-password>
db-user-name
—The username to use to access the database; the username for the database administrator. Owner of the policy database (optional, defaults to the user login, usually the same as the username
). The policy owner is a database username or user ID that controls the database schema in the database instance.
For more information on the database schema installation, examine the install_ales_schema.log
in the log directory.
To install the policy database schema in a Sun Solaris platform, perform the following steps:
cd /bea/ales25-admin/bin
install_ales_schema.sh
Important
: Make sure all scripts in this directory have execute permission.
install_ales_schema.sh
<db-user-name> <db-password>
db-user-name
—The username to use to access the database; the username for the database administrator. Owner of the policy database (optional, defaults to the user login, usually the same as the username
). The policy owner is a database username or user ID that controls the set of database schema in the database instance.
For more information on the database schema installation, examine the install_ales_schema.log
in the log directory.
To install the policy database schema in a Linux platform:
cd /bea/ales25-admin/bin
install_ales_schema.sh
Important
: Make sure all scripts in this directory have execute permission.
install_ales_schema.sh
<db-user-name> <db-password>
db-user-name
—The username to use to access the database; the username for the database administrator. Owner of the policy database (optional, defaults to the user login, usually the same as the username
). The policy owner is a database username or user ID that controls the set of database schema in the database instance.
For more information on the database schema installation, examine the install_ales_schema.log
in the log directory.
After you have installed the Administration Server, you must start the necessary processes by running the appropriate batch or shell scripts. On UNIX, run WLESadmin.sh start
or WLESadmin.sh console
. On Windows, you can start the WLESadmin start
or WLESadmin console
processes as services from the Programs menu or as commands from a console window.
For more detailed instructions on how to start and stop the required processes, see Starting and Stopping Processes in the Administration and Deployment Guide.
At this time, you can log into the Administration Console and check that all the components are working correctly. For descriptions of the processes that are running, see Starting and Stopping Processes in the Administration and Deployment Guide.
To log into the Administration Console:
To ensure that your transactions are securely encrypted, the Administration Console uses two-way Secure Socket Layers (SSL) to communicate with your Administration Server.
https://hostname:port/asi
hostname
is the Domain Name Server (DNS) name or IP address of the Administration Server.
port
is the port number through which the Administration Server is connected.
asi
is the name of the Enterprise Domain (that you assigned during the installation procedure).
system
(username) and weblogic
(password). This is the default administrator configured on install and should only be used for the initial login.Note: | The Administration Console allows administrators to edit configurations or perform other operations based on security roles granted by the administration policy. If your security roles do not permit editing of configuration data, the data is displayed in the Administration Console but is not editable. If you try to perform an operation that is not permitted, the Administration Console displays an Access Denied . |
Now that you have successfully installed the Administration Server, you are ready to install your Security Service Modules and configure and deploy your security configurations and policies.
For instructions on installing Security Service Modules (SSMs), see Installing Security Service Modules.
Note: | In a production environment, BEA recommends that you install your Security Service Modules on machines other than the machine on which the Administration Server is installed. |
For instructions on how to write and deploy policies to SSMs to protect resources, see the Policy Managers Guide. This document describes how to define resources, identities, and roles, and how to writer authorization policies and role mapping policies. It also describes how to create policy data files that you can use to import policy data into the Administration Server and how import and export policy data.
![]() ![]() ![]() |