3 Installation Overview

This chapter provides an overview of the entire Business Transaction Management installation procedure.

Installation Overview

  1. Installation and initial configuration of the central servers:

    1. Ensure that all prerequisites and setup listed in Chapter 4, "Prerequisite Requirements and Preliminary Setup" are satisfied. (Some particularly important prerequisites and setup tasks are called out below.)

    2. Configure security settings (the assertion secret and encryption key) on each application server that will host Business Transaction Management central servers.

      See Configuring Secure Communications Between Business Transaction Management Components.

    3. Configure other application server settings.

      See Setting up your WebLogic Environment or Setting up your WebSphere Environment, depending on your application server.

    4. Set up the Business Transaction Management databases.

      See Setting up Business Transaction Management Databases.

    5. Optional – Configure the persistent storage directories.

      See Configuring Persistent Storage Directories.

    6. Deploy the central servers.

      See Deploying the Central Servers.

    7. If needed, remap Business Transaction Management user roles in your application server.

      See Mapping Users to Business Transaction Management Application Roles.

    8. Perform initial configuration of Business Transaction Management.

      After deploying the central servers, you configure them using the browser-based configuration wizard. (See Initial Configuration of Business Transaction Management.)

      Alternatively, you can also use a command line script (see Chapter 15, "Scripted Configuration of Oracle Business Transaction Management."). For first-time configuration, however, we recommend that you use the browser-based wizard. The wizard produces an XML output file that can be used with the command line script for subsequent configurations.

  2. Installation of monitors and configuration of the Observer Communication policy (See Chapter 7, "Installing Monitors."):

    1. Configure security settings (the assertion secret and encryption key) on each application server that will host monitors.

      See Configuring Secure Communications Between Business Transaction Management Components.

    2. Deploy monitors.

    3. Configure monitor-observer communication by way of the Observer Communication policy.

  3. Installation of observers (See Chapter 8, "Installing Observers Overview"):

    1. Configure security settings (the assertion secret and encryption key) on each execution platform that will host an observer.

      See step 1 of General Steps for Installing Observers.

    2. Install the observer libraries.

    3. Configure the observers to locate a monitor.