Installing the Administration Server

     Previous  Next    Open TOC in new window  Open Index in new window  View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Installing

The following sections describe how to install the ALES Administration Server on either Windows or UNIX platforms:

 


Before You Begin

Before you begin this installation procedure, make sure to do the following:

The following topics provide additional information to assist you in preparing for an installation:

Selecting Directories for the Installation

During installation, you need to specify locations for the following directories:

BEA Home Directory

During installation, you are prompted to choose an existing BEA Home (BEA_HOME) directory. If you are using WebLogic Server as your servlet container, you should specify the same BEA Home directory that you specified when you installed WebLogic Server. If you are using Apache Tomcat as you servlet container, then the BEA Home directory is a repository for common files that are used by multiple BEA products installed on the same machine. For this reason, the BEA Home directory can be considered a central support directory for the BEA products installed on your system. The files in the BEA Home directory are essential to ensuring that BEA software operates correctly on your system. They perform the following types of functions:

The files and directories in the BEA Home (BEA_HOME) directory are described in your WebLogic documentation. Although it is possible to create more than one BEA Home directory, BEA recommends that you avoid doing so. In almost all situations, a single BEA Home directory is sufficient. There may be circumstances, however, in which you prefer to maintain separate development and production environments on a single machine, each containing a separate product stack. With two directories, you can update your development environment (in a BEA Home directory) without modifying the production environment until you are ready to do so.

Product Installation Directory

The product installation directory contains all the software components used to administer BEA AquaLogic Enterprise Security. During installation, you are prompted to choose a product installation directory. If you accept the default, the software is installed in the following directory:

where c:\bea or /opt/bea is the BEA_HOME directory and ales22-admin is the product installation directory. You can specify any name and location on your system for your product installation directory and there is no requirement that you name the directory ales22-admin or create it under the BEA Home directory.

System Security and BEA AquaLogic Enterprise Security

Like any component running on a system, the infrastructure it provides is only as secure as the operating environment where it is installed. When BEA AquaLogic Enterprise Security is installed on a system, it makes use of that system's security infrastructure to lock itself down and integrate with the security of its environment. Through the use of user, group, and file system permissions, BEA AquaLogic Enterprise Security allows limited access to many operations depending upon these permissions.

Which Users Can Install the Administration Server and SSMs?

As of version 2.2 of ALES, the user who installs the Administration Server and SSMs does not require administrator privileges on a Windows platform, or root access on a Sun Solaris or Linux platform. The installation procedures set the file and directory permissions based on the user who runs the installer.

This means that if the user who installs the Administration Server is not the same user who installed the servlet container (WebLogic Server or Apache Tomcat), you can potentially introduce file permission problems. For example, consider that on a Windows platform the WebLogic Server requires access to the BEA_HOME\ales22-admin\set-wls-env.bat file. In this case, you will need to update the file permissions manually or make sure that both users belong to the same user groups.

Note: Unlike prior versions of AquaLogic Enterprise Security, as of version 2.2 the Administration Server installation does not create or require special users or groups, such as the default values of asiadmin, asiadgrp, scmuser, or asiusers.

Secure Usernames and Passwords

AquaLogic Enterprise Security implements a sophisticated username and password schema to protect the application itself and to ensure secure communications. Understanding this schema is important to installing the product and ensuring that it operates properly in either a development or production environment.

There are two levels of password protection:

Understanding your enterprise and how responsibilities in your organization are separated is essential to establishing a secure environment. For example, the person who maintains the database is usually not the person who designs and implements security. The person who deploys applications is usually not the person who administers system usernames and passwords. And, while you may not be as concerned with a more formal authorization scheme in your development environment, your production environment needs to be firmly secured and responsibilities clearly defined.

Usernames and passwords are required to access the components listed and described in Table 4-1.

Table 4-1 Usernames and Passwords 
Component
Description
Default
Database Server
A database server account used to connect to the database server where the policy data is stored, and update policy data using the policy import and export tools.
none
Certificate Authority
Sets the password for the private key for the Certificate Authority. All trust within the enterprise domain originates from this authority.
Randomly generated
Identity Key Passwords (Keystore Passwords)
You also need to supply private key passwords for each of the following identities:
  • Service Control Manager
  • Security Service Module
  • Administration Application
Private key passwords validate process authenticity by using the Certificate Authority chain of trust. Identities with invalid or untrusted keys cannot participate in the trust relationships in the enterprise domain.
Randomly generated
Configure Keystores
You need to supply keystore passwords for each of the Identity, Peer and Trust keystores.
Identity Keystore - stores and protects the private keys that represent the processes identity or identities.
Peer Keystore - stores and protects the public keys for all trusted identities within the installed component (Administration Application, Security Service Module or Service Control Manager).
Trust Keystore - stores and protects public keys for Certificate Authorities that originate the chain of trust.
Randomly generated

BEA recommends following these guidelines:

Note: BEA does not recommend the use of randomly generated passwords, as the generation mechanism for these passwords is not secure. In a production environment, BEA does not recommend installing Security Service Modules on the same machine as the Administration Server.

Generating a Verbose Installation Log

If you start the installation process from the command line or from a script, you can specify the -log option to generate a verbose installation log. The installation log lists messages about events that occur during the installation process, including informational, warning, error, and fatal messages. This can be especially useful for silent installations.

Note: You may see some warning messages in the installation log. However, unless there is a fatal error, the installation program completes the installation successfully. The installation user interface indicates the success or failure of the installation, and the installation log file includes an entry indicating that the installation was successful.

To create a verbose log file during installation, use the following command lines or scripts:

Note: The -log parameter is optional. By default, the installation log is put in the log directory where you install the Administration Server. If for some reason, the installer fails, use this switch to generate an even more verbose output: -log_priority=debug.

The path must be the full path to a file name. If the file does not exist, all folders in the path must exist before you execute the command or the installation program does not create the log file.

 


Starting the Installation Program on Windows Platforms

Note: Do not install the software from a network drive. Download the software to a local drive on your machine and install it from there.

Before running the installer, ensure the following two things are done.

To install the application in a Microsoft Windows environment:

  1. Shut down any programs that are running.
  2. Log in to the machine.
  3. If you are installing from a CD-ROM, go to step 4. If you are installing by downloading from the BEA web site:
    1. Contact BEA Sales at http://www.bea.com/framework.jsp?CNT=sales1.htm&FP=/content/about/contact/ and request a download.
    2. Go to the directory where you downloaded the installation file and double-click ales220admin_win32.exe.
    3. The AquaLogic Enterprise Security - Administration Application window appears as shown in Figure 4-1.

  4. If you are installing from a CD-ROM:
    1. Insert Disk 1 into the CD-ROM drive.
    2. If the installation program does not start automatically, open Windows Explorer and double-click the CD-ROM icon.

    3. From the installation CD, run ales220admin_win32.exe.
    4. The AquaLogic Enterprise Security - Administration Application window appears as shown in Figure 4-1.

  5. Proceed to Running the Installation Program.
  6. Figure 4-1 AquaLogic Enterprise Security Administration Server Installer Window


    AquaLogic Enterprise Security Administration Server Installer Window

 


Starting the Installation Program on a Sun Solaris Platform

To run graphical-mode installation, your console must support a Java-based GUI. If the installation program determines that your system cannot support a Java-based GUI, the installation program automatically starts console-mode installation.

Before running the installer, ensure the following three things are done.

To install the application on a Sun Solaris platform:

  1. Log in to the machine.
  2. Set your DISPLAY variable if needed.
  3. If you are installing from a CD-ROM, go to step 4. If you are installing by downloading from the BEA web site:
    1. Contact BEA Sales at http://www.bea.com/framework.jsp?CNT=sales1.htm&FP=/content/about/contact/ and request a download.
    2. Go to the directory where you downloaded the file and change the protection on the install file:
    3. chmod u+x ales220admin_solaris32.bin
    4. Start the installation: ./ales220admin_solaris32.bin
    5. The AquaLogic Enterprise Security - Administration Application window appears as shown in Figure 4-1.

  4. If you are installing from a CD-ROM:
    1. Insert Disk 2 into the CD-ROM drive.
    2. From the installation CD, execute ales220admin_solaris32.bin .
    3. The AquaLogic Enterprise Security - Administration Application window appears as shown in Figure 4-1.

  5. Proceed to Running the Installation Program.

 


Starting the Installation Program on a Linux Platform

To run graphical-mode installation, your console must support a Java-based GUI. If the installation program determines that your system cannot support a Java-based GUI, the installation program automatically starts console-mode installation.

Before running the installer, ensure the following three things are done.

To install the application on a Linux platform:

  1. Log in to the machine.
  2. Set your DISPLAY variable if needed.
  3. If you are installing from a CD-ROM, go to step 4. If you are installing by downloading from the BEA web site:
    1. Contact BEA Sales at http://www.bea.com/framework.jsp?CNT=sales1.htm&FP=/content/about/contact/ and request a download.
    2. Go to the directory where you downloaded the file and change the protection on the file:
    3. chmod u+x ales220admin_linux32.bin
    4. Start the installation: ./ales220admin_linux32.bin
    5. The AquaLogic Enterprise Security - Administration Application window appears as shown in Figure 4-1.

  4. If you are installing from a CD-ROM:
    1. Insert Disk 2 into the CD-ROM drive.
    2. From the installation CD, execute ales220admin_linux32.bin .
    3. The AquaLogic Enterprise Security - Administration Application window appears as shown in Figure 4-1.

  5. Proceed to Running the Installation Program.

 


Running the Installation Program

The installation program prompts you to enter specific information about your system and configuration, as described in Table 4-2.

Note: You must install the Administration Server before installing any Security Service Modules. BEA does not recommend installing Security Service Modules on the same machine as the Administration Server in a production environment.

To complete this procedure you need the following information:

 


What's Next

Now that you have installed the necessary software, you must start the necessary services. For additional instructions, see Post Installation Tasks. If you want to install a second Administration Server to use as a backup, see Installing a Secondary Administration Server.

 


Upgrading from ALES 2.1

ALES 2.2 includes a utility to help you upgrade from AquaLogic Enterprise Security 2.1. If you have an existing installation of ALES 2.1, follow this upgrade procedure to upgrade the Administration Server. For information about upgrading SSMs, see Upgrading from ALES 2.1 in Installing Security Service Modules. Note that no upgrade is available for Apache and Microsoft IIS Web Server SSM instances.

  1. Make sure you have read and delete permission for the ALES 2.1 files. You must be logged in as a member of the asidgrp group (or whatever group you used when installing ALES 2.1).
  2. Stop the ALES 2.1 processes, including the Administration Server, BLM, ARME, SCM, and SSM instances. For more information, see Starting and Stopping ALES Components in the Administration and Deployment Guide.
  3. If you have installed the ALES 2.1 Administration Server on the same machine on which you have installed one or more ALES 2.1 SSMs, be sure to upgrade the Administration Server before you upgrade any SSMs.
  4. Run the ALES 2.2 Administration Server installer on the machine on which your ALES 2.1 Administration Server is installed. The ALES 2.2 Administration Server installer detects the ALES 2.1 installation and uses its configuration information.
  5. Run the upgrade script, which is located in BEA_HOME/ales22-admin/upgrade.
  6. Run the database schema upgrade script (either upgrade_schema_oracle or upgrade_schema_sybase), which is located in BEA_HOME/ales22-admin/bin.

 


Installing in Silent Mode

You can run the Administration Server installation in silent mode. Silent installation mode allows you to run the installer once on one machine and then use the configuration of that machine to duplicate installation on multiple machines. When you run the installation program in silent mode, the installation program reads the configuration information it needs from an XML file that you specify in the command that launches the installation program.

When you run the installation program not in silent mode, it creates an XML file, located at BEA_HOME/ales22-admin/config/silent_install_admin.xml . You can edit this XML file and use it when you run the installation program in silent mode. You need to edit the silent_install_admin.xml file to set the values described in Table 4-3. Each installation parameter is specified in the XML file as the value of a <data-value> element, as in the following example:

<data-value name="USER_INSTALL_DIR" value="C:\bea\ales22-admin" />

The values you set in the <data-value> elements correspond generally to the responses you enter when you run the installation program not in silent mode, which are described in Table 4-2.

Table 4-3 Silent Installation Configuration File 
Data Element Name
Description
Default or Sample Value
BEAHOME
BEA_HOME directory in which to install the Administration Server
C:\bea
USER_INSTALL_DIR
Directory within BEA_HOME directory in which to install the Administration Server
C:\bea\ales22-admin
SCM_INSTALL_DIR
Directory within BEA_HOME directory in which to install the Service Control Manager
C:\bea\ales22-scm
WEB_SERVER_TYPE
Servlet container that will host the Administration Server. Valid values are weblogic or tomcat.
weblogic
WEB_SERVER_DIR
Directory in which the servlet container is installed
C:\bea\weblogic81
ADMIN_APP_PORT
Port for the Administration Server
7000
ADMIN_APP_SSL_PORT
SSL port for the Administration Server
7010
ENTERPRISE_DOMAIN_
NAME
The name to assign to this domain. Must be all lower case; and may not contain any spaces or punctuation marks.
asi
SECONDARY_SERVER_URL
Optional. Necessary only if you plan on installing the Security Service Modules on the same machine as your Administration Server and plan on configuring the Security Service Modules with a backup Administration Server.
 
CERTIFICATE_DURATION
The number of years the security certificate remains in effect.
10
DATABASE_CLIENT
One of ORACLE10, ORACLE92,ORACLE90,ORACLE81 or SYBASE125
 
SYBASE_DATABASE_
HOSTNAME
For Sybase database only. The Sybase server entry you configured in this local machine, used to connect to Sybase database server running elsewhere.
 
SYBASE_DATABASE_NAME
For Sybase database only. The name of the policy database.
 
ORACLE_SERVICE_NAME
For Oracle database only. Local service name (Oracle System Identifier SID).
 
JDBC_URL
URL on which to reach the database
jdbc:oracle:thin:
@host:port:SID
JDBC_DRIVER
Java classname of the database driver.
oracle.jdbc.driver.
OracleDriver
DATABASE_LOGIN_ID
Username to access the database.
 
DATABASE_LOGIN_PASS
Password to access the database
 
CA_KEY_PASS
Optional. Will be generated by the installer if not specified.
 
IDENTITY_KEY_PASS
Password for identity keystore.
Optional. Will be generated by the installer if not specified.
 
PEER_KEY_PASS
Password for all trusted identities within the installed component (Administration Application, Security Service Module or Service Control Manager).
Optional. Will be generated by the installer if not specified.
 
TRUSTED_CA_KEY_
PASS
Password for public keys for Certificate Authorities that originate the chain of trust.
Optional. Will be generated by the installer if not specified.
 
SCM_KEY_PASS
Key password for Service Control Manager.
Optional. Will be generated by the installer if not specified.
 
SSM_KEY_PASS
Key password for Security Service Module.
Optional. Will be generated by the installer if not specified.
 
ADMIN_KEY_PASS
Key password for Administration Server.
Optional. Will be generated by the installer if not specified.
 
INSTALL_DB_SCHEMA
Specify whether or not to install the policy database schema.
no

To run the Administration Server installation in silent mode, use one of the following commands:

 


Installing a Secondary Administration Server

You may want to install and configure a second Administration Server on a separate machine to support failover. For information about this, see Setting up Administration Servers for Failover in the Administration and Deployment Guide.


  Back to Top       Previous  Next