Build your own cloud sandbox, Part 2, Configuring security options

ESX Server Edition

From the developerWorks archives

José De Jesús, Michael Nassar, and Apurv Johar

Date archived: January 3, 2017 | Last updated: December 2013|First published: November 13, 2013

This article continues our discussion from Part 1 on how to build and configure your own cloud sandbox using a Workload Deployer virtual appliance. If you successfully completed the steps outlined in Part 1, which cover a complete installation up to the point of logging in, you are now ready to configure the appliance. This article shows you how to configure your security options. As illustrated in Part 1, the terms Virtual Pattern Kit for Developers, IWD, and Workload Deployer are used interchangeably throughout this series. This series complements the Navigating the IBM Cloud article series.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=WebSphere, Cloud computing
ArticleID=952849
ArticleTitle=Build your own cloud sandbox, Part 2: Configuring security options
publish-date=12132013