Installing the capabilities in the OpenShift console
If you want to select the capabilities to install and use only the default values, then it is easier to do that in the Form View in the IBM operator catalog.
Before you begin
- Log in to your OCP or ROKS cluster as a cluster administrator.
To allow a non-administrator user to install the Cloud Pak capabilities, see the What to do next section in Installing the IBM catalogs.
- If you used the
All namespacesoption to install the Cloud Pak operator, switch to the project that you created for your CP4BA deployment. - In the Installed Operators view, verify the status of the IBM Cloud Pak for Business Automation operator installation reads succeeded, and verify all of the pods are running.
- On Red Hat OpenShift Kubernetes Service (ROKS) only, apply the no root squash
command for
Db2.
oc get no -l node-role.kubernetes.io/worker --no-headers -o name | xargs -I {} \ -- oc debug {} \ -- chroot /host sh -c 'grep "^Domain = slnfsv4.coms" /etc/idmapd.conf || ( sed -i "s/.*Domain =.*/Domain = slnfsv4.com/g" /etc/idmapd.conf; nfsidmap -c; rpc.idmapd )'
Procedure
What to do next
When the status shows "Ready", check to make sure that the icp4ba
cartridge in the IBM Automation Foundation Core is also ready. For more information about IBM
Automation Foundation, see What is IBM Automation foundation?
smallIBM Automation foundation deployment is used. For more information about the sizing for foundational services, see Deployment profiles.
To view the status of the icp4ba cartridge in the OpenShift Admin console,
click . Click the Cartridge tab, click icp4ba,
and then scroll to the Conditions section.

How to access the capability services
A ConfigMap is created
in the namespace to provide the cluster-specific details to access the services and applications.
Components that are successfully deployed have URLs in the ConfigMap. If any components failed, the
URLs and credentials are not included. The ConfigMap name is prefixed with the deployment name
(default is icp4adeploy). You can find the ConfigMap containing the routes
information by clicking
and
then searching for the string "cp4ba-access-info".

The contents of the ConfigMap depends on the components that are included. Each component has one or more URLs, and if needed a username and password.
<component1> URL: <RouteUrlToAccessComponent1>
<component1> Credentials: <UserName>/<Password> (optional)
<component2> URL: <RouteUrlToAccessComponent2>
<component2> Credentials: <UserName>/<Password> (optional) You can also
click the YAML tab in the CP4BA deployment (icp4adeploy) to
view the endpoints uri of the installed capabilities.
After you have the routes and admin user information, check to see whether you need to do the following tasks.
true or false values in the Form
View, but the other parameters need to be done in the YAML View. You
can access the custom resource from the YAML tab, or by clicking . 
Log in to the IBM Cloud Pak Platform UI (Zen UI)
Business Automation Studio leverages the Zen UI to provide a role-based user interface for all Cloud Pak capabilities. Capabilities are dynamically available in the UI based on the role of the user that logs in. You can find the URL for the Zen UI by clicking and looking for the name cpd, or by running the following command.
oc get route |grep "^cpd"You have three authentication types
in the login page: Enterprise LDAP, OpenShift
authentication, and IBM provided credentials (admin only). Click
Enterprise LDAP and enter the cp4admin user and the password
in the cp4ba-access-info ConfigMap. The cp4admin user has access
to Business Automation Studio features. You can get the details for the IBM provided
admin user by getting the contents of the
platform-auth-idp-credentials
secret.
oc -n ibm-common-services get secret platform-auth-idp-credentials -o jsonpath='{.data.admin_password}' | base64 -dYou must use the IBM provided credentials (admin only) option to log in with the internal "admin" user.
If you want to add more users, you need to log in with the Zen UI administrator. The kubeadmin user in the OpenShift authentication and the IBM provided admin user have the Zen UI administrator role. When logged in, you can add users to the Automation Developer role to enable users and user groups to access Business Automation Studio and work with business applications and business automations. For more information about adding users, see Completing post-deployment tasks for Business Automation Studio. For more information about the Automation Developer role, see Roles and permissions.
If you included FileNet Content Manager (FNCM) without the other capabilities, then use the Navigator for FNCM heading in the cp4ba-access-info ConfigMap and the custom resource status fields to find the route URL for Business Automation Navigator.
Using the LDAP user registry
The LDAP server comes with a set of predefined users and groups to use with your starter environment. Changes to the user repository are not persisted after a pod restart.
- To provide a user for Task Manager, the following LDAP users and groups are created by the deployment.
- In the OCP console, select the project in which you deployed the Cloud Pak, and then click .
- User names:
cp4admin,user1,user2, up to and includinguser10. - Group names:
TaskAdmins,TaskUsers, andTaskAuditors.
The
cp4adminuser is assigned to "TaskAdmins". The LDAP usersuser1-user5are assigned to "TaskUsers", and the usersuser6-user10are assigned to "TaskAuditors". - To modify an existing user's password:Note: Do not change the password of the cp4admin user after the Content Platform Engine (CPE) is initialized. Changing the password of the Domain admin user needs extra steps. For more information, see Update System User credentials.
- In the OpenShift console, go to
, and
select the
icp4adeploy-openldap-customldifsecret. - Click .
- Change the password for a specified user and click Save.
- Go to , search for the "openldap" pod.
- In the overflow menu for the pod, click Delete Pod to restart it.
- In the OpenShift console, go to
, and
select the
- To add a user:
- In the OpenShift console, go to
, and
select the
icp4adeploy-openldap-customldifsecret. - Click .
- Copy and paste the attributes from an existing user, take out the unnecessary attributes, put
the information for the new user, and click Save. The following example is
for the user, "
newuser":dn: uid=newuser,dc=example,dc=org uid: newuser cn: newuser sn: newuser userPassword: <password> objectClass: top objectClass: posixAccount objectClass: organizationalPerson objectClass: inetOrgPerson objectClass: person uidNumber: 14583345 gidNumber: 1456456 homeDirectory: /home/newuser/ mail: newuser@example.orgThe
uidNumbermust be a unique and different number from the existing uidNumbers. - Go to , search for the "openldap" pod.
- In the overflow menu for the pod, click Delete Pod to restart it.
- Sign in to the Common Web UI by following the steps in Accessing your cluster by using the console.
- Follow the steps in Managing console access to add the user to the Cloud Pak Platform UI (Zen).
- In the OpenShift console, go to
, and
select the
- To add a group:
- In the Red Hat OpenShift console, go to
, and
select the
icp4adeploy-openldap-customldifsecret. - Click .
- Copy and paste the attributes from an existing group, take out the unnecessary attributes, put
the information for the new group, and click Save.
The following example is for a group name of "
NewGroup".dn: cn=NewGroup,dc=example,dc=org objectClass: groupOfNames objectClass: top cn: NewGroup member: uid=user1,dc=example,dc=org member: uid=user2,dc=example,dc=org member: uid=user3,dc=example,dc=org member: uid=user4,dc=example,dc=org - Go to , and search for the openldap pod.
- In the overflow menu for the pod, click Delete Pod to restart it.
- Sign in to the Common Web UI by following the steps in Accessing your cluster by using the console.
- Follow the steps in Managing user groups to add the group to the Cloud Pak Platform UI (Zen).
- In the Red Hat OpenShift console, go to
, and
select the
Enabling GraphQL integrated development environments for FileNet® Content Manager
The GraphiQL integrated development environment is not enabled by default because of a security risk. If you want to include this capability in your starter environment, you can add the parameter to enable the IDE.
- Click , then click YAML to go into the YAML view.
- Add the following parameter to the
file:
graphql: graphql_production_setting: enable_graph_iql: true - Apply the updated custom resource YAML file.
In the next reconciliation loop, the operator picks up the change, and includes GraphiQL with your deployment.
Importing sample data for Business Automation Insights
If you selected Business Automation Insights as an optional component, then you can test and explore the component by importing sample data. For more information, see https://github.com/icp4a/bai-data-samples.
Enabling Business Automation Insights for FileNet Content Manager
If you selected Business Automation Insights as an optional component and included the Content Event Emitter in your deployment, you must update the deployment to add the Kafka certificate to the trusted certificate list.
- Create a secret with your Kafka certificate, for
example:
oc create secret generic eventstreamsecret --from-file=tls.crt=eventstream.crt - Find the generated YAML file in the directory where you ran the deployment script. For example, generated-cr/ibm_cp4a_cr_final.yaml.
- Update the
trusted_certificate_listparameter to include the secret that you created.shared_configuration: trusted_certificate_list: ['eventstreamsecret']If other certificates are in the list, use a comma to separate your new entry.
- Apply the updated custom resource YAML file.
Sample data for Automation Document Processing
If you installed the Document Processing pattern, sample data is loaded so you can use the Document Processing components.

