You can install IBM Security Guardium Key Lifecycle Manager in silent
installation mode. This installation method is useful if you want identical installation
configurations on multiple workstations. Silent installation requires a response file that defines
the installation configuration.
Before you begin
- Complete the planning tasks. See Planning the
installation.
- Download and extract the files for IBM Security Guardium Key Lifecycle Manager
to a directory. These files are available for download from the IBM®
Passport Advantage® website. See Software download instructions.
- Review the considerations and restrictions for installing and configuring IBM Security Guardium Key Lifecycle Manager. See Installation guidelines.
- IBM Security Guardium Key Lifecycle Manager includes sample response files
that you can use as a template for creating your own response file. Modify the sample file for the
specifics of your environment before it can be used.
The
response files are available in the root directory of the installation image files.
Note: You can change the installation locations
(installLocation parameter in the response file) of the package groups. Ensure
that the non-administrator or non-root user account has access to the locations that you
specify.
Procedure
-
Edit the repository location information and other details in the response file. The sample
response files are in the directory in which your installation package is located.
Note: If you enter an invalid value for the full_path_to_response_file
parameter, such as an incomplete path, the installation program exits. No error message is displayed
or logged.
You must update the response file with the correct repository location. The repository location
is the place where your installation package is
located.
<repository location='<user repository location>\im'/>
<repository location='<user repository location>\'/>
If you extracted the installation package in
C:\gklm42, update repository
location in the
SKLM_install_Win_Resp.xml response file as shown in the
following example.
<repository location='C:\gklm42\disk1\im'/>
<repository location='C:\gklm42\disk1\'/>
-
To add the encrypted passwords to the relevant elements of the response file, use the IBM Installation Manager utility to create encrypted passwords.
- (Optional) To use an existing copy of Db2 Standard Edition, update the data element in the response
file.
<data key='user.DB2_EXISTS,com.ibm.gklm42.db2.win.ofng' value='true'/>
<data key='user.DB2_LOCATION,com.ibm.gklm42.db2.win.ofng' value='DB_HOME'/>
-
Open a command prompt and run the silent installation command.
- Windows
- Go to the <installation package directory>\disk1
directory and run the following
command.
silent_install.bat SKLM_Silent_Win_Resp.xml -acceptLicense
- Linux®
- Go to the <installation package directory>/disk1
directory and run the following
command.
silent_install.sh SKLM_Silent_Linux_Resp.xml -acceptLicense
-
Verify that the installation was successful by reviewing the log files. You can view the
Installation Manager logs at the following locations.
- Windows
- drive:\IM_DATA_DIR\logs\native.
For example, C:\ProgramData\IBM\Installation
Manager\logs\native.
- drive:\IM_DATA_DIR\logs\sklmLogs\.
For example, C:\ProgramData\IBM\Installation
Manager\logs\sklmLogs\.
- Linux
- /IM_DATA_DIR/logs/native.
For example,
/var/ibm/installationManager/logs/native.
- /IM_DATA_DIR/logs/sklmLogs/.
For example,
/var/ibm/InstallationManager/logs/sklmLogs/.
For the definition of
IM_DATA_DIR, see
Definitions for HOME and other directory variables.
What to do next
Before you use IBM Security Guardium Key Lifecycle Manager, run the
postinstallation tasks that are described in Postinstallation tasks.
Table 1. Topic change log
Date |
Change description |
15 May 2023 |
Corrected the Db2 edition. |
07 March 2023 |
Initial version. |