Installing
Understand the best practices for installing of Secure Proxy.

The Installing section provides a quick reference to the installation process for Secure Proxy followed by a detailed process. The installation and upgrade processes both include downloading installation items, completing prerequisites, preparing systems, running the installer, and completing the post-installation configurations.
Note: v6.0.1 introduces support to install and deploy Secure Proxy:
- Using a Docker container
- In a Kubernetes/ OpenShift® Environment
Installing Secure Proxy
You can install Secure Proxy using any of the following methods.| Scenario | Resource |
|---|---|
| Install and Deploy Secure Proxyusing the conventional method | |
| Install and Deploy Secure Proxyusing the Silent Installation method | Silent Install for Secure Proxy |
| Install and Deploy Secure Proxy using a Docker container | Deploying IBM Sterling using a Docker container |
| Install and Deploy Secure Proxy using Kubernetes/ OpenShift | Deploying IBM Sterling Secure Proxy using an IBM Certified Container Software |