Initial configuration
Several initial configuration tasks are required for your IBM Security Access Manager environment.
After you complete the Getting started tasks, including activating the product, continue with these steps:
- Manage application interfaces.
- Configure your environment based on your needs:
- Stand-alone Web Reverse Proxy
- Member of a cluster of appliances
-
- Primary master in a cluster:
-
- Manage cluster configuration and specify an appliance to be the primary master.
- Configure the runtime environment.
- Configure Web Reverse Proxy instances.
- Member of a cluster:
-
- Manage cluster configuration and join the current appliance to the cluster.
- Configure Web Reverse Proxy instances.
- Front-end load balancer:
- Set up communication between appliances
- Complete the following task if you have one appliance with Advanced Access Control activated and one without it: Adding runtime listening interfaces.
- Configure the Administrative User Registry:
- If you want to enforce password policies for the administrative users, configure an external user registry that implements the desired password policies as the administrative user registry. See Configuring management authentication.
Proceed with additional configuration tasks as your environment requires.
Note: Do not connect the IBM Security Access Manager appliance to public telecommunications network
interfaces. Further certification might be required by law before you make any such connections. Do
not use the appliance in Public Services Networks. Contact IBM at IBM Customer Support
for more information.