Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Set up, enabling and migrating security > Prepare for security at installation time


Secure the environment before installation

The following instructions explain how to perform a product installation with proper authority. Complete the following steps when you plan to use the local operating system as your user registry:


Procedure


Results

These steps help secure the environment when you use the local operating system as your user registry

+

Search Tips   |   Advanced Search