Previous Topic: Remote DeploymentNext Topic: Upgrade


Individual Installation

When you install the SRM AIM on top of SystemEDGE, consider that the SRM AIM depends on Advanced Encryption and SystemEDGE.

Based on these dependencies, the installation sequence is as follows:

  1. SystemEDGE Core
  2. Advanced Encryption
  3. SRM AIM

The installer does not allow any other sequence. For example, when you try to install SRM without Advanced Encryption, it displays an error message and the installation does not start.

Note: See the CA Virtual Assurance Implementation Guide or SystemEDGE User Guide for details about installing SystemEDGE.

To install the SRM AIM on Windows using ca-setup.exe

  1. Navigate to the DVD1\Installers\Windows\Agent\SysMan directory. Install the following components in this directory by considering the sequence:
    1. CA_SystemEDGE_Core
    2. CA_SystemEDGE_AdvancedEncryption
    3. CA_SystemEDGE_SRM
  2. Change to the appropriate directory, and run the following command:
    ca-setup
    

    Follow the instructions on the screen and complete the installation.

To install the SRM AIM on Linux and UNIX using ca-setup.sh

  1. Open a terminal console and change to the DVD2/Installers/Platform/Agent/SysMan directory. Install the following components in this directory by considering the sequence:
    1. CA_SystemEDGE_Core
    2. CA_SystemEDGE_AdvancedEncryption
    3. CA_SystemEDGE_SRM
  2. Change to the appropriate directory and run the following command:
    sh ca-setup.sh
    

    Follow the instructions on the screen and complete the installation.

During the SRM installation, you can specify the following parameters:

Allow Runnings Scripts

Specifies if you want to allow running custom scripts. These scripts run with superuser privileges.

Default: No (typical installation)

Allow FileIO Tests

Allows running FileIO tests. Because the tests run with superuser privileges, they can access any file on the system when it is enabled.

Default: No (typical installation)

Allows untrusted SSL certificates

Allows HTTPS tests to access sites with invalid certificates (untrusted or when the website does not match the name in the certificate).

Default: No (typical installation)

Miscellaneous

Installs the SRM documentation component.

Default: Yes