Previous Topic: Infrastructure Deployment ProcessNext Topic: Notes on Remote Deployment Using IPv6 Addresses


Prerequisites for Automatically Deploying CA Virtual Assurance Infrastructure

The Infrastructure Deployment component lets you remotely install agent software to target computers. The installation can only be done using the functionalities of the underlying operating systems on source and target computers. The installation is subject to any restrictions resulting from an enterprise network configuration.

The initial step when deploying software is to install a small primer application remotely, the IDPrimer, onto the target computer. The IDPrimer software is responsible for subsequent transfer of software component installation images, and the invocation of their installation. When delivering the IDPrimer to the target computers, the deployment manager must supply user credentials that are valid on the target.

The IDPrimer is transferred to the target system using one of the following mechanisms. If the target operating system is known to the deployment manager, an appropriate transfer mechanism is selected. If the target operating system cannot be determined, each of the following mechanisms is attempted in turn.

Important! Some modern operating systems do not encourage, and sometimes actively prohibit, the remote installation of software. If you try to deploy software to these systems, the deployment fails with a status of No Primer Transport. In such cases, install the software components in other ways, for example, using physical distribution media such as DVD.

Alternatively, you can preinstall or provision machines with the IDPrimer software. This process allows deployment without having to rely on facilities offered by the underlying operating systems. In cases where no authentication has been carried out, supply valid credentials before deployments being authorized.

To determine whether automatic deployment is possible in your environment, you can perform some simple checks by running the following standard operating system operations:

More Information

Remote Deployment to UNIX/Linux Using Non Privileged User Account