Operating system - Assure_Secure_File_Transfer_ - Assure_Elevated_Authority_Manager_(EAM) - Assure_Secure_File_Transfer_PGP - Assure_Encryption - Assure_Secure_File_Transfer - Required_for_All_Modules - Assure_Monitoring_and_Reporting_(AMR) - Assure_Security_Multi-Factor_Authentication_(MFA) - Assure_DB2_Data_Monitor_(DB2MON) - Assure_System_Access_Manager_(SAM) - Assure_Secure_File_Transfer_with_PGP - 7.0

Assure Security Installation (via Wizard) Guide

Product type
Software
Portfolio
Integrate
Product family
Assure
Product
Assure Security > Assure Elevated Authority Manager (EAM)
Assure Security > Assure Encryption
Assure Security > Assure Secure File Transfer
Assure Security > Required for All Modules
Assure Security > Assure Monitoring and Reporting (AMR)
Assure Security > Assure Security Multi-Factor Authentication (MFA)
Assure Security > Assure DB2 Data Monitor (DB2MON)
Assure Security > Assure System Access Manager (SAM)
Assure Security > Assure Secure File Transfer with PGP
Version
7.0
Language
English
Content type
Installation (Wizard) Guide
Product name
Assure Security
Title
Assure Security Installation (via Wizard) Guide
Copyright
2023
First publish date
1999
Last updated
2025-01-05
Published on
2025-01-05T12:58:55.063000
The operating system must be IBM i V7R3 or a higher supported release. Also:
  • Option 30, IBM i - QShell Interpreter, of the operating system (5770-SS1 for V7R3 or V7R4) is required.
  • Individual licensed features may have additional software requirements, including:
    • Option 47, IBM Advanced Data Security for i, of the operating system (5770-SS1) is required by the Assure Db2 Data Monitor licensed feature for RCAC support.  
    • Licensed features that allow users to see the results of queries, such as Assure Monitoring and Reporting, require the IBM i licensed program 5770QU1 IBM Query for i.
    • Additional requirements to use Assure Multi-Factor Authentication from the web server interface on the web application server are identified in Assure Security application server requirements.

It is assumed that the IBM i system is configured to send e-mails. Several of the licensed features of Assure Security require the ability to send emails.

To use them, some licensed features of Assure Security require a configured TCP/IP environment.