Operating system - Assure_Secure_File_Transfer_ - Assure_Elevated_Authority_Manager_(EAM) - Assure_Secure_File_Transfer_PGP - Assure_Encryption - Assure_Secure_File_Transfer - Required_for_All_Modules - Assure_Monitoring_and_Reporting_(AMR) - Assure_Security_Multi-Factor_Authentication_(MFA) - Assure_DB2_Data_Monitor_(DB2MON) - Assure_System_Access_Manager_(SAM) - Assure_Secure_File_Transfer_with_PGP - 7.0

Assure Security Installation (via Wizard) Guide

Product type
Software
Portfolio
Integrate
Product family
Assure
Product
Assure Security > Assure Elevated Authority Manager (EAM)
Assure Security > Assure Encryption
Assure Security > Assure Secure File Transfer
Assure Security > Required for All Modules
Assure Security > Assure Monitoring and Reporting (AMR)
Assure Security > Assure Security Multi-Factor Authentication (MFA)
Assure Security > Assure DB2 Data Monitor (DB2MON)
Assure Security > Assure System Access Manager (SAM)
Assure Security > Assure Secure File Transfer with PGP
Version
7.0
ft:locale
en-US
Content type
Installation (Wizard) Guide
Product name
Assure Security
ft:title
Assure Security Installation (via Wizard) Guide
Copyright
2023
First publish date
1999
ft:lastEdition
2025-02-24
ft:lastPublication
2025-02-24T10:08:52.580000
The operating system must be IBM i V7R3 or a higher supported release. Also:
  • Option 30, IBM i - QShell Interpreter, of the operating system (5770-SS1 for V7R3 or V7R4) is required.
  • Individual licensed features may have additional software requirements, including:
    • Option 47, IBM Advanced Data Security for i, of the operating system (5770-SS1) is required by the Assure Db2 Data Monitor licensed feature for RCAC support.  
    • Licensed features that allow users to see the results of queries, such as Assure Monitoring and Reporting, require the IBM i licensed program 5770QU1 IBM Query for i.
    • Additional requirements to use Assure Multi-Factor Authentication from the web server interface on the web application server are identified in Assure Security application server requirements.

It is assumed that the IBM i system is configured to send e-mails. Several of the licensed features of Assure Security require the ability to send emails.

To use them, some licensed features of Assure Security require a configured TCP/IP environment.