Difference between revisions of "Prerequisites"
Line 8: | Line 8: | ||
For the installation of the products listed above, refer to the manuals provided by their producers in relation to the hardware/software you are using or, regarding to JBoss, you can download the package already configured with this ''Application Server''. | For the installation of the products listed above, refer to the manuals provided by their producers in relation to the hardware/software you are using or, regarding to JBoss, you can download the package already configured with this ''Application Server''. | ||
− | {| | + | {| class="note" |
| [[File:GVConsolePinguin.jpg]] | | [[File:GVConsolePinguin.jpg]] | ||
| If you are using a *nix operating system, we recommend to NOT use ''root'' user for {{GVESB}} installation. The ''root'' user is the one that has administrative access to the system, so a normal user is preferred to guarantee security standards. | | If you are using a *nix operating system, we recommend to NOT use ''root'' user for {{GVESB}} installation. The ''root'' user is the one that has administrative access to the system, so a normal user is preferred to guarantee security standards. | ||
|} | |} |
Revision as of 18:07, 24 January 2012
To proceed with the GreenVulcano® ESB installation it is necessary that the system will be compatible with the hardware and software platforms described in section Compatible platforms.
The system must be configured with the following products:
- Sun/Oracle JDK 1.6 or higher
- JBoss 4.2.3-GA (or another compatible Application Server)
For the installation of the products listed above, refer to the manuals provided by their producers in relation to the hardware/software you are using or, regarding to JBoss, you can download the package already configured with this Application Server.
File:GVConsolePinguin.jpg | If you are using a *nix operating system, we recommend to NOT use root user for GreenVulcano® ESB installation. The root user is the one that has administrative access to the system, so a normal user is preferred to guarantee security standards. |