The following are specific ClearPath Forward guidelines when using the Stealth documentation to configure your environment:
Configuring the Authorization Service
You should typically use IntegratedWindowsAuthentication for the Authentication Scheme.
You should typically use only one authentication scheme to authenticate users.
Filtering Overview
In general, you should set up Clear Text filters for the Infrastructure services and for the Fabric Management Platform to ensure that Stealth-enabled ClearPath Forward partitions can communicate with these components. See the Stealth documentation for more information on configuring filters.
Endpoint Configuration Overview
For Windows ClearPath Forward partitions, be sure to perform the procedure to configure server mode after you install the Stealth endpoint software.
For Linux ClearPath Forward partitions, perform the appropriate procedures in “Configuring Linux Endpoints.”
Using Stealth Troubleshooting Information
For troubleshooting information, refer to the Stealth documentation.
If you need to report an issue to Unisys using a User Communication Form (UCF), be sure to describe the configuration of the ClearPath Forward fabric, how Stealth management components are integrated in the environment, and what type of endpoints are included in the environment.