The system is installed now but not configured for use. No users, hardware, or services are configured. If the installation fails in one of the step of this stage, the configuration part restarts from the beginning. The installation itself is not repeated.
First, provide a password for the account of
the system administrator (the root
user). You can then configure your Internet access
and network connection. With a working Internet connection, you can
perform an update of the system as part of the installation. You can
also configure an authentication server for centralized user
administration in a local network. Finally, configure the hardware
devices connected to the machine.
root is the name of the superuser, the
administrator of the system. Unlike regular users, which may or may
not have permission to do certain things on the system,
root has unlimited power to do
anything: change the system configuration, install programs, and set
up new hardware. If users forget their passwords or have other
problems with the system,
root can help.
The root account should only be
used for system
administration, maintenance, and repair. Logging in as
root for daily work is rather
risky:
a single mistake could lead to irretrievable loss of many system
files.
For verification purposes, the password for
root must be entered twice. Do
not forget
the root password. Once
entered, this password cannot be retrieved.
SUSE Linux Enterprise can use the DES, MD5, or Blowfish encryption types for passwords. The default encryption type is Blowfish. To change the encryption type, click + and select the new type.
The hostname is the computer's name in the network. The domain name is the name of the network. A hostname and domain are proposed by default. If your system is part of a local network or should be accessible from the Internet, the domain name used here must be that expected by the network or Internet. For a system in a local network, the hostname should be unique in the network.
In many networks, the system receives its hostname over DHCP, in which case you should not modify the name. Instead select .
To be able to access your system using this hostname, select . This assigns the IP address 127.0.0.2 to the name, both with and without the domain.
To change hostname settings at any time after installation, use YaST +. For more information, see Section 30.4.1, “Configuring the Network Card with YaST”.
![]() | IBM System z: Network Configuration |
|---|---|
For the IBM System z platforms, a working network connection is needed at installation time to connect to the target system, the installation source, and the YaST terminal controlling the process. The steps to set up the network are discussed in the network configuration chapter of the Architecture-Specific Information manual (Chapter Preparing for Installation (↑Architecture-Specific Information)). The IBM System z platforms only support the types of network interfaces mentioned there (OSA Token Ring, OSA Ethernet, OSA Gigabit Ethernet, OSA Express Fast Ethernet, Escon, IUCV, and OSA Express High-Speed Token Ring). The YaST dialog simply displays the interface with its settings as already configured. Just confirm this dialog to continue. | |
By default, is enabled. If desired, you can also use NetworkManager to manage all your network devices. However, the traditional method is the preferred option for server solutions. Find detailed information about NetworkManager in Section 30.5, “Managing Network Connections with NetworkManager”.
To configure your network connection later, select and click . Network hardware can also be configured after the system installation has been completed. If you skip the network device configuration, your system is left offline and is unable to retrieve any available updates.
As well as device configuration, configure some other network settings in this step:
When you connect to a network, a firewall is started automatically on the configured interface. The configuration proposal for the firewall is updated automatically every time the configuration of the interfaces or services is modified. To adapt the automatic settings to your own preferences, click +. In the dialog that opens, determine whether the firewall should be started. If you do not want the firewall to be started, select the appropriate option and exit the dialog. To start and configure the firewall, click for a series of dialogs similar to those described in Section 43.4.1, “Configuring the Firewall with YaST”.
By default the IPv6 support is enabled. To disable it, click . For more information about IPv6, see Section 30.2, “IPv6—The Next Generation Internet”.
To administer your machine remotely by VNC, click +, enable remote administration, and open the port in the firewall. If you have multiple network devices and want to select on which to open the port, click and select the network device. You can also use SSH, a more secure option, for remote administration.
If you have a proxy server in your network to control access to the Internet, enter the server name and all other required information to enable access to the Internet.
![]() | Resetting the Network Configuration to the Defaults |
|---|---|
Reset the network settings to the original proposed values by clicking +. This discards any changes made. | |
After configuring an Internet connection, you can test it. For this purpose, YaST establishes a connection to the SUSE Linux Enterprise server and downloads the latest release notes. Read them at the end of the installation.
To start the test, select and click . In the next dialog, view the progress of the test and the results. If the test fails, click to return in the previous dialog and correct the configuration or skip the test. If you need more information about the test process, click .
If you do not want to test the connection at this point, select then . This also skips downloading release notes, configuring the customer center, and updating online.
If you have multiple network interfaces in your system, verify that the the desired card is used to connect to the Internet. To do so, click .
To get technical support and product updates, first register and activate your product. provides assistance for doing so.
If you are offline or want to skip this step, select . This also skips SUSE Linux Enterprise online update.
In , select whether to obtain some of the necessary information from your system. This simplifies the registration process. To keep your installation sources valid, select . This option checks your installation sources and adds new available sources or removes obsolete sources. It does not touch manually added sources. Additionally, it resends your hardware information if is activated, which can make new hardware-specific sources available. To see what is required to register your system or what happens with your data, use .
![]() | Technical Support |
|---|---|
Find more information about the technical support at http://www.novell.com/support/products/linuxenterpriseserver/. | |
If the Novell Customer Center has not been configured, the next step is the user configuration. See Section 3.11.7, “Users”. For detailed instructions for to perform an online update after the installation, see Section 8.3.5, “YaST Online Update” .
If YaST was able to connect to the SUSE Linux Enterprise servers, select whether to perform a YaST online update. If there are any patched packages available on the servers, download and install them now to fix known bugs or security issues.
After testing the Internet connection and downloading the first updates, a dialog opens in which to enable and configure two important network services. See Figure 3.6, “Proposed Setup for Network Services”.
The purpose of a CA (certificate authority) is to guarantee a trust relationship among all network services communicating with each other. Without a CA, you can secure server communications with SSL and TLS separately for each individual service. By default, a CA is created and enabled during the installation. Find details about the creation of a CA with YaST in Chapter 42, Managing X.509 Certification.
You can run an LDAP service on your host to have a central facility manage a range of configuration files. Typically, an LDAP server handles user account data, but with SUSE Linux Enterprise it can also be used for mail, DHCP, and DNS data. By default, an LDAP server is set up during the installation. If you decide against the use of an LDAP server, the YaST mail server module does not work because it depends on LDAP functionality. However, you can still set up a mail server on your system with the help of the module. Find details about LDAP and its configuration with YaST in Chapter 36, LDAP—A Directory Service.
If preferred, you can skip this configuration proposal for now. After the installation is finished, configure and start the same services with the help of YaST.
![]() | Resetting the Service Configuration to Defaults |
|---|---|
Restore the defaults by clicking +. This discards any changes made. | |
If network access was configured successfully during the previous steps of the installation, you now have the following possibilities to manage user administration method on your system:
Users are administered locally on the installed host. This is a
suitable option for stand-alone workstations. User data is managed
by the local file /etc/passwd. All users who are
entered in this file can log in to the system even if no network is
available.
If YaST found a former version of SUSE Linux Enterprise or another
system using /etc/passwd, it offers the possibility
to import local users. To do so, check
and click
. In the next dialog, select the users to import
and click .
Users are administered centrally on an LDAP server for all systems in the network.
Users are administered centrally on a NIS server for all systems in the network.
SMB authentication is often used in mixed Linux and Windows networks.
![]() | Content of the Authentication Menu |
|---|---|
If you use the custom package selection and one or more authentication methods are missing from the menu, the required packages probably are not installed. | |
You can also add additional user accounts or change the user authentication method in the installed system. For detailed information about user management, see Section 8.9.1, “User Management”.
Along with the selected user administration method, you can use Kerberos authentication. This is essential for integrating your SUSE Linux Enterprise to an Active Directory domain, which is described in Section 37.6, “Samba Server in the Network with Active Directory”. To use Kerberos authentication, select .
This step does not require any user interaction. The installation program launches the SuSEconfig script to write the system configuration. Depending on the CPU and the amount of memory, this process can take some time.
After completing the user authentication setup, YaST displays the release notes. Reading them is advised because they contain important up-to-date information that was not available when the manuals were printed. If you tested the Internet connection, read the most recent version of the release notes, as fetched from SUSE Linux Enterprise's servers. Use + to view the release notes after installation.
At the end of the installation, YaST opens a dialog for the configuration of the graphics card and other hardware components connected to the system. Click the individual components to start the hardware configuration. For the most part, YaST detects and configures the devices automatically.
![]() | IBM System z: Hardware Configuration |
|---|---|
On the IBM System z, there is no display that would be supported by XFree. Accordingly, you do not find a entry on these systems. | |
You can skip any peripheral devices and configure them later, as described in Section 8.4, “Hardware”. To skip the configuration, select and click .
However, you should configure the graphics card right away. Although the display settings as configured by YaST should be generally acceptable, most users have very strong preferences as far as resolution, color depth, and other graphics features are concerned. To change these settings, select the respective item and set the values as desired. To test your new configuration, click .
![]() | Resetting Hardware Configuration to Defaults |
|---|---|
You can cancel changes by clicking +. YaST then shows the original proposal again. | |
After a successful installation, YaST shows the
dialog. In this dialog, select whether to clone your newly installed system
for AutoYaST. To clone your system, select .
The profile of the current system is stored in
/root/autoyast.xml.
Cloning is selected by default.
AutoYaST is a system for installing one or more SUSE Linux Enterprise systems automatically without user intervention. AutoYaST installations are performed using a control file with installation and configuration data. For detailed information, refer to Chapter 5, Automated Installation. Finish the installation of SUSE Linux Enterprise with in the final dialog.