Technical data
Hardware and Software Requirements
System Requirements
The ESSO-LM components system requirements are as follows:
Disk Space Requirements
Disk space requirements for the Agent
Minimum, excluding
temporary space and
runtime expansion
Temporary disk space (/tmp)
needed during installation
For runtime expansion
(configuration data and logs)
MSI
30 MB 30 MB 2 MB / user
EXE
30 MB 45 MB 2 MB / user
Disk space requirements for the Console
Minimum, excluding
temporary space and
runtime expansion
Temporary disk space (/tmp)
needed during installation
For runtime expansion
(configuration data and logs)
MSI
20 MB 15 MB 2 MB / user
EXE
20 MB 65 MB 2 MB / user
Other disk space requirements
The following components require additional disk space requirements:
• Microsoft Windows Installer: 20 MB hard drive space (if not present and if used)
• Microsoft .NET Framework 2.0: 20 MB hard drive space (if not present)
A note about MSI installer vs. EXE installer
The disk space requirements are different for the MSI and EXE installers as there are differences in the
capabilities of these installers:
• The EXE installer file includes Microsoft .NET Framework version 2.0, which is a requirement
for the SSO Administrative Console.
• The EXE installer file can be run in multiple languages. The MSI file is English-only.
• The MSI installer package is a database file, used by Windows Installer. This is a standard
format used by installers from Microsoft and other vendors, and many other installers can read
MSI files. The Microsoft Windows Installer exists as a service (Windows Installer) on all
Microsoft Windows 2000/XP computers (refer to Microsoft Knowledgebase article #q255905).
You can customize the MSI package to meet special requirements, such as:
o Providing custom applications and SSO agent configurations.
o Deactivating some options or components (i.e., different authenticators) before the end
users install the Agent themselves.
o Adding options or components to accommodate a complex environment, for example,
one using biometric security devices or having an unusual network topology.
11










