Prepare to install
Make sure that your installation meets the requirements in Requirements.
To limit the impact of a security breach, install and run IG from a dedicated service account. This is optional when you are evaluating IG, but essential in production installations.
A hacker is constrained by the rights granted to the user account where IG runs; therefore, never run IG as root user.
In a terminal window, use a command similar to the following to create a service account:
Apply the principle of least privilege to the account, for example:
Read/write permissions on the installation directory,
Execute permissions on the scripts in the installation
Configure the network to include the hosts.
Add the following additional entry to your host file:
127.0.0.1 localhost ig.example.com app.example.com am.example.com
For more information about host files, see the Wikipedia entry, Hosts (file).