Configuration and Customisation

Previous

Install Software

Next
Make the software available to those carrying out the configuration and customisation.
  • List of staff involved in configuration and customisation
  • Software
    1. Identify who will require access.
    2. Install the software including supporting applications in whatever environments are required.
    3. Provide security access to people who require access.
    4. Test the access.
  • Application installed on one or more environments
  • Users able to access the application

When roles and responsibilities are being defined, you should have a list of people who will be responsible for configuration and customisation. This list will need to be reviewed, but will form the basis of developing security profiles. The parts of the system, and the level of access will need to be determined by the Project Manager in conjunction with the Business Managers involved.

A plan should also be put in place to cover the environments that need to be set up. It may be as simple as one development and one test environment, or it may be several environments to develop and test different components, then an integration environment, and a User Acceptance Testing (UAT) environment. The plan should cover, security, backup and restore, database configuration, data available and capacity.

Installation may require support from the Vendor to install the software and configure it for access. The Vendor may need to be given several days notice to provide the software and support staff for the installation. A list of additional software should also be prepared. This may included operation system, development tools, security applications, performance monitoring, drivers, anti virus applications, etc.

Environment Plan Plan for setting up the different environments
Nil  

Return to the top