Hardware and Software Requirements

Installation Prerequisites

  1. An IBM J9 Java or Oracle Java Runtime Environment has been installed on the local or remote, accessible servers. The minimum required version is Java Runtime Environment 8. (OpenJDK is not supported but it might work.)
  2. A supported web browser is installed on each user’s device
  3. A supported Operating System is installed on the local or remote, accessible server
  4. PTC Windchill 10.0 or later has been installed on a local or remote, accessible server
  5. IBM Jazz CLM 4.0.5 or later has been installed on local or remote, accessible server(s)
  6. Apache Tomcat 8.5.23 or later or IBM Websphere Application Server 8.5.5 or later needs to be installed (see below).
  7. Administration credentials for PTC Windchill, for IBM CLM, and for either Tomcat or WebSphere Application Server (WAS) are available and known
  8. Network topologies and network firewalls permit connections between the three (or more) servers (Windchill, CLM, and the Windchill Adapter) regardless of whether those software servers are co-resident on the same virtual or physical hardware server or are distributed onto two or more virtual or physical hardware servers.
  9. Non-self-signed SSL Certificates for each Server are published by each Web/Application server.

Web Browsers Requirements

Operating Systems Supported

Web/Application Servers' Required Capabilities

Advice against Self-Signed Certificates: They’re free, so why not use them? Modern browsers consider sites that publish self-signed certs to be just as unsafe as those that do not use HTTPS at all. Users in your organization will encounter popup warnings that the services of your ALM, PLM, and Adapter applications are not secure and the browser will advise them to disable access to the sites. Many users will agree and will click Ok to not violate such security advice. Then, the no-longer-integrated applications will fail to offer service in their browsers. Your users will contact your IT and Networking departments for assistance. Days may pass before the users are trained to violate security policies to be able to get on with their business goals. They will remember this and will be trained to violate other security practices when necessary in order to get work done.