Initial administration tasks

Immediately after installing ColdFusion MX, you might have to perform some or all of the administrative tasks described in the following table:
Task
Description
Establish database connections
ColdFusion applications require data source connections to query and write to databases. To create, verify, edit, and delete database connections, use the Data Sources pages in the Administrator.
For more information, see Chapter 3, "Data Source Management".
Specify directory mappings
Directory mappings redirect relative file paths to physical directories on your server. To specify server-wide directory aliases, use the Mappings page in the Administrator.
For more information, see "Mappings page".
Configure debugging settings
Debugging information provides important data about CFML page processing. To choose the debugging information to display, and to designate an IP address to receive debugging information, use the Debugging & Logging section of the Administrator.
For more information, see "Debugging Settings page".
Set up e-mail
E-mail lets ColdFusion MX and ColdFusion applications send automated mail messages. To configure an e-mail server and mail options, use the Mail Server page of the Administrator.
For more information, see "Mail Server page".
Change passwords
You might have to change the passwords that you set for the ColdFusion Administrator and ColdFusion Studio during ColdFusion MX installation. To change passwords, use the Basic Security pages of the Administrator.
For more information, see "CF Admin Password page" and "RDS Password page".
Configure Java settings
Java and Java applets require configuring Java settings, such as JVM paths. To change Java settings, use the Java and JVM Settings page of the Administrator.
For more information, see "Extensions section".
Restrict tag access
Some CFML tags might present a potential security risk for your server. To disable certain tags and tag attributes system-wide, use the Tag Restrictions page of the Administrator.
For more information, see "Administering Security".

Comments