Prior to installing the program, carefully read the KUMA installation requirements as well as the hardware and system requirements. The KUMA installation takes place over several stages:
Make sure all the necessary ports are open to allow KUMA components to interact with each other based on your organization's security structure.
The test machine is used during the program installation process: the installer files are unpacked and run on it.
The program components are installed on the target machines.
Create an inventory file describing the network structure of the program components that the installer can use to deploy KUMA.
Install the program and get the URL and login credentials for the web interface.
Create services in the KUMA web interface and install them on the target machines intended for them.