Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
You have to fill in the necessary values in the configuration files of each service at the system deployment stage. Configuration files of all system services reside in the root folder of IIS web applications (default path is %SystemDrive%\inetpub\wwwroot).
Info |
---|
Card Monitor service configuration files are located in %ProgramFiles%\Indeed CM\CardMonitor. |
Setup of configuration files is carried out using Indeed CM Setup Wizard. The latter runs automatically upon completion of Indeed CM Server Installation Wizard, if the corresponding checkbox is activated.
However, you also can run the Wizard manually at any time (Start - All Programs – Indeed Identity – Indeed CM).
Image Modified
Figure 13 – Indeed CM Setup Wizard.Scroll Pagebreak |
---|
Table 4 features the section of Setup Wizard, along with description of their parameters.
Table 4 – Indeed CM Setup Wizard sections and their description.table-auto
Section | Description | ||||
---|---|---|---|---|---|
Before starting work | This contains information about the purpose and features of Indeed CM Setup Wizard. | ||||
Restore configuration | This allows to load a backup copy of Indeed CM configuration. | ||||
System features
| Configuration of internal parameters of Indeed CM web applications: Management Console
Self-Service
Event Log: Microsoft CA: Configure settings for working with Microsoft Certification Authority. AirKey Enterprise: Configuring integration with Indeed AirKey Enterprise virtual smart card server. Client Agent: Configuring Indeed CM Client Agent. | ||||
User catalog
| Definition of the system user catalog. Definition user attributes when changing which requires a certificate update. The list of tracked user attributes in the settings of Microsoft CA certificate templates includes the following attributes by default:
| ||||
Access control
| Definition an account to initially configure user privileges in the Roles section of Indeed CM Management Console.
| ||||
Database
| Definition of system data storage and encryption algorithm. Parameters of connection to the storage are defined according to the selected type. | ||||
Card Monitor service | The Card Monitor service is intended for control of smart card usage. The service performs:
| ||||
Confirmation | This contains combined information on settings of all Wizard sections, as well as an opportunity to create a backup copy of Indeed CM configuration. | ||||
Results | This displays the Wizard progress in writing the defined values to configuration files of Indeed CM services
For the Card Monitor service to work correctly, create a service role (say, Card Monitor service) in Roles section, include an account in it, on behalf of which Card Monitor will work with and define the flowing privileges for named role:
| ||||
Confirmation | This contains combined information on settings of all Wizard sections, as well as an opportunity to create a backup copy of Indeed CM configuration. | ||||
Results | This displays the Wizard progress in writing the defined values to configuration files of Indeed CM services. |
When installed Indeed CM Server for the first time, set up the required parameters and make a backup copy of those (option Backup current configuration settings in the Confirmation section).
The backup copy of Indeed CM settings contains all the parameters defined for all services during installation, as well as encryption key and algorithm. To use the backup to deploy new Indeed CM servers, specify it in the Restore configuration section of Setup Wizard.
Warning |
---|
The backup also contains the data of service accounts (the one for user directory and for data storage), encryption key and algorithm. Be sure to store the backup copy file in a safe place. |
After the Setup Wizard is complete, the defined values of all parameters are written to the configuration files of all applications and encrypted. Encryption is performed using the Microsoft .NET (NetFramework ConfigurationKey) key. Encryption algorithm is RSA.