All URLs are specified in lowercase. |
Switch to C:\inetpub\wwwroot\pam\idp folder and edit appsettings.json file:
ConnectionStrings:
Password - is the password for that service account
"ConnectionStrings": {
"DefaultConnection": "Server=MSSQLServer;Database=IPAMIdP;Integrated Security=False;User ID=IPAMSQLService;Password=password"
} |
If you are using a named instance of Microsoft SQL Server, the value of the Server parameter must be set in the format
|
In the Provider section, select the DBMS connection provider:
Example for the PostgreSQL Pro:
"Database":{
"Provider": "pgsql"
}, |
GatewaySecret - Hash for client keys for additional authentication of Indeed PAM Gateway
CoreApiSecret - Hash for client keys for additional authentication of PAM Core
"pam-gateway"
"IdentitySettings":{
"AdminSids": [ "S-1-5-21-1487179672-2651565253-5257550508-0000", "S-1-5-21-1487179672-2651565253-5257550508-0001" ],
"GatewaySecret": "3GRNSuF9p8vEOyP1izZGlyrsJgXTMl7bbyB5B7jS9/8=",
"IdpUrls": [ "https://pam.domain.local/pam/idp" ],
"Lang": "ru",
"SigningCertificate": "",
"ConsoleAppClientSecret": ""
"SshProxyClientSecret": "jAulRBy9VGuC0RbJPsVek10Hm5aUqpLiG3rFsqGgwU0=",
"CoreApiSecret": "vAiPgdHe6jGyStXmYxYcoeY1xQfNX+Yun0BhKBrD3Cw=",
"Enable2FaCacheForClients": [ "pam-management-console" ],
"SecondFaCacheLifetimeSeconds": 60
}, |
"PamSettings": {
"ManagementConsoleUrls": [ "https://pam.domain.local/pam/mc" ],
"UserConsoleUrls": [ "https://pam.domain.local/pam/uc" ],
"SessionLifetime": 43200
}, |
"LogServer": {
"AppId": "pam",
"Component": "idp",
"EventCache": {
"Directory": "C:\\ILS\\IdP",
"SendingIntervalSec": 10
},
"Server": {
"Url": "https://pam.domain.local/ls/api",
"Certificate": {
"Thumbprint": "",
"FilePath": "",
"FilePassword": ""
}
}
}, |
This section is required to search and add users to the Roles. It is filled in the same way as the similar section in the Pam Core settings.