All URLs are specified in lowercase. |
Switch to C:\inetpub\wwwroot\pam\idp folder and edit appsettings.json file:
ConnectionStrings:
Password - is the password for that service account
"ConnectionStrings": { "DefaultConnection": "Server=MSSQLServer;Database=IPAMIdP;Integrated Security=False;User ID=IPAMSQLService;Password=password" } |
If you are using a named instance of Microsoft SQL Server, the value of the Server parameter must be set in the format
|
In the Provider section, select the DBMS connection provider:
Example for the PostgreSQL Pro:
"Database":{ "Provider": "pgsql" }, |
GatewaySecret - Hash for client keys for additional authentication of Indeed PAM Gateway
CoreApiSecret - Hash for client keys for additional authentication of PAM Core
"pam-gateway"
"IdentitySettings":{ "AdminSids": [ "S-1-5-21-1487179672-2651565253-5257550508-0000", "S-1-5-21-1487179672-2651565253-5257550508-0001" ], "GatewaySecret": "3GRNSuF9p8vEOyP1izZGlyrsJgXTMl7bbyB5B7jS9/8=", "IdpUrls": [ "https://pam.domain.local/pam/idp" ], "Lang": "ru", "SigningCertificate": "", "ConsoleAppClientSecret": "" "SshProxyClientSecret": "jAulRBy9VGuC0RbJPsVek10Hm5aUqpLiG3rFsqGgwU0=", "CoreApiSecret": "vAiPgdHe6jGyStXmYxYcoeY1xQfNX+Yun0BhKBrD3Cw=", "Enable2FaCacheForClients": [ "pam-management-console" ], "SecondFaCacheLifetimeSeconds": 60 }, |
"PamSettings": { "ManagementConsoleUrls": [ "https://pam.domain.local/pam/mc" ], "UserConsoleUrls": [ "https://pam.domain.local/pam/uc" ], "SessionLifetime": 43200 }, |
"LogServer": { "AppId": "pam", "Component": "idp", "EventCache": { "Directory": "C:\\ILS\\IdP", "SendingIntervalSec": 10 }, "Server": { "Url": "https://pam.domain.local/ls/api", "Certificate": { "Thumbprint": "", "FilePath": "", "FilePassword": "" } } }, |
This section is required to search and add users to the Roles. It is filled in the same way as the similar section in the Pam Core settings.