Intel Ema Server Installation and Maintenance Guide
Intel Ema Server Installation and Maintenance Guide
Assistant
(Intel® EMA)
July 2020
Legal Disclaimer
Intel technologies may require enabled hardware, software or service activation.
No product or component can be absolutely secure.
Your costs and results may vary.
No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this
document.
Intel disclaims all express and implied warranties, including without limitation, the implied warranties of
merchantability, fitness for a particular purpose, and non-infringement, as well as any warranty arising from course
of performance, course of dealing, or usage in trade.
The products and services described may contain defects or errors known as errata which may cause deviations from
published specifications. Current characterized errata are available on request.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware,
software or service activation. Performance varies depending on system configuration. No computer system can be
absolutely secure. Intel does not assume any liability for lost or stolen data or systems or any damages resulting
from such losses. Check with your system manufacturer or retailer or learn more at
http://www.intel.com/technology/vpro.
Copyright © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its
subsidiaries. Other names and brands may be claimed as the property of others.
1 Introduction 1
1.1 Before You Begin 1
1.2 Supported Operating Systems 2
1.3 Installation Prerequisites 2
1.4 Security Recommendations 5
1.4.1 Back Up Important Data 5
1.4.2 Modify the Access Control List (ACL) for Key Configuration Files 5
1.4.3 Enable Transparent Data Encryption on SQL Server Enterprise 6
1.4.4 Secure all Certificates and Keys 6
1.4.5 Samples files for Intel® EMA REST API and JavaScript library 6
1.4.6 Disable Insecure Cipher Suites 6
Note: A simplified tutorial installation procedure for learning purposes is available in the Intel® EMA Quick
Start Guide.
The Global Administrator is responsible for installation, configuration, and management of the Intel EMA server as a
whole, as well as creating Tenant usage spaces within the Intel® EMA server. Other Intel EMA users, such as Tenant
Administrators and Account Managers are responsible for setting up and maintaining the users, user groups,
endpoint groups, and managed endpoint client systems for each Tenant hosted on the Intel EMA server.
Note: Key concepts such as user roles, tenants, and endpoint groups are described in detail in the Intel® EMA
Administration and Usage Guide, which also provides detailed information about the setup and maintenance
of Intel® EMA Tenants and their managed endpoint systems.
We recommend that you read this guide carefully before performing the installation. This document provides the
installation requirements, explains the configuration parameters, and provides detailed installation steps for the Intel®
EMA server and its components.
IMPORTANT: To achieve security in-depth, we recommend to use Microsoft SQL Server Enterprise
and enable Transparent Data Encryption. Additionally Windows authentication mode is recommended
as the authentication mode.
Notes:
l Be sure to allocate enough resources (CPU, memory, SSD, etc.) to SQL Server. If your
SQL Server's resources are dynamically allocated, ensure enough guaranteed fixed resources
are allocated. If not, you may see error messages like "Unable to get database connection, all
connections are busy" in the component server log files in Program Files (x86)\In-
tel\Platform Manager\EmaLogs.
l Intel EMA uses query notification in SQL Server to reduce the number of database reads. That
feature requires "Service Broker" to be enabled in SQL server. If Service Broker is disabled, you
will see warnings to that effect in the component server log files in Program Files (x86)\In-
l Web Server: Intel EMA uses Microsoft Internet Information Server (IIS). Use the latest IIS 8, IIS 8.5, or IIS 10
version.
l Install IIS URL Rewrite Module for the target IIS. If it is installed, Intel EMA will set up the website set-
ting to remove the IIS server version from the response header, the HSTS header, the cookie Same Site
strict, and the auto redirect from HTTP to HTTPS. If it is not installed, these settings will not be
applied.
Note: If IIS is already installed, ensure that all authentication methods are disabled except for
“Anonymous” and “Windows” (only those two should be enabled). This only applies to Windows
Authentication mode.
l Intel® AMT PKI Certificate: Intel AMT Admin Control Mode (ACM) provisioning requires a certificate issued by
a trusted authority that matches the domain name of the target Intel AMT endpoints. The certificate file needs
to have the full certificate chain. Also, it needs to be issued with the supported OID 2.16.840.1.113741.1.2.3
(this is the unique Intel AMT OID).
l Microsoft .NET Framework versions: Intel EMA Server software is built with Microsoft .NET Framework 4.5.2.
The operating system must have Microsoft .NET Framework 4.5.2 or later.
l Firewall: We recommended using a firewall software to ensure that only authorized ports are available for con-
nection. The firewall software built into Windows can perform this task.
l Network: During the installation, you must specify the value (either hostname or IP address) to use for com-
munication among various components. If you choose hostname or FQDN, you need to make sure the value
is resolvable by a DNS server in the network. If you do not have the DNS server, a fixed IP address should be
used during installation. Incorrect hostname/IP address will cause Intel EMA features to not function properly.
In a distributed server archecture implementation, if using Active Directory, ensure all computers (including
the computer hosting the load balancer) are listed in Active Directory.
TCP 1433 SQL server remote access. This is used between the internal Intel EMA server
and the internal SQL server; only needed if Intel EMA server and the SQL server
are not on the same machine. This is the default port that SQL server uses.
TCP 8000 The default TCP port for communication between Platform Manager service
and Platform Manager client. You can change this port during installation.
TCP 8080† Agent, console, and Intel AMT CIRA port. This is between client endpoints and
the Intel EMA Swarm server. See note below.
TCP 8084 Web redirection port. This is used between the web browser and the web
server.
TCP 8089 Communication between the various Intel EMA component servers and Intel
EMA Swarm server. This port number is the default, and can be changed in the
Server Settings page (see "Appendix - Modifying Component Server Settings"
on page 54"Appendix - Modifying Component Server Settings" on page 54
TCP 8092 Port on which Ajax component server listens for internal component-to-com-
ponent communication. This port number is the default, and can be changed
in the Server Settings page (see "Appendix - Modifying Component Server Set-
tings" on page 54"Appendix - Modifying Component Server Settings" on
page 54
TCP 8093 Port on which Swarmcomponent server listens for internal component-to-
component communication. This port number is the default, and can be
changed in the Server Settings page (see "Appendix - Modifying Component
Server Settings" on page 54"Appendix - Modifying Component Server Set-
tings" on page 54
TCP 8094 Port on which Manageability component server listens for internal com-
ponent-to-component communication. This port number is the default, and
can be changed in the Server Settings page (see "Appendix - Modifying Com-
ponent Server Settings" on page 54"Appendix - Modifying Component Server
Settings" on page 54
† You can change the port that the agent and Intel AMT CIRA use to connect to the Intel EMA server.
Important: For distributed server architecture installations, be sure to make all applicable changes below on
all your Intel EMA servers.
1.4.2 Modify the Access Control List (ACL) for Key Configuration Files
After the Intel EMA server installation, you should modify the ACL to limit access to the following files\folders:
l [Intel EMA website root folder (e.g., C:\inetpub\wwwroot)] \ web.config.
l [Intel EMA server installation folder (e.g., C:\Program Files (x86)\Intel\Platform Manager)] \ Platform Manager
Server \ settings.txt
1.4.5 Samples files for Intel® EMA REST API and JavaScript library
The sample files are in the folder [Intel EMA installation package folder] \Samples. These files are not automatically
hosted on the Intel EMA website during installation. These sample files are implemented using bare-minimum code
to demonstrate how to use the API and do not use secure coding practices to guard against security concerns like
cross-site scripting.
For hosting in a test environment for development purposes, copy the Samples folder to the Intel EMA website root
folder (e.g., C:\inetpub\wwwroot\).
Note:
l This TLS certificate can also be used for the Platform Manager TLS certificate if you are running Plat-
form Manager on the same system as the IIS server. See section 4.1.
l For the self-signed website TLS certificate (and the Intel EMA settings certificate), Intel EMA grants the
default IIS DefaultAppPool account read access to the private key. If you change the account that the
IIS default application pool will run under, you must also change the access control accordingly.
l Message tampering
l Message interception
l Message forgery
HTTP Strict Transport Security (HSTS) is an opt-in security enhancement policy, which must be enabled to ensure
connections can only be successful if the Transport Layer Security (TLS) protocol is used.
Header Value
X-Content-Type-Options nosniff
X-XSS-Protection 1; mode=block
X-Frame-Options SAMEORIGIN
Referrer-Policy strict-origin
<!--
<add name="Access-Control-Allow-Origin" value="https://<YOURDOMAINHERE>" />
<add name="Access-Control-Allow-Headers" value="Content-Type" />
<add name="Access-Control-Allow-Methods" value="GET,POST,PUT,DELETE,OPTIONS"
/>
-->
Lastly, the X-Robots-Tag header is added, which disables web search engines from finding installed instances of the
Intel® EMA server.
Note: Intel EMA grants the default IIS DefaultAppPool account read access to the web.config file. If you
change the account that the IIS default application pool will run under, you must also change the access con-
trol accordingly.
C:\Program Files (x86)\Intel\Platform Contains settings for the Platform Manager, including the
Manager\Platform Manager Server\settings.txt port number and password.
C:\Program Files (x86)\Intel\Platform A log for each server component. These are the same log mes-
Manager\EMALogs sages that you can see in the Platform Manager’s Event log.
l EMALog-XXX.txt
l TraceLog-XXX.txt
C:\Program Files\Intel\Ema Agent Install location for 64 bit Intel EMA Agent files. For 32 bit
agent, see Program Files (x86).
Note: Performance can vary greatly from one implementation to another depending on a variety of envir-
onmental factors. The following test result information is provided solely to aid in pre-implementation
decision making and is not intended as any claim of actual performance.
Notes:
l If you are updating from an existing version of Intel EMA, the Intel EMA website’s bindings in IIS will be
set to default values during the update installation. You can check the log files after installation to find
the pre-update bindings for your reference.
l Do not edit the Intel EMA database to manually add a user to the user table. Use the Intel EMA user
interface (either GUI or API) to create all Intel EMA user accounts.
l Installing two separate Intel EMA instances that use the same Intel EMA database is not supported.
Note that this is different from a distributed server architecture installation (described below) in which
an Intel EMA instance's server components are installed on multiple machines.
Notes:
l If you are updating from a previous Intel®
EMA version, an “update mode” dialog is
displayed and a message is logged.
l For assistance, click Help > Intel Support
Notes:
l If you are using a SQL server installed on
the same machine as Intel® EMA then you
can use localhost.
l If you are using a remote SQL server, ensure
the SQL server’s account is set up for your
IIS Default Application Pool to connect.
l For security purposes, we recommend that
Windows authentication mode is used for
SQL Authentication. If using SQL Authentic-
ation, you must ensure the target credential
is set up in the SQL server first.
l For update mode, the fields are filled in and
cannot be changed.
This is the main Intel® EMA website HTTPS URL, and this is
the FQDN/hostname that will be provided in the agent
configuration file for endpoints to connect to, so make
sure that it resolves correctly in DNS.
For Identity mode:
l Use FQDN/hostname only: processes the request
with the FQDN/hostname only. We suggest enter-
ing the addressable, full FQDN.
l Use FQDN/hostname first: processes the request
using the FQDN/hostname, but can also find the
website via the IP Address.
l Use IP address: processes requests with the IP
address only
Note: If Intel EMA will be installed under domain/Windows authentication mode (Kerberos) in the next step,
we recommend using the FQDN of your machine at Hostname field. You still need to ensure that other end-
points or other client web browsers can connect to the value you entered here. If you decide to use another
value, follow IT best practices to set up the Service Principle Name (SPN) after Intel EMA is installed. Choosing
Use IP address does not work for Kerberos.
Note: The following warning appears in the installation log file regardless of whether you are installing with a
local SQL Server or a remote SQL Server. For installations with a remote SQL Server, this message can be
ignored. For local SQL server installations, ensure the the account is set up to allow your IIS Default Applic-
ation Pool to connect.
EVENT: DbWarning, ExecuteNonQuerySafe warning: CREATE LOGIN [IIS
APPPOOL\DefaultAppPool] FROM WINDOWS() - System.Data.SqlClient.SqlException
(0x80131904): User does not have permission to perform this action.
At this point, you are ready to begin using the Intel EMA Server’s Platform Manager, as described in Section 4.
Notes:
l If you are using a SQL server installed on
the same machine as Intel® EMA then you
can use localhost.
l If you are using a remote SQL server, ensure
the SQL server’s account is set up for your
IIS Default Application Pool to connect.
l For security purposes, we recommend that
Windows authentication mode is used for
SQL Authentication. If using SQL Authentic-
ation, you must ensure the target credential
is set up in the SQL server first.
l For update mode, the fields are filled in and
cannot be changed.
Note: If you plan to use domain/Windows authentication mode (Kerberos), you will need to set up a Service
Principle Name (SPN) for the load balancer that supports the Ajax and Web server(s).
2.1.3.7 Summary
Note: The following warning appears in the installation log file regardless of whether you are installing with a
local SQL Server or a remote SQL Server. For installations with a remote SQL Server, this message can be
ignored. For local SQL server installations, ensure the the account is set up to allow your IIS Default Applic-
ation Pool to connect.
EVENT: DbWarning, ExecuteNonQuerySafe warning: CREATE LOGIN [IIS
APPPOOL\DefaultAppPool] FROM WINDOWS() - System.Data.SqlClient.SqlException
(0x80131904): User does not have permission to perform this action.
If you selected the Ajax and Web Server components on the Server Components to Deploy screen above, you need
to modify your IIS settings to set up fixed machine keys. This will allow other Web Servers to use the same keys if
you install additional server components on other virtual or physical machines.
1. In IIS Manager, stop the Default Web Site.
2. In IIS Manager, open your server in the left-hand pane and double-click the Machine Key section under
ASP.NET and set the Encryption method to AES and the Validation method to one of the SHA-2 family meth-
ods (for example, HMACSHA256).
3. Under Actions at right, click Generate Keys to generate the Validation key and the Decryption key. You will
need these keys later when you install additional servers (see Section 2.1.4).
4. Click Apply and then restart the Default Web Site.
At this point, you are ready to install additional Intel EMA servers, as described in Section 2.1.4.
Notes:
l For installing additional servers in
a distributed architecture, use the
same database settings that you
used when performing the initial
server installation (section
2.1.3.1).
l For update mode, the fields are
filled in and cannot be changed.
3. Click Next.
Perform the following steps on the machine (physical or virtual) where you performed the initial server installation
(Section 2.1.3). These steps must be completed before proceeding to the next Setup Wizard screen of the additional
server installation.
5. Once the "Saved .cer file" message is displayed, click Exit to close the dialog, then click File > Exit on the Intel
EMA Server Installer.
Note: The following warning appears in the installation log file regardless of whether you are installing with a
local SQL Server or a remote SQL Server. For installations with a remote SQL Server, this message can be
ignored. For local SQL server installations, ensure the the account is set up to allow your IIS Default Applic-
ation Pool to connect.
EVENT: DbWarning, ExecuteNonQuerySafe warning: CREATE LOGIN [IIS
APPPOOL\DefaultAppPool] FROM WINDOWS() - System.Data.SqlClient.SqlException
(0x80131904): User does not have permission to perform this action.
The following steps are performed on the Server Settings tab of the Intel EMA user interface. See Section 6,
"Appendix - Modifying Component Server Settings" on page 54 for more information about component server
settings.
1. Open a browser and navigate to the URL of the Ajax and Web server load balancer that you configured as part
of you initial server installation. The Intel EMA website user interface is displayed.
2. At the login page, enter the user name and password for the Global Administrator. The Overview page is dis-
played.
3. From the navigation pane at left, select Settings to open the Server Settings page.
4. On the Swarm Server tab, click Add Entry.
5. For Server ID, you will need to review the Intel EMA database, specifically the [dbo].[ServerSettings] table.
The correct Server ID value on this dialog will be the value of ValueInt field in the database table with Type = 2
and for the server Name corresponding to your new additional server.
6. For IP Address and Port, if a Swarm Server was selected for installation on this additional server, enter the
IP Address of the Swarm Server. For the port, enter the port number (e.g., 8089) that is shown in the Admin
2.1.4.9 Modify IIS Settings If Ajax and Web Server Components Installed
If you selected the Ajax and Web Server components on the Server Components to Deploy screen during
additional server installation above, you need to modify your IIS settings to use the fixed machine keys created on the
initial distributed server installation (Section 2.1.3).
1. In IIS Manager, stop the Default Web Site.
2. Double-click the Machine Keys section and set the Encryption method to AES and the Validation method to
one of the SHA-2 family methods (for example, HMACSHA256).
3. Deselect the Generate Keys option, then set the values for the Validation key and the Decryption key to the
values used for the initial distributed server (see Section 2.1.3.8).
4. Click Apply and then restart the Default Web Site.
At this point, you are ready to begin using the Intel EMA Server’s Platform Manager, as described in Section 4.
Note: For updates from previous Intel EMA versions, the installer detects the connection string automatically.
Open a command prompt in Administrator mode in the folder where you unpacked the installation package.
Note: For updates from previous Intel® EMA versions, do not enter the following parameters:dbserver, dbad-
vanced, db, dbuser, dbpass, guser, gpass. Doing so will cause the installation to abort and an error message
to be displayed.
For the connection to the server machine, you can also use the following structure:
--host=<name of FQDN of the server machine > --ip=<IP of the server machine > [--ipfirst|
--hostfirst]
If you want Intel EMA to use the IP to connect first, use the --ipfirst flag. If you want Intel EMA to use FQDN to
connect first, use the --hostfirst flag.
For the database connection, use the following:
If you want to install under “user name/password” mode (i.e., normal account mode), the command line structure
requires you to enter a username and password for the global administrator. These required parameters are identified
as follows:
If you want to install under “domain/window authentication” mode, specify -– domainauth flag and do not enter -
-guser, --gpass.
The example syntax template uses the --console option, so no GUI will be loaded and instead the installer will
show progress on the screen and then return to the command prompt when completed.
At this point, you are ready to begin using the Intel EMA Server’s Platform Manager, as described in Section 4.
The --dbadvanced parameter is used to provide a customized database connection string, which is encrypted and
stored in c:\Program Files (x86)\Intel\Platform Manager\Runtime\MeshSettings\connections.config.
Use the command syntax template below and replace the placeholder values <in brackets> to install using normal
user accounts. For more options including domain authentication, run the executable with the --help option by
itself.
EMAServerInstaller.exe FULLINSTALL --host=<server_fqdn> --dbadvanced= “<connection_
string>” --guser=<global_admin_email> --gpass=<global_admin_password> --verbose --console
--accepteula
For more information about connection strings, see https://docs.microsoft.com/en-
us/dotnet/framework/data/adonet/connection-string-syntax.
Note: For updates from previous Intel® EMA versions, only the accepteula, console (c), and verbose (v) para-
meters are accepted. Do not enter any other parameters for updates. Doing so will cause the installation to
abort and an error message to be displayed.
Note: For updates from previous Intel® EMA versions, only the accepteula, console (c), and verbose (v) para-
meters are accepted. Do not enter any other parameters for updates. Doing so will cause the installation to
abort and an error message to be displayed.
1. Begin the installation on the additional server machine by entering the following command; the installation
will pause in order to consume the files created in the remaining steps. The installer command will pause for
the length of time specified in the --certimeoutseconds option. Note that if --csrfile option is not
provided, the default of .\serversettings.csr will be used (same for the cerfile, but with a .cer extension).
Note: Alternatively, you can run the Intel EMA installer setup wizard on the initial server and click File
> Create Server Settings Cert, as described in Section 2.1.4.4.1.
4. On the initial server, copy the resulting certificate (.cer) file to the additional server machine. Or you can spe-
cify a shared folder accessible by both machines to save the .cer file to in the previous step, as long as you
specify the same location in the --cerfile option of the installer command in step 1 above.
2.3 Uninstalling
Do not abort or exit the installer before the uninstallation is complete.
Notes:
l Before uninstalling, ensure the account used in the Intel EMA SQL connection string has at least db_
creator rights, which allow it to create, modify, and delete any database. This account must also have
the database level roles db_owner, db_datawriter, and db_datareader.
l If you uninstall Intel EMA but do not delete the database, it is recommended that you remove the
machine's IP address from the Server IPs server setting. On the Server Settings page (as a Global
Administrator), select the tab for the component(s) hosted on this machine, then under Server IPs,
select the correct IP address and click Remove Entry. Then click Save and Restart Server. Be sure to
do this for each component on the machine where you uninstalled Intel EMA. See Section 6 "Appendix
- Modifying Component Server Settings" on page 54.
WARNING! If this is a distributed server architecture installation, this option will make the entire Intel
EMA instance unusable. Use this option only if this is the last remaining server.
4. To uninstall and remove the settings certificate, add the --deletesettingscert option.
5. To uninstall and remove the database, add the --deletedb option, shown below (to remove both the set-
tings certificate and the database, use both options).
WARNING! If this is a distributed server architecture installation, this option will make the entire Intel
Note: If you specified domain authentication, the Global Administrator Overview page is automatically dis-
played.
At the right of the Global Administrator Overview page are “Quick links”, which provide shortcuts for the most
common operations. There is also a “Getting Started tips” link to simple tutorials for this user role.
To log out, click the user name in the top bar of the Overview page and select Log out.
Note: The last Global Administrator user cannot remove its account, nor edit it.
To edit a user, go to the Users tab of the Manage Tenants & Users page, click the ellipsis (…) for the target user, and
select Edit....
If you are editing your own user account, in order to change the password, you will need to enter your current
password first. If you are editing other accounts (that your role can manage), you do not need to enter the user’s
current password.
For “locked” users, use the Edit option to unlock the user’s account.
Note: Be sure to change the user account under which the Platform Manager service runs. See Section 1.4.17
for details.
Note: If you are using Windows Authentication, ensure the system running Platform Manager is
joined to the domain, and that the Global Administrator account you are using is logged into the
domain. Otherwise you will be prompted for credentials.
8. The Intel EMA Platform Manager window is displayed, with the application servers shown in the left-hand
pane. If the screen prompts you to Connect, check to ensure you entered a user with Global Administrator
rights in the Connection Credentials dialog.
Note: The trace file will not be present if tracing is not enabled for the selected component server.
l swarmid: Print the this Swarm server's id and the lead Swarm server's id. This is useful when you have mul-
tiple Swarm servers under load balancer. The leader is usually the Swarm server just started recently and with
highest ID.
l agentpingtime: Print the current ping time for maintaining Intel EMA agent TCP connection. If you provide a
numerical argument, it will set the ping time to this value in seconds.
l agentrequireping: Print if we need all the Intel® EMA agents to respond with a pong to a ping sent by the
Swarm server. 1 is true, and 0 is false. If this setting is true, then the Swarm server will drop the agent TCP con-
nection if a pong is not received. If you provide an argument (1 or 0), you can set the value.
l ignoredupagents: By default, this is disabled. When the Intel EMA Swarm server receives an incoming Intel
EMA agent connection, if this connection has an endpoint ID that is the same as an existing connection, then
we will disconnect and remove the existing connection and accept the new one. However, if this is enabled,
we will do nothing and just ignore the new incoming connection. This prints 1 or 0. 1 is true/enabled, and 0 is
false/disabled. If you provide an argument (1 or 0), you can set the value.
l swarmpeers: Print the other peer Swarm servers' IDs and IP addresses.
Note: If you have an older version of Intel EMA, you can use Platform Manager to upload and deploy newer ver-
sions without touching your Intel EMA database. However, if the new release includes Intel EMA database
changes, then you should still use the Intel EMA installer to perform an update.
7. Click Update to update the connection string and close the Update Database Settings dialog.
Note:
l You must restart all Intel EMA component servers (i.e., Swarm Server, .Manageability Server, etc.) in
order for the new connection string to take effect.
l A copy of the previous connection string file c:\Program Files (x86)\Intel\Platform Man-
ager\Runtime\MeshSettings\connections.config is created.
l In a distributed server architecture environment, the connection string must be updated on all Intel
EMA server systems.
IMPORTANT! If you revoke the Intel EMA settings certificate on a single server installation (or on the last
server of a distributed server architecture), you will render the Intel EMA server inoperable. This cannot be
recovered and requires fully reinstalling the Intel EMA server using the installation wizard or the command line
The Intel EMA API provides an API called CRL, which stands for Certificate Revocation List. This API essentially adds a
certificate's serial number to a "blacklist" file of certificates known as a Certificate Revocation List.
To use this API to revoke a server's certificate, consult the Intel® EMA API Guide or review the API documentation
online in Swagger. Then use a tool like "cURL" to issue the CRL API commands at a command prompt window.
Note: The CRL API includes the option to restart the Intel EMA server components automatically (default) or
manually. The automatic option restarts all Intel EMA component servers (Ajax server, Swarm server, etc.),
including the IIS app pool that hosts the Intel EMA website. Note that any other websites in that app pool will
be restarted as well. The automatic option restarts all components on all servers in a distributed server archi-
tecture.
Note: These steps apply to a single server architecture installation. Further information on distributed archi-
tecture restoration is provided at the end of this section.
Please see Section 4 of this guide for information on viewing the log
file, trace file, or events for each of the Intel® EMA component servers.
Intel® EMA Server Installation Error Intel® EMA Platform Manager Package path not set correctly
The installer can find an existing Platform Manager settings file (e.g.,
C:\Program Files (x86)\Intel\Platform Manager\Platform Manager
Server\settings.txt), but cannot find the Intel EMA packages (e.g.,
C:\Program Files (x86)\Intel\Platform Manager\Packages) listed in
that settings file.
To fix:
1. Uninstall the Intel EMA Server, selecting all options.
2. Ensure that Intel EMA Platform Manger is no longer installed
and there is no content in the Intel EMA installation folder
(e.g., C:\Program Files (x86)\Intel\Platform Manager).
3. Re-install the Intel EMA Server.
Intel® EMA Platform Manager Service Like all Windows services, the Intel EMA Platform Manager Service
not starting will timeout if the service takes too long to start (30 seconds by
default). On slow machines, this timeout limit may be reached while
the Intel EMA Platform Manager Service is starting. If this happens
Intel EMA will not work correctly.
Check the status, events, and log of this service:
l In the Windows Services viewer, check to see if it is started
successfully.
Error when trying to access the Intel® Ensure the website is deployed. The website may not be deployed
EMA website due to the package path issue mentioned above.
To fix:
Use Windows IIS Manager to determine the folder of the Intel® EMA
website (click Explore under Actions, top right). In that folder you
should see many subfolders and files.
If not, use the Platform Manager to “sync site” and redeploy the
website.
The target Intel® EMA website URL must If the URL used to access the Intel EMA website does not match the
match the Intel® EMA website’s cer- Issued to field of Intel EMA website certificate, the web browser’s
tificate security filtering will block many features.
To fix:
Ensure Intel EMA URL matches the Issued to field of the certificate.
Warnings and errors during Intel® AMT Depending on the target Intel® AMT firmware’s status, some of the
setup/provision warnings/errors may be transient errors. The Intel EMA Manageability
server will automatically re-try the failed setup periodically. However,
some of the warnings/errors are valid and need to be addressed.
Warning:Error (2):
Intel.Manageability.WSManagement.WSManException:
The underlying connection was closed: The
connection was closed unexpectedly. --->
System.Net.WebException: The underlying connection
was closed: The connection was closed unexpectedly.
If this does not resolve after the Intel® Manageability
Server retries the setup, then shut down the Intel® AMT
machine, unplug the power cable and unplug the
Ethernet cable to reset the Intel® ME firmware. Then
reconnect the cables back and restart the machine.
Intel® AMT operation does not work, but This section applies to the scenario where Intel EMA server is
all other features function correctly installed under Use hostname only mode and the target endpoint is
provisioned with Intel AMT CIRA.
If Intel AMT operation does not work, but all other features work, it is
very likely that the Intel AMT CIRA firmware cannot resolve the
hostname/FQDN entered during Intel EMA server installation.
To fix:
1. Unprovision the target endpoint.
2. With a clean setup and a clean/unprovisioned endpoint, per-
form a CIRA provision and monitor the provision events.
a. To monitor, go to the EMAManageabilityServer’s
Events tab in Platform Manager. Make sure there are
no errors (a few warnings are OK).
b. On the target endpoint, open the Intel® Management
and Security Status Tool and go to the General tab. If
the provision is successful, you should see two
events: Configured and Remote Control Connection
is Enabled.
c. If the provision was successful, continue with the
remaining steps. Otherwise, check the event and logs
of the Intel® Manageability server and fix the issues.
3. On the EMASwarmServer’s Component tab (in Platform Man-
ager), monitor the ConIntelAmt value. This is the number of
active CIRA connections. If you provisioned one endpoint with
CIRA and CIRA successfully established the connection to
Intel EMA Swarm server, this value should be 1. If this number
is not correct, restart the target endpoint and wait for one to
two minutes. If the ConIntelAmt value is still incorrect, con-
tinue with the remaining steps.
4. At this point, Intel AMT CIRA firmware probably cannot
resolve the hostname/FQDN. To verify this, use the fixed IP
address mode to do a provision. If fixed IP address mode
works, then the root cause is due to the name resolution
issue. In that case, consult your IT administrator. Follow these
steps to temporarily use the fixed IP address mode:
a. On the Server Settings page, change the ciraserver_ip
setting of the Manageability server (see "Appendix -
Modifying Component Server Settings" on page 54).
b. Save settings are restart the Manageability server.
5. Unprovision the target endpoint and re-perform the provision.
This time, CIRA will use the IP address you specified above.
Uninstalling Intel® EMA server fails to When uninstalling the Intel EMA server, you may see the
drop the database warning/error: “Unable to drop database.”
Authentication fails intermittently Ensure that all Intel EMA websites in the distributed environment
are using the same machine keys. Verify this using IIS Manager
on each machine where the Intel EMA website is hosted. See Sec-
tion 2.1.3.8.
From one of the machines in a distributed In a distributed environment, if you install Intel EMA under
server architecture installation: Kerberos (Windows Authentication), the Platform Manager client
may have difficulty connecting to the Platform Manager service
l Platform Manager client cannot con-
from one of the distributed server machines. Similarly, you may
nect to the Platform Manager service
have difficulty opening the Intel EMA UI in a browser from one of
-OR-
the distributed server machines.
l Cannot open the Intel EMA UI in a
browser This is due to the Service Principal Name (SPN) for the load
balancer not being configured correctly in Active Directory.
To fix:
To fix this problem, ensure your SPN for the load balancer is
correctly configured.
Also, you can use one of the other server machines' FQDN for the
target URL, not the load balancer's FQDN (the other machine must
have an Ajax or Web server installed). Doing so will allow you to
launch Platform Manager or browse to the Intel EMA website
from one of the server machines in your distributed environment
(i.e., a host managed by the load balancer), regardless of the
SPN configuration for the load balancer.
Note that from all other machines (i.e., systems not managed by
the load balancer), you can simply use the load balancer's FQDN.
Note: If you change the serverIps or messagePort setting for any of the component servers, you must restart
all the component servers, not just the one whose settings you changed (in a distributed server architecture,
you must do this on all server machines). Also, you will need to recycle the Intel EMA web site's IIS application
pool to restart the Intel EMA web server when you change these two settings. For other settings, restarting
only the modified component server will suffice. If you change messagePort, make sure the new port is not
blocked by a firewall.
Admin Port Local Determines if the Admin TCP listener will only bind to the local loopback or not. Values
are 0 and 1.
0 = Single server environment
1 = Distributed-server environment
Audit Log Cleanup Inter- Interval in hours before cleanup of audit log records in the Intel EMA database.
val (Hours)
Audit Log Cleanup Inter- Interval in days before cleanup of audit log records in the Intel EMA database.
val (Days)
enableCIRAPowerPolling Enable periodic CIRA power state polling. Values are True/False. The default is True.
messagePort The TCP port this component server type is listening on to accept internal traffic from
other Intel EMA components. Default 8093.
serverIps List of machine IP addresses where this component server type is running. For example,
if the Swarm server is running on machine ip1, ip2, and ip3, then serverIps will include all
IP addresses.
Ajax Cookie Idle Amount of time, in minutes, from when the cookie is added until it expires.
Timeout
Http Header Access Additional headers to set in response to the Ajax request.
Control Allow Head-
ers
messagePort The TCP port this component server type is listening on to accept internal traffic from other
Intel EMA components. Default 8092.
serverIps List of machine IP addresses where this component server type is running. For example, if the
Ajax server is running on machine ip1, ip2, and ip3, then serverIps will include all
IP addresses.
User Access Failed Number of failed password attempts before user account is locked by the Web API.
Max Count
Expire Sessions Sets whether the Ajax server should expire the session or not (default is enabled).
CIRA Server Host Hostname of the CIRA access server, which is the Swarm Server (or the Swarm Server
load balancer in a distributed architecture). Only used when the installation mode is
using hostname. This is used in multi-server installations.
CIRA Server Port The port of the CIRA access server, which is the Swarm Server (or the Swarm Server
load balancer in a distributed architecture). Used by the load balancer to direct incom-
ing traffic (from CIRA) to the Swarm Server's 8080 port.
messagePort The TCP port this component server type is listening on to accept internal traffic from
other Intel EMA components. Default 8094.
serverIps List of machine IP addresses where this component server type is running. For
example, if the Manageability server is running on machine ip1, ip2, and ip3, then
serverIps will include all IP addresses.
Ajax Server Host Hostname or IP address of the Ajax server, or the load balancer of the Ajax
servers.
Allowed Domains, Enable Allowed Used by the Ajax server. If enabled, the web server checks incoming
Domains Ajax/websocket requests to accept or reject.
AllowedDomains is a comma delimited list with example
test1.intel.com,test2.intel.com.
Swarm Server Host Hostname or IP address of the Swarm server, or the load balancer of the
Swarm servers.
Swarm Server Port 8080 in single server installation or the Swarm server port exposed by the
swarm server load balancer in distributed server architecture.
Global Catalog Port The port used for connecting to the Active Directory Global Catalog. This is
used to perform AD login when AD username and password are provided.
Default is 3269, which is the SSL port.
Max Access Token TTL Maximum time for API bearer tokens to be refreshed.
Frontend Storage Type Allows you to specify whether API bearer tokens should be stored in Local Stor-
age or Session Storage. If Local Storage is used, the session will remain (no
need to login again) after the front end website is closed. If Session Storage is
used, the session is lost when the front end website is closed.
If you decide to use another value (e.g., in a load balancing scenario), follow IT practice to set up the Service Principle
Name (SPN) after Intel® EMA is installed.
Note: This section focuses on configuration for the Intel EMA server system to enable 802.1x usage overall.
For information on configuring an 802.1x profile for a specific Tenant usage space, see the Intel® EMA Admin-
istration and Usage Guide.
To configure NPS as a RADIUS server, you can use either standard configuration or advanced configuration in the
NPS console or in Server Manager. To configure NPS as a RADIUS proxy, you must use advanced configuration.
All of the dependencies listed above must be configured independently of this feature in order for the NPS
deployment to proceed successfully.
4. The Select 802.1X Connections Type panel lets you select the type of network (wired / wireless) connections
that will be authenticated using this policy. Select Wired or Wireless connections, give the policy a name, and
click Next.
5. The Specify 802.1X Switches panel lets you configure one or more RADIUS clients. These devices will route
requests and responses to and from the NPS. Click Add, and in the resulting “New Radius Client”, fill out all of
the applicable information and click OK. Then, click Next.
Important: The shared secret must be the same on both the NPS and RADIUS clients.
6. On the Configure an Authentication Method panel, select the protocol and credential type to use on the
policy. The example in this guide shows the configuration of the EAP-TLS protocol with certificate-based cre-
dentials.
7. Click the Configure button, then select the TLS Certificate presented by the NPS to the supplicants (end-
points) when a connection attempt is received.
Important: The certificate must be issued by a Certification Authority trusted by the endpoint device.
2. To create a new client, click on the section name and then click New. To edit an existing client, double-click
on it.
3. Set the required information, especially the following:
l Address (IP or DNS): This is the address of the Client device that will contact the server.
l Shared secret: Create a passphrase that will be used by the actual RADIUS Client for authentication.
For Wired Ethernet switches, the settings will usually require the following:
l On the RADIUS Server configuration, enter the IP Address or hostname of the RADIUS Server (NPS)
l On the Shared Secret, enter the same secret used to configure the RADIUS server
l Enable the 802.1X configuration for Port Based Authentication
l Configure Port authentication to indicate which ports will authenticate using 802.1X
l Windows Server 2016 Standard with the following servers, services and programs:
l Active Directory Domain Services
l Active Directory Certificate Services
l DHCP Server
l DNS Server
l Internet Information Services
l Network Policy Server
l SQL Server 2016
l Endpoint Management Assistant v1.3.2
l Static IP Address: 192.168.1.2
l Netgear Prosafe GS108T Smart Switch for Ethernet connections
l Netgear AC1200 Smart WiFi Router Model: R6220 for Wireless connections
l Dell Latitude E7270 Intel vPro® capable Intel AMT v11.8.50 as endpoint
b. Add the target Computer object to the new security group. Do this for the machine hosting the man-
ageability server.
Figure 11: Add computer to the new security group
c. Add the new security group to the Security tab of the Organizational Unit where the AD Computer
objects for 802.1X authentication will be created. Ensure that this security group has all available per-
missions allowed, and edit the Advanced Security Settings to apply this group's privileges to “This
object and all descendant objects.”
2. Create a Certificate Template: AMTComputer. This is a duplicate template based on the Workstation
Authentication template.
Figure 16: Certificate Templates list
Figure 21: EAP Types: Microsoft: Smart Card or other certificate properties
2. For 802.1X Configuration: Security > Port Authentication > Basic > 802.1X Configuration, enable 802.1X for
Port Based Authentication.
Figure 23: 802.1X configuration
3. For RADIUS Server configuration: Security > Management Security > RADIUS Server Configuration, add a
configuration for the RADIUS server, indicating the shared secret defined in the NPS RADIUS Client created for
this connection.
Figure 24: RADIUS Server configuration
8.6 Glossary
AAA: Authentication, Authorization, and Accounting.
CA: Certification Authority