Access Manager 4.5: Installation and Upgrade Guide
Access Manager 4.5: Installation and Upgrade Guide
5
Installation and Upgrade Guide
April 2019
Legal Notice
For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.
Government rights, patent policy, and FIPS compliance, see https://www.microfocus.com/about/legal/.
2
Contents
Contents 3
3.3.1 Points to Consider for Installing Identity Server on Windows. . . . . . . . . . . . . . . . . . . . . . . . 59
3.3.2 Installation Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.4 Verifying Identity Server Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.5 Translating Identity Server Configuration Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.5.1 Changing the Port on Windows Identity Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.5.2 Changing the Port on Linux Identity Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
8 Installing Packages and Dependent RPMs on RHEL for Access Manager 111
4 Contents
9.1.3 Uninstalling the Windows Identity Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
9.2 Reinstalling an Identity Server to a New Hard Drive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
9.3 Uninstalling Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
9.3.1 Uninstalling Windows Access Gateway Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
9.3.2 Uninstalling Linux Access Gateway Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
9.4 Uninstalling Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
9.4.1 Uninstalling Linux Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
9.4.2 Uninstalling Windows Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Contents 5
15.3 Updating Security Patches for Access Gateway Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
15.3.1 Updating Linux Access Gateway Service with the Latest OpenSSL Patch. . . . . . . . . . . . . . 159
15.3.2 Updating Windows Access Gateway Service with the Latest OpenSSL Patch . . . . . . . . . . 160
A Configuring Administration Console Ports 9000 and 9001 to Listen on the Specified
Address 179
6 Contents
C Denormalizing SQL Database 183
Contents 7
8
About this Book and the Library
The Installation Guide provides an introduction to NetIQ Access Manager and describes the
installation and upgrade procedures.
Intended Audience
This book is intended for Access Manager administrators. It is assumed that you have knowledge of
evolving Internet protocols, such as:
Extensible Markup Language (XML)
Simple Object Access Protocol (SOAP)
Security Assertion Markup Language (SAML)
Public Key Infrastructure (PKI) digital signature concepts and Internet security
Secure Socket Layer/Transport Layer Security (SSL/TLS)
Hypertext Transfer Protocol (HTTP and HTTPS)
Uniform Resource Identifiers (URIs)
Domain Name System (DNS)
Web Services Description Language (WSDL)
NOTE: Contact [email protected] for any query related to Access Manager SDK.
Environment
Section 1.1, “Deployment Models,” on page 11
Section 1.2, “Access Manager Versus Access Manager Appliance,” on page 13
Section 1.3, “Network Requirements,” on page 18
Section 1.4, “System Requirements,” on page 19
Section 1.5, “Recommended Installation Scenarios,” on page 19
Section 1.6, “Deploying Access Manager on Public Cloud,” on page 21
Section 1.7, “Installing Access Manager Components in NAT Environments,” on page 23
Section 1.8, “Setting Up Firewalls,” on page 28
Section 1.9, “Using Certificates for Secure Communication,” on page 38
Section 1.10, “Protecting an Identity Server Through Access Gateway,” on page 38
For details about these differentiators and other features of Access Manager Appliance, see
Section 1.2, “Access Manager Versus Access Manager Appliance,” on page 13.
LDAP
DMZ User Stores Analytics Server
Firewall 1 Firewall 2
Clustered Identity Servers
L4 Switch
Web Servers
Linux, Mac, or
Windows Administration
Consoles
Clustered
Access Gateways
DMZ
Firewall Firewall
LDAP Analytics
Server Server
Browsers
Administration
Console
L4 Switch
Access Browser for
Internet Administration
Manager
Clients
Appliance
Web Servers
Virtualization Supported on the virtual servers based on Supported on the virtual servers based on
Support SUSE Linux Enterprise Server (SLES) 11 SP4 SLES 12 SP3 or SLES 12 SP4 with 64-bit
with 64-bit operating system x86-64 operating system x86-64 hardware.
hardware.
Host Operating A soft appliance that includes a pre-installed Operating System choice is more flexible.
System and configured SUSE Linux operating Install Administration Console, Identity
system. Server, and Access Gateway on a
supported operating system (SUSE, Red
NetIQ maintains both the operating system Hat, or Windows).
and Access Manager patches through the
patch update channel. The patch update channel maintains
patches for Access Manager.
Component Access Manager components such as Each Access Manager component such as
Installation Administration Console, Identity Server, and Administration Console, Identity Server,
Flexibility Access Gateway cannot be selectively and Access Gateway are installed on
installed or uninstalled. independent host servers.
Scalability and Scales vertically on adding CPU and memory Scales both vertically and horizontally on
Performance resources to each node. adding nodes.
See NetIQ Access Manager Performance See NetIQ Access Manager Performance
and Sizing Guidelines . and Sizing Guidelines .
Upgrade You can upgrade from one version of Access You can upgrade from one version of
Manager Appliance to another version. Access Manager to another version.
However, upgrading from Access Manager However, upgrading from Access Manager
to Access Manager Appliance is not Appliance to Access Manager is not
supported. supported.
Disaster You can use the backup and restore process You can use the backup and restore
Recovery to save your Access Manager Appliance process to save your Access Manager
configuration. configuration.
Time to Value Automates several configuration steps to Requires more time to install and
quickly set up the system. configure as the components are on
different servers.
User Input Access Manager Appliance is a software More flexibility during installation in terms
required appliance that takes only a few basic of selectable parameters.
during parameters as input. Several options
installation assume default values.
Installation The installer takes care of configuration for Separate installation and configuration
and each component. The system is ready for phases for each component.
Configuration use after it is installed.
Phases After installation, each Access Manager
component is separately configured.
Mode of Access Manager Appliance is released as a Access Manager is delivered in the form of
release software appliance. multiple operating system- specific
binaries.
NIC Bonding IP address configuration is done through NIC bonding can be done through the
Administration Console. So, NIC bonding is operating system and Access Manager in
not supported. turn uses this configuration.
Networking: Administration Console and Identity Server Multiple ports need to be opened for
Port Details are accelerated and protected by Access deployment.
Gateways. Only HTTPS port 443 is required
to access Access Manager Appliance
through a firewall.
Certificate Certificate management is simplified. All Changes are required at multiple places to
Management certificates and key stores are stored at one replace or renew certificates.
place making replacing or renewing
certificates easier.
SAML Same certificate is used for all As there are multiple key stores, you can
Assertion communication. (signing, encryption, and configure different certificates for the
Signing transport). communication.
Updating Supports installation of latest SLES You are fully responsible for all operating
Kernel with operating system security patches. system maintenance including patching.
Security
Patches
Clustering For additional capacity and for failover, For additional capacity and for failover,
cluster a group of Access Manager cluster a group of Identity Servers and
Appliances and configure them to act as a configure them to act as a single server.
single server. You can create a cluster of Access
Gateways and configure them to act as a
You can cluster any number of Identity single server. Fault tolerance can be
Servers and Access Gateways, and up to achieved by installing up to two secondary
three of Administration Consoles. The first consoles.
three nodes of Access Manager Appliance
contain Administration Console, Identity To deploy the existing solution in a cluster
Server, and Access Gateway. Fourth mode, at least 6 systems are required.
installation onwards, the node does not
contain Administration Console. A typical Access Manager deployment in a
cluster is described in Figure 1-4.
A typical Access Manager Appliance
deployment in a cluster is described in
Figure 1-3.
Can be clustered.
Cannot be clustered
Identity
Server 1
Access
Gateway 1
Identity
Server 2
Access
Primary Gateway 2
Console
Secondary
Console 1
Secondary
Console 2 Access
Gateway 3
Identity
Server 3
Access
Gateway 4
Identity
Server 4
Can be clustered.
General Guidelines
Adding an Access Gateway Service or Access Gateway Appliance to an Access Manager
Appliance cluster is not possible.
Deploying Administration Console in a DMZ network limits access from a private interface or
network.
It is recommended to not change the primary IP Address of Access Manager. This might result in
corruption of the configuration store. However, you can modify the listening IP address of
reverse proxy or the outbound IP address used to communicate with the web server. For more
information, see Changing the IP Address of Access Manager Devices in the Access Manager 4.5
Administration Guide.
You cannot have different certificates for signing and encryption in a federation setup.
NOTE: Azure Active Directory is supported when Access Manager is deployed on Microsoft
Azure.
Web servers with content or applications that need protection and single-sign on.
Static IP addresses for each machine used for Access Manager components. If the IP address of
the machine changes, Access Manager components installed on that machine will not start.
A domain name server, which resolves DNS names to IP addresses and which has reverse
lookups enabled.
Access Manager devices know each other by their IP addresses, and some requests require
them to match an IP address with the device's DNS name. Without reverse lookups enabled,
these requests fail. In particular, Identity Servers perform reverse lookups to their user stores. If
reverse lookups are not available, host table entries can be used.
Time must be synchronized to within one minute among all components of the configuration
using NTP or similar solution.
IMPORTANT: If time is not synchronized, users cannot authenticate and access resources.
Identity
Server Firewall
Analytics Server
LDAP
Server
Browsers
Router
Administration
Console
Web Servers
LDAP
DMZ User Stores Analytics Server
Firewall 1 Firewall 2
Clustered Identity Servers
L4 Switch
Web Servers
Linux, Mac, or
Windows Administration
Consoles
Clustered
Access Gateways
You can configure end users to communicate with Identity Servers and Access Gateways through
HTTP or HTTPS. You can configure Access Gateways to communicate with web servers through HTTP
or HTTPS. Multiple Administration Consoles provide administration and configuration redundancy.
AWS
VPC
LDAP Web
Userstore Server Load Load
Balancer Balancer
AWS cloud
Internet
Azure
LDAP Web
Userstore Servers Load Load
Balancer Balancer
Internet
IMPORTANT: If time is not synchronized, users cannot authenticate and access resources and
data corruption can also happen in user stores.
An L4 switch if you need to configure load balancing. This can be hardware or software (for
example, a Linux machine running Linux Virtual Services).
IP connectivity is established between different Access Manager components. Because the
components can be in different private networks, you can use NAT, VPNs, or combination of
both to achieve connectivity.
NOTE: The ntpd process must be running to keep the time in sync among devices.
4 Install the primary Administration Consoles by providing the listening IP address for the primary
Administration Console.
For more information about installing Administration Console, see the “Installing
Administration Console on Windows” on page 49.
5 Install the secondary Administration Console and repeat the above procedures for secondary
Administration Console IP address.
6 Continue with Section 1.7.3.2, “Configuring Global Settings,” on page 26 to add both the
primary and secondary Administration Consoles to the Global Settings configuration.
NOTE: If the NAT IP address is not provided or if a mapping exists for the selected
Administration Console IP, a message IP Address is not valid is displayed.
5 Click OK.
Administration Console NAT IP is shared to other Access Manager devices.
Web Servers
The first firewall separates Access Manager from the Internet, allowing browsers to access the
resources through specific ports.The second firewall separates Access Manager components from
web servers they are protecting and from Administration Console.
This section describes the following topics:
Section 1.8.1, “Required Ports,” on page 29
Section 1.8.3, “Sample Configurations,” on page 36
Table 1-2 When a Firewall Separates an Access Manager Component from a Global Service
NTP Server UDP 123 Access Manager components must have time synchronized else
the authentication fails. It is recommended to configure all
components to use an network time protocol (NTP) server.
Depending upon where your NTP server is located, you might
need to open UDP 123, so that Access Manager components
can use the NTP server.
DNS Servers UDP 53 Access Manager components must be able to resolve DNS
names. Depending upon where your DNS servers are located,
you might need to open UDP 53, so that Access Manager
components can resolve DNS names.
Remote Linux TCP 22 If you want to use SSH for remote administration of Access
Administration Workstation Manager components, open TCP 22 to allow.
Remote Windows Configurable If you want to use RDP or VNC for remote administration of
Administration Workstation Access Manager components, open the ports required by your
application from the remote administration workstation to your
Access Manager components. You need to open ports for
console access and for file sharing.
For console access, VNC usually uses TCP 5901 and RDP uses
TCP 3389. For file sharing, UDP 135-139 are the default ports.
Access Gateway, Identity TCP 1443 For communication from Administration Console to devices.
Server
TCP 524 For NCP certificate management with NPKI. Open this port so that
both the device and Administration Console can use the port.
HTTP 2443 For the installer to communicate with Administration Console. You
can close these port after installation is complete.
HTTP 8443
Importing an Access ICMP During an import, Access Gateway Appliance sends two pings
Gateway Appliance through ICMP to Administration Console. When the import has
finished, you can disable the ICMP echo requests and echo replies.
LDAP User Store TCP 524 Required only if the user store is eDirectory. When configuring a
new eDirectory user store, NCP is used to enable Novell
SecretStore by adding a SAML authentication method and storing
a public key for Administration Console. It is not used in day-to-
day operations.
Administration Console TCP 524 Required to synchronize the configuration data store.
Access Gateway TCP 8080 For authentication communication from Access Gateway to Identity
or 8443 Server. The default ports for Identity Server are TCP 8080 and 8443.
They are configurable. You need to open the port that you
configured for the base URL of Identity Server.
Administration Console TCP 1443 For communication from Administration Console to devices. This is
configurable.
TCP 524 For NCP certificate management with NPKI from Identity Server to
Administration Console.
TCP 636 For the secure LDAP communication from Identity Server to
Administration Console.
Identity Server TCP 8443 For HTTPS communication. You can use iptables to configure this
or 443 for TCP 443. See Translating Identity Server Configuration Port.
TCP 7801 For back-channel communication with cluster members. You must
enable the multicast traffic on this port.
LDAP User Stores TCP 636 For secure LDAP communication from Identity Server to the LDAP
user store.
Service Providers TCP 8445 If you have enabled identity provider introductions, open a port to
allow HTTPS communication from the user’s browser to the service
provider.
TCP 8446 If you have enabled identity provider introductions, open a port to
allow HTTPS communication from the user’s browser to the service
consumer.
Browsers TCP 8080 For HTTP communication from a browser to Identity Server. You can
use iptables to configure this for TCP 80. SeeSection 3.5,
“Translating Identity Server Configuration Port,” on page 60.
TCP 8443 For HTTPS communication from a browser to Identity Server. You
can use iptables to configure this for TCP 443. See Section 3.5,
“Translating Identity Server Configuration Port,” on page 60.
CRL and OCSP Servers Configurab If you are using x.509 certificates that include an AIA or CRL
le Distribution Point attribute, you need to open the port required to
talk to that server. Ports 80/443 are the most common ports, but
the LDAP ports 389/636 can also be used.
Active Directory Server TCP 88, For communication with KDC on the Active Directory Server for
with Kerberos UDP 88 Kerberos authentication.
Identity Server TCP For authentication communication from Access Gateway to Identity Server. The
8080 or default ports are TCP 8080 and 8443, which are configurable. You need to open
8443 the port of the base URL of Identity Server.
TCP 80 For communication from Identity Server to ESP of Access Gateway. This is the
or 443 reverse proxy port that is assigned to be ESP (see the Reverse Proxy /
Authentication page). This is usually port 80 or 443.
Administration TCP For communication from Administration Console to Access Gateway. This is
Console 1443 configurable.
TCP For communication from devices to the Syslog server on Administration Console.
1290
TCP 524 For NCP certificate management with NPKI from Access Gateway to
Administration Console.
TCP 636 For secure LDAP communication from Access Gateway to Administration
Console.
Access Gateway TCP For back-channel communication with cluster members. You must enable the
7801 multicast traffic option on this port.
TCP 80 For communication among Embedded Service Providers (ESP) of the Access
or 443 Gateway cluster members. This is the reverse proxy port that is assigned to be
ESP (see the Reverse Proxy /Authentication page). This is usually port 80 or 443.
This port is configurable.
Access Gateway TCP For using the Jetty service on the appliance Configuration console.
Appliance 9090 or
Configuration 9443 For more information about the Configuration console, see Configuring Access
console Gateway Appliance.
(https:// TCP For the Java RMI communication.
<access_gat 1099
eway_applia
nce-IP
address>:94
43)
Browsers/ TCP 80 For HTTP communication from the client to Access Gateway. This is configurable.
Clients
TCP 443 For HTTPS communication from the client to Access Gateway. This is
configurable.
Web Servers TCP 80 For HTTP communication from Access Gateway to web servers. This is
configurable.
TCP 443 For HTTPS communication from Access Gateway to web servers. This is
configurable.
Table 1-6 When a Firewall Separates Analytics Server from Administration Console or any Services
Syslog TCP 1468 For sending Syslog messages from Access Manager
components to Analytics Server.
Control Center TCP 10013 For communicating from a computer to the control
center on Analytics Server.
High availability configuration TCP 7360 For communication between the servers in an
Analytics Server cluster.
NOTE: On SLES, you can use YaST to configure UDP ports and internal networks.
Access Gateway, TCP 1290 Inbound For communication from devices to the Syslog server on
Identity Server Administration Console.
TCP 8443 Inbound For the installer to communicate with Administration Console.
TCP 524 Inbound For NCP certificate management with NPKI. Open this port so
that both the device and Administration Console can use the
port.
Access Gateway TCP 1289 Inbound For importing Access Gateway into Administration Console.
Administration TCP 1443 Inbound For communication from Administration Console to devices.
Console This is configurable.
TCP 524 Inbound For NCP certificate management with NPKI from Identity
Server to Administration Console.
Identity Server TCP 7801 Inbound For the back-channel communication with cluster members.
You must enable the multicast traffic option on this port.
Access Gateway, TCP 8443 Inbound For authentication communication from Access Gateway to
Browsers Identity Server.
Service Providers TCP 8445 Inbound If you have enabled identity provider introductions, open a
port to allow HTTPS communication from the user’s browser
to the service provider.
TCP 8446 Inbound If you have enabled identity provider introductions, open a
port to allow HTTPS communication from the user’s browser
to the service consumer.
Access Gateway TCP 7801 Inbound For back-channel communication with cluster members. You
must enable the multicast traffic option on this port.
Administration TCP 1443 Inbound For communication from Administration Console to Access
Console Gateway. This is configurable.
Identity Server TCP 80 or Inbound For communication from Identity Server to Access Gateway
443 ESP. This is the reverse proxy port that is assigned to be ESP.
Browsers/Clients TCP 443 Inbound For HTTPS communication from workstation browsers to
Access Gateway.
First Firewall
If you place a firewall between browsers and Access Gateway and Identity Server, you need to open
ports so that browsers can communicate with Access Gateway and Identity Server and Identity
Server can communicate with other identity providers.
See, Figure 1-10 on page 28
Port Purpose
For information about redirecting Identity Server to use port 80, see Translating Identity Server
Configuration Port.
For information about redirecting Identity Server to use port 443, see Translating Identity
Server Configuration Port.
TCP 8445 For HTTP Identity Provider introductions. If you do not enable Identity Provider introductions,
you do not need to open this port.
TCP 8446 For HTTPS Identity Provider introductions. If you do not enable Identity Provider introductions,
you do not need to open this port.
Second Firewall
The second firewall separates web servers, LDAP servers, and Administration Console from Identity
Server and Access Gateway. You need the following ports opened in the second firewall:
Port Purpose
TCP 1290 For communication from the devices to the Syslog server installed on Administration
Console. If you do not enable auditing, you do not need to open this port.
TCP 524 For NCP certificate management in NPKI. The port needs to be opened so that both the
device and Administration Console can use the port.
Administration
Browsers Console
In this configuration, you need to open the following ports in the second firewall for Administration
Console and Identity Server:
Ports Purpose
TCP 636 For secure LDAP communication. This is used by Identity Server and Administration Console.
TCP 524 For configuring eDirectory as a new User Store. NCP is used to enable SecretStore by adding a
SAML authentication method and storing a public key for Administration Console. During day-
to-day operations, this port is not used. If your LDAP server is Active Directory or Sun ONE,
this port does not need to be opened.
L4 Switch
Browsers
For configuration details, see Configuring a Protected Identity Server Through Access Gateways in
the Access Manager 4.5 Administration Guide.
Before you start installation, evaluate how you want to implement Access Manager. You can install
components on a single server (excluding Analytics Server) or on separate servers. For more
information, see Chapter 1, “Planning Your Access Manager Environment,” on page 11.
The following is the sequence of installing Access Manager components:
1. Administration Console
2. Identity Server
3. Access Gateway
4. Analytics Server
This section includes the following topics:
Chapter 2, “Installing Administration Console,” on page 43
Chapter 3, “Installing Identity Server,” on page 55
Chapter 4, “Installing Access Gateway,” on page 67
Chapter 5, “Installing Analytics Server,” on page 83
Chapter 6, “Deploying Access Manager on Amazon Web Services EC2,” on page 85
Chapter 7, “Deploying Access Manager on Microsoft Azure,” on page 97
Chapter 8, “Installing Packages and Dependent RPMs on RHEL for Access Manager,” on
page 111
Chapter 9, “Uninstalling Components,” on page 115
Administration Console must be installed before installing any other Access Manager devices. If
iManager is installed for other products, you still need to install this version on a separate server.
Administration Console is installed with an embedded version of eDirectory, which is used as the
configuration store for Access Manager.
For a functioning system, you need Administration Console for configuration and management,
Identity Server for authentication, and Access Gateway for protecting resources.
After you install Administration Console, the installation scripts for other components (Identity
Server and Access Gateway) auto-import their configurations into Administration Console.
This chapter includes the following topics:
Section 2.1, “Installing Administration Console on Linux,” on page 43
Section 2.2, “Installing Administration Console on Windows,” on page 49
Section 2.3, “Logging In to Administration Console,” on page 51
Section 2.4, “Enabling Administration Console for Multiple Network Interface Cards,” on
page 53
For information about installing a secondary Administration Console and fault tolerance, see
Installing Secondary Administration Console in the Access Manager 4.5 Administration Guide.
For information about the requirements, see NetIQ Access Manager System Requirements.
/opt/novell 1 GB
/opt/volera 5 MB
/var/opt/novell 1 GB
/var 512 MB
/usr 25 MB
/etc 1 MB
/tmp/novell_access_manager 10 MB
/tmp 10 MB
/ 512 MB
NOTE: These are the minimum free disk spaces that must be available before installation or
upgrade. However, it is recommended to maintain more than the specified free disk space
based on the requirement of your production environment.
/opt 5 GB
/var 30 GB
/tmp 2 GB
/ 63 GB
(Conditional) For SUSE Linux Enterprise Server (SLES), ensure that the following packages are
installed:
Package Description
perl-gettext, gettext- The required library and tools to create and maintain message catalogs.
runtime
compat Libraries to address compatibility issues. For information about enabling this
repository, see TID 7004701 (http://www.novell.com/support/php/
search.do?cmd=displayKC&docType=kc&externalId=7004701&sliceId=1&doc
TypeID=DT_TID_1_1&dialogID=68926420&stateId=0%200%20130264119)
binutils The required set of tools to create and manage binary programs.
(Conditionally) For manually installing RHEL packages, see Installing Packages and Dependent
RPMs on RHEL for Access Manager.
NOTE: You can select to install these RPMs automatically along with Access Manager
installation. While installing Access Manager, specify N when you get the following prompt:
Enter the local mount directory if you have the OS ISO mounted locally.
This will be used as the local catalog for the additional rpms.
Do you have a locally mounted ISO (y/n)?
The Access Manager installer checks the online catalog and then installs the required RPMs
automatically.
Ensure that the latest net-snmp package from the SLES or RedHat update channel is installed.
Zip and unzip utilities is available for the backup and restore procedure.
Ports 389 and 636 are open.
Static IP addresses.
If the IP address changes after devices have been imported, these devices can no longer
communicate with Administration Console.
The tree for the configuration store is named after the server on which you install
Administration Console. Check the hostname and rename the machine if the name is not
appropriate for a configuration tree name.
Network Requirements
See Section 1.3, “Network Requirements,” on page 18.
IMPORTANT: You cannot install the following software with Administration Console:
OpenLDAP server. If it is installed, uninstall it. If you do not want to uninstall it, ensure that it
does not use the port 636 or does not bind the port 389 to localhost.
The LDAP software such as eDirectory.
What you need to create during installation A username and password for the Administrator.
IMPORTANT: If Administration Console and Identity Server are installed on different servers, both
use 8080 and 8443 ports. If Administration Console and Identity Server are installed on the same
server, Identity Server uses 8080 and 8443 ports and Administration Console uses 2080 and 2443
ports.
1 If you have Red Carpet or auto update running, stop these programs before you install
Administration Console.
2 Verify that the machine meets the minimum requirements. See Prerequisites for Installing
Administration Console on Linux.
3 Open a terminal window.
4 Access the install script as a root user:
4a Ensure that you have downloaded the software.
For software download instructions, see the release-specific Release Notes.
4b If you downloaded the tar.gz file, unzip it by using the following command:
tar -xzvf <filename>
4c Change to the novell-access-manager directory.
5 At the command prompt, specify the following:
./install.sh
Ensure that you have adequate space in the system before you proceed with installation.
6 When you are prompted to install a product, select 1. Install Administration Console and then
press Enter.
The system displays an error message if /var uses BTRFS filesystem and the installation is
terminated. You can change the filesystem from BTRFS to any other available filesystem, and
then try installing.
7 Review and accept the License Agreement.
Novell Base and JDK for NetIQ are installed.
8 (Optional) The installer displays a warning if the host name of the system is mapped to the IP
address 127.0.0.2 in the /etc/hosts file:
An entry of 127.0.0.2 in the /etc/hosts file affects the Access Manager
functionality. Do you want to proceed with removing it (y/n) [y]
NOTE: Administration Console username does not accept special characters # (hash), &
(ampersand), and ()(round brackets).
If you are installing secondary Administration Console, the username must be from the
o=novell container. If the username is from any other container, the Administration
Console installation fails.
NOTE: Administration Console password does not accept : (colon) and " (double quotes)
special characters.
14 Confirm the password, then wait for the system to install components.
This may take several minutes depending on the speed of your hardware.
The following components are installed:
Component Description
Syslog Responsible for packaging and forwarding the audit log entries to the
configured Syslog Server. For more information, see Auditing in the Access
Manager 4.5 Administration Guide.
Tomcat for NetIQ NetIQ packaging of the Java-based Tomcat web server used to run servlets
and JavaServer Pages (JSP) associated with NetIQ Access Manager web
applications.
Device Manager
Identity Server Works in conjunction with Administration Console for managing Identity
Administration Plug-In Server.
Patch Management
Tool
NOTE: Administration Console is accessible on ports 2080 (HTTP) and 2443 (HTTPs) when
Identity Server is installed on the same machine.
5 Restart Tomcat by running the following commands from the Administration Console command
line.
/etc/init.d/novell-ac stop
/etc/init.d/novell-ac start
6 Continue with Section 2.3, “Logging In to Administration Console,” on page 51.
For information about the requirements, see NetIQ Access Manager System Requirements.
The hard disk has ample space for logging in a production environment. This disk space must be
in the local server and not in the remote server.
Static IP address
Ports 389 and 636 are open
For information about browser support, see Browser Support in the NetIQ Access Manager System
Requirements guide.
For information about network requirements, see Section 1.3, “Network Requirements,” on page 18.
What you need to create during installation A username and password for the Administrator.
1 Verify that the machine meets the minimum requirements. See Prerequisites for Installing
Administration Console on Windows.
2 Close any running applications and disable any virus scanning programs.
3 (Conditional) To use a remote desktop for installation, use any one of the following:
Current version of VNC viewer
Microsoft Remote Desktop with the /console switch for Windows XP SP2
Microsoft Remote Desktop with the /admin switch for Windows XP SP3
4 Download the ZIP file and extract it.
For software download instructions and the filename, see the release-specific Release Notes.
5 Double-click the <ZIP filename>.exe file from the extracted folder.
6 Read the introduction, then click Next.
7 Accept the license agreement, then click Next.
8 Select Access Manager Administration Console, then click Next.
If you are installing Identity Server on the same machine, select Access Manager Identity Server.
9 Specify whether this is a primary Administration Console in a failover group, then click Next.
The first Administration Console installed becomes the primary console.
You can install up to three Administration Consoles for replication and failover purposes. If this
is not the primary console, you must provide the IP address for the primary Administration
Console.
10 Specify an administration user ID and password.
NOTE: If you are installing secondary Administration Console, the user ID must be from the
o=novell container. If you specify a user from other container, the installer fails to install
Administration Console.
IMPORTANT: You must restart the server before installing any other Access Manager
components.
15 Continue with “Configuring the Windows Administration Console Firewall” on page 51.
Field Description
Description of service Specify a name. For example, Admin Console Access for port 8080 or
Secure Admin Console Access for port 8443.
4 (Conditional) If you are importing Access Gateway into Administration Console, add the
following ports:
1443
8444
1289
1290
524
636
For specific information about the ports listed in Step 3 and Step 4, see Table 1-3 on page 30.
5 (Conditional) If you are importing an Access Gateway Appliance, click ICMP, select all options,
then click OK > OK.
6 Run the following commands to restart Tomcat:
IMPORTANT: All configuration and management tasks in the Access Manager documentation
assume that you know how to log in to Administration Console.
NOTE: You can provide fault tolerance for the configuration store on Administration Console by
installing secondary versions of the console. See “High Availability and Fault Tolerance” in the Access
Manager 4.5 Administration Guide.
For information about the requirements, see NetIQ Access Manager System Requirements.
If you are installing Access Manager components on multiple machines, ensure that the time
and date are synchronized on all machines.
Ensure that the hard disk has ample space for logging in a production environment. This disk
space must be local and not remote.
Ensure that Administration Console is running. See Installing Administration Console.
Do not perform any configuration tasks in Administration Console during an Identity Server
installation.
If you installed Administration Console on a separate machine, ensure that the DNS names
resolve between Identity Server and Administration Console.
When you are installing Identity Server on a separate machine (recommended for production
environments), ensure that the following ports are open on both Administration Console and
Identity Server:
8444
1443
1289
1290
524
636
For information about how to open ports, see Configuring the Linux Administration Console
Firewall and Configuring the Windows Administration Console Firewall.
You must establish a static IP address for your Identity Server to reliably connect with other
Access Manager components. If the IP address changes, Identity Server can no longer
communicate with Administration Console.
/opt/novell 1 GB
/opt/volera 5 MB
/var/opt/novell 1 GB
/var 512 MB
/usr 25 MB
/etc 1 MB
/tmp/novell_access_manager 10 MB
/tmp 10 MB
/ 512 MB
NOTE: These are the minimum free disk spaces that must be available before installation or
upgrade. However, it is recommended to maintain more than the specified free disk space
based on the requirement of your production environment.
(Conditional) For SUSE Linux Enterprise Server (SLES), ensure that the following packages are
installed
rsyslog-module-gtls
rsyslog
NOTE: You can select to install these RPMs automatically along with Access Manager
installation. While installing Access Manager, specify N when you get the following prompt:
Enter the local mount directory if you have the OS ISO mounted locally.
This will be used as the local catalog for the additional rpms.
Do you have a locally mounted ISO (y/n)?
The Access Manager installer checks the online catalog and then installs the required RPMs
automatically.
gettext
python (interpreter)
IMPORTANT:
No LDAP software, such as eDirectory or OpenLDAP, can be installed. (A default installation of
SLES installs and enables OpenLDAP).
If the OpenLDAP server is installed, uninstall it. If you do not want to uninstall it, ensure that it
does not use the port 636 or does not bind the port 389 to localhost.
Because of library update conflicts, you cannot install Access Manager on a Linux User
Management (LUM) machine.
For information about browser support, see Browser Support in the NetIQ Access Manager System
Requirements guide.
For information about network requirements, see Section 1.3, “Network Requirements,” on page 18.
./install.sh
5 When you are prompted to install a product, specify 2, Install Identity Server, then press Enter.
This selection is also used for installing additional Identity Servers for clustering behind an L4
switch. You need to run this install for each Identity Server you add to the cluster.
NOTE: Administration Console is accessible on ports 2080 (HTTP) and 2443 (HTTPs) if Identity
Server is installed on the same machine.
Component Description
Access Manager Server Enables network communications, including identifying devices, finding
Communication services, moving data packets, and maintaining data integrity.
Identity Server Provides authentication and identity services for the other Access Manager
components and third-party service providers.
Access Manager Server Enables Identity Server to auto-import itself into Administration Console.
Communications
Configuration
NOTE: After installing Identity Server, you must create a cluster configuration. See Configuring
Identity Servers Clusters in the Access Manager 4.5 Administration Guide.
For information about browser support, see Browser Support in the NetIQ Access Manager System
Requirements guide.
For information about network requirements, see Section 1.3, “Network Requirements,” on page 18.
1 (Conditional) If you have installed Administration Console on this server, ensure that you have
restarted the server before installing Identity Server.
2 Download the ZIP file and extract it.
For software download instructions and the filename, see the release-specific Release Notes.
3 Double-click the <ZIP filename>.exe file from the extracted folder.
NOTE: After installing Identity Server, you must create a cluster configuration. See Configuring
Identity Servers Clusters in the Access Manager 4.5 Administration Guide.
Port Forwarding
For both of these configurations (Configuring a Simple Redirect Script and Configuring iptables for
Multiple Components) to work, you must enable port forwarding. To verify whether port forwarding
is enabled, run the following command:
- cat /proc/sys/net/ipv4/ip_forward
NOTE: Do not create the file in the /etc/init.d directory because it may cause some issues.
For information about the issues, see 13.3.3 System V Compatibility (https://www.suse.com/
documentation/sles-12/book_sle_admin/data/sec_boot_systemd_boot.html).
# Environment-specific variables.
IPT_BIN=/usr/sbin/iptables
INTF=eth0
ADDR=10.10.0.1
. /etc/rc.status
case "$1" in
start)
echo -n "Starting IP Port redirection"
$IPT_BIN -t nat --flush
$IPT_BIN -t nat -A PREROUTING -i $INTF -p tcp --dport 80 -j DNAT
--to ${ADDR}:8080
$IPT_BIN -t nat -A PREROUTING -i $INTF -p tcp --dport 443 -j
DNAT --to ${ADDR}:8443
$IPT_BIN -t nat -A OUTPUT -p tcp -d $ADDR --dport 443 -j DNAT -
-to ${ADDR}:8443
$IPT_BIN -t nat -A OUTPUT -p tcp -d $ADDR --dport 80 -j DNAT --
to ${ADDR}:8080
rc_status -v
;;
stop)
echo -n "Flushing all IP Port redirection rules"
$IPT_BIN -t nat --flush
For more information about init scripts for SLES 12, see “Managing Services in a Running
System” (https://www.suse.com/documentation/sles-12/book_sle_admin/data/
sec_boot_systemd_basics.html) in the SLES 12 Administration Guide.
7 Create a systemd service unit at /etc/systemd/system/<unit-name>.service. In this
example unit-name is redirect-idp therefore, the service unit is /etc/systemd/system/
redirect-idp.service.
8 Copy the following code and paste it in the service unit:
[Unit]
Description=Novell AM-IDP-Redirection
After=local-fs.target network.target
[Service]
Type=oneshot
ExecStart=/usr/bin/redirect-idp start
ExecStop=/usr/bin/redirect-idp stop
RemainAfterExit=yes
[Install]
WantedBy=multi-user.target
9 Modify the service unit content as per requirement but ensure that ExecStart and
ExecStop script points to the script that you created in the unit configuration file.
In this example, the scripts must include /usr/bin/redirect-idp.
10 Execute the following commands:
1. systemctl daemon-reload
2. systemctl enable <unit-name>.service
For example, systemctl enable redirect-idp.service
11 Reboot the Identity Server machine.
12 Verify that port 443 is being routed to Identity Server by running the following command:
NOTE: Port forwarding must be enabled for this configuration to work. See Port Forwarding.
FW_CUSTOMRULES="/etc/sysconfig/scripts/SuSEfirewall2-custom"
4b Save the changes and exit.
5 Open the /etc/sysconfig/scripts/SuSEfirewall2-custom file in an editor.
This is the custom rules file you specified in Step 4.
6 Add the following lines under the fw_custom_before_port_handling() section:
You can install Access Gateway in one of the following two modes:
Appliance: Operating system is installed with Access Gateway software.
Service: Access Gateway installed on a machine with an existing operating system.
Most differences between Access Gateway Appliance and Access Gateway Service result from the
differences required for an appliance and for a service. An appliance can know, control, and
configure many features of the operating system. A service that runs on top of an operating system
can query the operating system for some information, but it cannot configure or control the
operating system. For the service, operating system utilities must be used to configure system
parameters and hardware. For the appliance, the operating system features that are important to
the appliance, such as time, DNS servers, gateways, and network interface cards, can be configured
in Administration Console.
This table describes the differences between Access Gateway Appliance and Access Gateway
Service. Only your network and web server configurations can determine whether the differences
are significant.
Date and time Configurable from Administration Console. Configurable with standard
operating system utilities.
Cache directory Uses Apache-caching. The cached files are Uses filesystem provided by the
stored in clear text. The operating system Apache mod_cache module.
must be configured to protect this directory.
For more information about the
For more information about the Apache Apache model, see “Caching
model, see “Caching Guide”. Guide”.
Partition Requirements
Type
root This partition is 40% of available disk space. It contains the boot files, system files, and log
files. This space should be more than 40 GB.
swap This partition is twice the size of RAM installed on the machine.
var The remaining space is allocated for this partition, which should be more than 50 GB. This
partition is used for log files and caching objects of Access Gateway.
NOTE: If the production environment requires more space for logging the data, you must
provide additional disk space before configuring Access Gateway Appliance. You cannot add the
hard disk space after configuring Access Gateway Appliance. For information about using the
additional hard disk, see “Using Additional Hard Disk” on page 75.
This section provides the following information about how to install Access Gateway Appliance:
Section 4.2.2.1, “Prerequisites,” on page 70
Section 4.2.2.2, “Installing Access Gateway Appliance,” on page 70
4.2.2.1 Prerequisites
Ensure that the server meets the minimum hardware requirements. See Section 4.2.1,
“Prerequisites for Installing Access Gateway Appliance,” on page 69.
If you want to try any advanced installation options such as driver installation or network
installation, see the SUSE Linux Enterprise Server 12 Installation Guide (https://www.suse.com/
documentation/sles-12/book_sle_deployment/data/book_sle_deployment.html).
Field Description
NTP Server Specify the name of the primary and secondary NTP server.
4 Specify the hostname for the Access Gateway Appliance server and click Next.
5 Specify the following network setting details:
Field Description
DNS Server The IP address of your DNS server. You must configure at least one DNS server.
Specify the IP address of your additional DNS server, if you have configured. This is
an optional configuration.
NOTE: If you are using an existing IP address of Access Gateway Appliance and it uses a multiple NIC
card in your cluster set up, ensure to configure the primary IP addresses for all the interfaces before
configuring Access Gateway Appliance.
Also, ensure that you provide the IP address in the same order to the interfaces as it is in the existing
Access Gateway Appliance.
You can use the following configuration options in the console based on your requirement:
Section 4.2.3.1, “Managing Digital Certificates,” on page 71
Section 4.2.3.2, “Setting Administrative Passwords,” on page 74
Section 4.2.3.3, “Performing an Online Update,” on page 75
Section 4.2.3.4, “Using Additional Hard Disk,” on page 75
Section 4.2.3.5, “Performing a Product Upgrade,” on page 75
Section 4.2.3.6, “Rebooting or Shutting Down the Appliance,” on page 75
IMPORTANT: You can manage the certificates only for the Access Gateway Appliance (port 9443).
Access Gateway Appliance is shipped with a self-signed digital certificate. Instead of this self-signed
certificate, it is recommended to use a trusted server certificate signed by a trusted CA, such as
Digicert or Equifax.
To use and activate the digital certificate, perform the following tasks:
“Using the Digital Certificate Tool” on page 72
“Using an Existing Certificate and Key Pair” on page 73
“Activating the Certificate” on page 74
NOTE: vaadmin helps in managing virtual-machine-level settings and service configurations that
affect an entire service and its interactions with other services.
On the Administrative Passwords page, the vaadmin user can change the vaadmin user password
and root user can change the root password. Perform the following steps to change the password:
IMPORTANT: SLES installation libraries may be distributed across multiple CDs or DVDs. In
YaST > Software > Software Repositories select the required CD or DVD to install the
rpm files. If the rpm files are not available on the SLES server, the Access Manager
installation process takes care of installing these rpm files from the SLES repository.
To search if an rpm is installed, use rpm -qa | grep <rpm name>. For example, rpm
- qa | grep libapr-util.
(Conditional) For installing the RHEL packages manually, see Appendix 8, “Installing Packages
and Dependent RPMs on RHEL for Access Manager,” on page 111.
NOTE: You can select to install these RPMs automatically along with Access Manager
installation. While installing Access Manager, specify N when you get the following prompt:
Enter the local mount directory if you have the OS ISO mounted locally.
This will be used as the local catalog for the additional rpms.
Do you have a locally mounted ISO (y/n)?
The Access Manager installer checks the online catalog and then installs the required RPMs
automatically.
2 to10 GB hard disk space per reverse proxy that requires caching and for log files. The amount
varies with rollover options and logging level that you configure.
/opt/novell 1 GB
/opt/volera 5 MB
/var/opt/novell 1 GB
/var 512 MB
/usr 25 MB
/etc 1 MB
/tmp/novell_access_manager 10 MB
/tmp 10 MB
/ 512 MB
NOTE: These are the minimum free disk spaces that must be available before installation or
upgrade. However, it is recommended to maintain more than the specified free disk space
based on the requirement of your production environment.
A static IP address and a DNS name. The ActiveMQ module of Access Gateway Service must be
able to resolve the machine’s IP address to a DNS name. If the module can’t resolve the IP
address, the module does not start.
Other Access Manager components should not be installed on the same machine.
For information about network requirements, see Section 1.3, “Network Requirements,” on page 18.
NOTE: Access Gateway Service clustering is supported for devices that are on the same operating
system.
1 Log in to the NetIQ Customer Center and follow the link that allows you to download software.
For an evaluation version, download the media kit from NetIQ Downloads.
2 Copy the file to your machine.
For the filename, see the release-specific Release Notes.
3 Prepare your machine for installation:
IMPORTANT: (Applicable for RHEL) When you configure more than 60 proxy services, Apache fails to
start. RHEL has 128 semaphore arrays by default which is inadequate for more than 60 proxy
services. Apache 2.4 requires a semaphore array for each proxy service.
You must increase the number of semaphore arrays depending on the number of proxy services you
are going to use. Perform the following steps to increase the number of semaphore arrays to the
recommended value:
1. Open /etc/sysctl.conf
2. Add kernel.sem = 250 256000 100 1024
This creates the following:
Maximum number of arrays = 1024 (number of proxy services x 2)
Maximum semaphores per array = 250
Maximum semaphores system wide = 256000 (Maximum number of arrays x Maximum
semaphores per array)
Maximum ops per semop call = 100
3. Use command sysctl -p to update the changes.
4. Start Apache.
For information about network requirements, see Section 1.3, “Network Requirements,” on page 18.
For prerequisites, see “Prerequisites” on page 70.
NOTE: Access Gateway Appliance uses the mod_cache module filesystem provided by Apache
for storing the caching objects. If you want to change the size of this cache after installation, see
TID on Changing the Cache Size of an Access Gateway Appliance after Installation.
C:\Program Files\Novell\log
16 Click Next > Done.
17 To verify that Access Gateway Service imported into Administration Console, wait for few
minutes, log in to Administration Console, then click Devices > Access Gateways.
At this point, Access Gateway Service is not configured.
18 Continue with one of the following:
“Verifying Access Gateway Installation” on page 80
Configure Access Gateway. See Configuring Access Gateway in the Access Manager 4.5
Administration Guide.
Install another Access Manager component.
NOTE: Access Gateway Appliance health is displayed as green instead of yellow, even before a
trust relationship is established between an Embedded Service Provider and Access Gateway.
You must establish a trust relationship with Administration before you proceed with any other
configuration.
If an Access Gateway starts to import into Administration Console but fails to complete the
process, the following message appears:
IMPORTANT: Before installing the new Analytics Server, ensure to delete Analytics Server nodes of
the earlier version from Administration Console.
What you need to know to Username and password of the Administration Console administrator.
install Analytics Server Install Administration Console and Analytics Server on separate servers.
Do not perform any configuration tasks in Administration Console
during the installation.
/opt 5 GB
./ar_install.sh
5 Specify the IP address, user ID, and password of the primary Administration Console.
6 Re-enter the password for verification. Analytics Server installation starts.
If the installation program rejects credentials and IP address, ensure that the required ports are
open on both Administration Console and Analytics Server.
7 Verify the installation. You can check the logs in /tmp/novell_access_manager/
install_ar_.
Perform the same steps after installing the third node. Update one device at a time from top to
down and wait for the Elasticsearch database server’s health to turn green and then refresh other
servers for the update.
If the server does not come up, click Restart to bring all services up and running, and then manually
click Refresh for each service.
After all servers’ health turn green, the cluster is ready for use.
NOTE: Deployment of Access Gateway Appliance and Analytics Server is not supported on AWS EC2.
IMPORTANT: The LDAP server and web services must be deployed in the public clouds along with
Identity Server and Access Gateway.
A VPN connection from Identity Server and Access Gateway in the public cloud to the LDAP user
store and web servers in the on-premises deployments is not supported.
Service Steps
VPC 1. Click Services > VPC under Networking & Content Delivery.
2. Click Start VPC Wizard.
3. Select a VPC configuration type and click Select.
4. Specify the details in the form, and then click Create VPC.
This creates a private network of the specified size. VPC and subnet creation use
the CIDR notation for address ranges. The largest VPC size is a /16 network.
For more information, see the Amazon Virtual Private Cloud Documentation (https://
aws.amazon.com/documentation/vpc/).
IMPORTANT: Creating a VPC using Start VPC Wizard creates Subnets, Internet gateways, and Route
table for the VPC. You can view or edit these items as follows:
Field Action
IMPORTANT: You can connect to and manage your instances only using the private key.
Therefore, do not lose the private key after downloading it.
Installation Procedure
Perform the following steps to install Access Manager components on the respective instances:
In the following steps, run the Access Manager installation scripts as a root user using sudo. For
example, sudo sh <script-name>.
1 Copy the novell-access-manager-<version>.tar.gz file using Secure Copy (scp) to the
instances on which you will install Administration Console and Identity Server.
The following is a sample scp command that shows how to copy the installer using the SSH key
and username specified while creating the instance:
scp -i <keyname> <path&name_of_file_to_copy> ec2-user@<instance_ip>:/
<directory>
2 Copy the novell-access-gateway-<version>.tar.gz file to the instance on which you
will install Access Gateway.
3 Install Administration Console, Identity Server, and Access Gateway on the respective instances.
For information about how to install these components, see Installing Administration Console
on Linux, Installing Identity Server on Linux, and Installing Access Gateway Service on Linux.
IMPORTANT: While installing Identity Server and Access Gateway, specify the internal IP
address of the Administration Console machine. This ensures that communications among
machines happen inside the firewall.
IMPORTANT: For each load balancer, you need to create two target groups: one for HTTP and one
for HTTPS.
For more information about target groups, see Target group (http://docs.aws.amazon.com/
elasticloadbalancing/latest/application/load-balancer-target-groups.html).
Perform the following steps to create a target group:
1 In the EC2 Dashboard, click Target Groups under LOAD BALANCING.
2 Click Create target group.
3 Specify the following details:
Field Description
Port Specify the port on which the server is configured for listening.
IMPORTANT: You need to create two separate target groups for each load
balancer, one for HTTP and one for HTTPS.
You can use iptables to configure the listeners on Identity Server to use other
ports. See Section 3.5, “Translating Identity Server Configuration Port,” on
page 60.
VPC Select the same VPC that you have selected for the instances of Access
Manager components.
Protocol When creating a target group for the HTTPS protocol, select HTTPS.
When creating a target group for the HTTP protocol, select HTTP.
The load balancer uses this protocol while performing health checks.
4 Click Create.
5 Enable session stickiness.
5a Select the target group you have created.
5b In the Description tab, click Edit attributes.
5c Select Enable for Stickiness.
6 Add the IP addresses of instances (targets) among which load will be distributed.
6a In the edit mode, select the Targets tab, and then click Edit.
6b Click the + (Register targets) icon.
6c Specify the following details:
Field Description
Network Populated with the VPC that you have selected under VPC in Step 3.
Port Populated with the port value that you have specified for Port in Step 3.
Field Description
Availability 1. Select the same VPC that you have created earlier for Access Manager
Zones components.
2. Select the Availability Zone in which Access Manager instances are available.
The load balancer routes traffic to the targets in the specified Availability Zones
only.
3. Select the Subnet where the Access Manager component, for which you are
configuring this load balancer, is available.
4. In Elastic IP, select the elastic IP address you created for this load balancer in
“Creating an Elastic IP Address” on page 92.
Field Description
You can select only one target group. For example, select the target group that you
have created for the HTTP protocol.
After creating the load balancer, you need to modify the listener port 8443 to use the
target group that is configured for the HTTPS protocol. See Step 12 of this section.
Protocol Populated with the value that you have configured in the specified target group.
Review to ensure that the value is listed correctly.
Port Populated with the value that you have configured in the specified target group.
Review to ensure that the value is listed correctly.
Target type Populated with the value that you have configured in the specified target group.
Review to ensure that the correct value is listed.
Field Description
Protocol Populated with HTTPS or HTTP based on the configuration of the target group you
selected in Step 6. See “Creating Target Groups” on page 90.
Path Populated with the health URL that you configured in the target group selected in
Step 6. See “Creating Target Groups” on page 90.
NOTE: For scaling recommendations, see Recommendations for Scaling Access Manager
Components in Public Cloud.
Benefits
Detects a non-responding instance, terminates it, and replaces it with a new one.
Adds instances only when needed and scales across purchase options to optimize performance
and cost.
Ensures that the application always has the appropriate amount of compute and provisions it
with predictive scaling.
For more information, see Amazon EC2 Auto Scaling (https://aws.amazon.com/ec2/
autoscaling/).
For more information about deploying Access Manager auto scaling on AWS, see Sample Auto
Scaling Deployment of Access Manager on AWS (https://www.netiq.com/documentation/access-
manager-45-developer-documentation/aws-autoscaling/data/aws-autoscaling.html).
Watch the following video to understand how the auto scaling of Access Manager works in AWS:
http://www.youtube.com/watch?v=IJYx3qbA1gQ
Watch the following video to understand the configuration of Access Manager auto scaling in AWS:
http://www.youtube.com/watch?v=X7OwBHuQFmU
Azure
You can deploy the following Access Manager components as services on Azure:
Administration Console
Identity Server
Access Gateway
NOTE: Deployment of Access Gateway Appliance and Analytics Server is not supported on Azure.
IMPORTANT: While creating services, (such as availability set, virtual network, security groups,
instances, and load balancers), ensure to specify the same value for Location.
NOTE: All administrators may not have rights to create a new resource group.
3 Create or determine an existing Availability Set for use with Access Manager.
3f Click Create.
4 Create or determine a Virtual Network for use with Access Manager.
For this example configuration, all Access Manager components use the same virtual network.
4a In the Azure portal, click New.
4b Search for virtual network and select Virtual Network.
4c Click Create.
4d Configure the required network settings, such as Name, Subscription, Resource group,
Location, Address Space, Subnet name, and Subnet address range.
The following is an example configuration:
Name: NAM-subnet1
Address space: 10.10.10.0/24
Subnet name: default
Subnet address range: 10.10.10.0/24
4e Click Create.
5 Continue with Section 7.2.2, “Creating and Deploying Virtual Machines,” on page 99.
NOTE: If you are using Azure Active Directory as the user store, deploy virtual machines only for
Access Manager components. Azure hosts and manages Azure Active Directory as a service on the
cloud.
Field Description
This selection affects the list of templates displayed for selection in Step 8.
User name Specify the name of the account that you want to use for administering the
virtual machine.
This username is used for ssh access to the virtual machine after deployment.
SSH public key Copy the content of your id_rsa.pub file that you have generated earlier,
and paste it.
Subscription Select the Azure subscription that should be used for the virtual machine.
Resource group Select the resource group that you have created or determined in Step 2.
Location Select from the list of the supported Azure location where you want to create
the virtual machine.
7 Click OK.
8 In 2 Size, click View all to see all available templates.
You can filter this list based on disk type, vCPU, and memory.
Each template has its own intended use cases, optimizations, and costs per hour of usage.
Click a template that matches your requirements and the requirements of the Access Manager
component that will later be installed on this virtual machine.
NOTE: You must select a virtual machine size of the Standard type if you require to configure an
Azure load balancer later.
9 Click Select.
Section Action
High Availability While deploying a virtual machine for identity Server or Access Gateway,
select the appropriate availability set that was created for each type in Step 3.
For clustering and load balancing, place Identity Server virtual machines in
one availability set and Access Gateway virtual machines in a different
availability set.
Storage keep the default value Yes for Use managed disks.
Network > Virtual Click Virtual network and select the virtual network that you created in
network Step 4.
Network > Public IP Configure the Public IP Address for this virtual machine or you can keep the
Address default selection (dynamic addressing).
(Optional) If you do not specify a static address (adds an additional cost), the external IP
address used to reach each virtual machine changes with each reboot.
Network > Network Accept the default network security group to allow incoming SSH access
Security Group requests to the virtual machine used for Access Manager.
(firewall)
The instructions to further configure these security groups are in a later
section of the guide.
This script shuts down Access Manager safely prior to the Azure Auto-
Shutdown happens.
Monitoring Disable Boot diagnostics and Guest OS diagnostics if you do not want to
monitor for those options.
You can change these settings later if you need these functionalities.
11 Click OK.
12 In 4 Summary, review the summary of settings, terms of use, privacy policies, and cost of use.
13 Click Create.
Azure begins provisioning the virtual machine as you have configured it. This process may take a
few minutes.
14 Verify SSH access to the virtual machine after deployment completes by running the following
command:
ssh -i <keyfile> <username>@<publicIP>
Where,
<keyfile>: The name of the certificate file created with ssh-keygen.
<username>: The User name specified in Step 6 on page 100 while deploying the virtual
machine.
<publicIP>: The public IP address assigned to the virtual machine. You can view this in the
dashboard by clicking the virtual machine.
15 Repeat Step 1 to Step 14 to create additional virtual machines.
16 Continue with Section 7.2.3, “Configuring Network Security Groups,” on page 102.
Field Value
Source Any
Destination Any
Protocol TCP
Action Allow
Priority 100
5 Repeat Step 3 and Step 4 for each inbound port rule to be added as listed in Table 1-7,
“Administration Console on Cloud,” on page 34, Table 1-8, “Identity Server on Cloud,” on
page 34, and Table 1-9, “Access Gateway on Cloud,” on page 35, depending on the component
type that will use this network security group.
6 Continue with Section 7.2.4, “Changing the Private IP Address from Dynamic to Static,” on
page 103.
IMPORTANT: In the following steps, run the Access Manager installation scripts as a root user using
sudo. For example, sudo sh <script-name>.
IMPORTANT: While installing Identity Server and Access Gateway, specify the internal IP
address of the Administration Console machine. This ensures that communications among
machines happen inside the firewall.
NOTE: For scaling recommendations, see Appendix B, “Recommendations for Scaling Access
Manager Components in Public Cloud,” on page 181.
IMPORTANT: Before creating a load balancer for an Access Gateway cluster, complete the steps
available in To Create a Reverse Proxy for Health Probe.
Public IP address Create a new public IP address for this load balancer.
1. Click >.
2. Click Create new.
3. Specify a name.
4. Select Static.
5. Click OK.
Subscription Select the same Azure subscription that you have selected for virtual machines
on which Access Manager is installed.
Resource group Select the same resource group that you have selected for virtual machines on
which Access Manager is installed.
Location Select the same location that you have used for virtual machines.
4 Click Create.
5 Continue with “Configuring a Load Balancer” on page 106.
Frontend IP configuration
By default, this setting takes the IP address you have configured in Public IP address while creating
the load balancer.
You can create and select another IP address if you need to change this frontend IP address.
Backend pools
This setting provides a way to associate the load balancer to the IP addresses of virtual machines
among which you want to distribute the load.
Health Probes
The load balancer uses probes to keep track of the health of virtual machines. If a probe fails, the
related virtual machine is excluded from the load balancing automatically.
Perform the following steps to configure a health probe:
1 Click Health probes.
2 Click Add.
3 Specify a name.
Field Description
Port For Identity Server listening on the default ports of 8080/8443, specify 8080.
For Access Gateway, specify the port that you have configured in the reverse
proxy for health probe. See “To Create a Reverse Proxy for Health Probe” on
page 109.
IMPORTANT: You must configure these ports in network security groups associated
with the respective Access Manager component’s cluster.
Interval Specify the time after which the load balancer verifies the health of the virtual
machine.
Unhealthy Specify the number. If the health probe fails for the specified number consecutively
threshold for a virtual machine, then the load balancer removes it automatically from the load
distribution.
5 Click OK.
Field Description
IMPORTANT: If you want the load balancer to handle both HTTP and HTTPS traffic, create a separate
rule for both by specifying appropriate ports in Port and Backend port.
The port configured in Port and Backend port must match the listening port configured in Identity
Server or Access Gateway.
For an Identity Server listening on the default ports of 8080/8443, specify the
following values:
For HTTPS traffic, specify 8443.
For HTTP traffic, specify 8080.
For an Identity Server listening on the default ports of 8080/8443, specify the
following values:
For HTTPS traffic, specify 8443.
For HTTP traffic, specify 8080.
4 Click OK.
Field Description
Proxy Service Name Specify a name that identifies the purpose of this proxy service.
6 Click OK.
7 On the Reverse Proxy page, click the new proxy service under Proxy Service List, and then click
Web Servers.
8 Change the Connect Port value to 9009.
The service provider (ESP) in Access Gateway that provides the heartbeat service listens on
127.0.0.1:9009.
9 Click Protected Resources.
10 Click New, specify a name and click OK.
11 In URL Path List, click /*, and modify the path to contain the following value:
/nesp/app/heartbeat
This is the path to the heartbeat application.
12 Click OK > OK.
13 Click OK and apply the changes to the configuration.
IMPORTANT: You do not need to manually install the RPMs listed in Table 8-1 if the RHEL
subscription is available. The install script takes care of installing required RPMs from the RHEL
subscription.
Important Points to Consider before Installing RHEL Packages and Dependent RPMs
If you require to manually install the RPMs before the installation, you must consider the following
points:
You must install the RHEL Enterprise Server-with-GUI. Run the sudo yum groupinstall
"Server with GUI" command to obtain the required RPMs.
To avoid RPM dependency issues, NetIQ Corporation recommends installing the package along
with its respective dependent RPMs. You can also install all packages together in the same
sequence as these appear in Table 8-1.
The version of RPMs varies based on the base operating system version of RHEL. Table 8-1 lists
RPMs for RHEL 7.6.
You must install these RPMs in the same sequence as they appear in Table 8-1.
iManager
glibc-2.17-260.el7.i686.rpm nss-softokn-freebl-3.36.0-5.el7_5.i686
libstdc++-4.8.5-36.el7.i686.rpm glibc-2.17-260.el7.i686.rpm
libstdc++-4.8.5-36.el7.x86_64.rpm glibc-2.17-260.el7.x86_64.rpm
libstdc++-4.8.5-36.el7.i686 glibc-2.17-260.el7.i686
libgcc-4.8.5-36.el7.i686
Installing Packages and Dependent RPMs on RHEL for Access Manager 111
Package Dependent RPM
libstdc++-4.8.5-36.el7.x86_64 libgcc-4.8.5-36.el7.x86_64
libXau-1.0.8-2.1.el7.x86_64.rpm glibc-2.17-260.el7.i686.rpm
libxcb-1.13-1.el7.x86_64.rpm glibc-2.17-260.el7.i686.rpm
libXau-1.0.8-2.1.el7.x86_64.rpm
libX11-1.6.5-2.el7.x86_64.rpm glibc-2.17-260.el7.i686.rpm
libXau-1.0.8-2.1.el7.x86_64.rpm
libXext-1.3.3-3.el7.x86_64.rpm libX11-1.6.5-2.el7.x86_64.rpm
glibc-2.17-260.el7.i686.rpm
libXi-1.7.9-1.el7.x86_64.rpm libX11-1.6.5-2.el7.x86_64.rpm
libXext-1.3.3-3.el7.x86_64.rpm
glibc-2.17-260.el7.i686.rpm
libXtst-1.2.3-1.el7.x86_64.rpm libX11-1.6.5-2.el7.x86_64.rpm
libXext-1.3.3-3.el7.x86_64.rpm
libXi-1.7.9-1.el7.x86_64.rpm
glibc-2.17-260.el7.i686.rpm
libxcb-1.13-1.el7.x86_64.rpm libXau-1.0.8-2.1.el7.x86_64.rpm
libX11-1.6.5-2.el7.x86_64.rpm libxcb-1.13-1.el7.x86_64.rpm
libXtst-1.2.3-1.el7.x86_64.rpm libX11-1.6.5-2.el7.x86_64.rpm
libXi-1.7.9-1.el7.x86_64.rpm
libXext-1.3.3-3.el7.x86_64.rpm
libXrender-0.9.10-1.el7.x86_64.rpm No dependency
Administration Console
gettext-0.19.8.1-2.el7.x86_64 No dependency
glibc-2.17-260.el7.i686.rpm nss-softokn-3.36.0-5.el7_5.x86_64.rpm
libstdc++-4.8.5-36.el7.i686.rpm glibc-2.17-260.el7.i686.rpm
libgcc-4.8.5-36.el7.i686.rpm
ncurses-libs-5.9-14.20130511.el7_4.i686.rpm glibc-2.17-260.el7.i686.rpm
libgcc-4.8.5-36.el7.i686.rpm No dependency
rsyslog-8.24.0-34.el7.x86_64 No dependency
rsyslog-gnutls-8.24.0-34.el7.x86_64 No dependency
binutils-2.27-34.base.el7.x86_64 No dependency
gperftools-libs-2.4-8.el7.x86_64 No dependency
ntp-4.2.6p5-28.el7.x86_64 No dependency
112 Installing Packages and Dependent RPMs on RHEL for Access Manager
Package Dependent RPM
Identity Server
glibc-2.17-260.el7.i686.rpm nss-softokn-3.36.0-5.el7_5.x86_64
libstdc++-4.8.5-36.el7.i686 glibc-2.17-260.el7.i686.rpm
libgcc-4.8.5-36.el7.i686.rpm
ncurses-libs-5.9-14.20130511.el7_4.i686.rpm glibc-2.17-260.el7.i686.rpm
libgcc-4.8.5-36.el7.i686.rpm No dependency
rsyslog-8.24.0-34.el7.x86_64 No dependency
rsyslog-gnutls-8.24.0-34.el7.x86_64 No dependency
binutils-2.27-34.base.el7.x86_64 No dependency
ntp-4.2.6p5-28.el7.x86_64 No dependency
Access Gateway
glibc-2.17-260.el7.i686.rpm nss-softokn-freebl-3.16.2.3-14.4.el7.i686
apr-1.4.8-3.el7_4.1.x86_64.rpm glibc-2.17-260.el7.i686.x86_64.rpm
apr-util-1.5.2-6.el7.x86_64.rpm apr-1.4.8-3.el7_4.1.x86_64.rpm
glibc-2.17-260.el7.x86_64.rpm
libtool-ltdl-2.4.2-22.el7_3.x86_64.rpm glibc-2.17-260.el7.x86_64.rpm
unixODBC-2.3.1-11.el7.x86_64.rpm libtool-ltdl-2.4.2-22.el7_3.x86_64.rpm
glibc-2.17-260.el7.x86_64.rpm
libesmtp-1.0.6-7.el7.x86_64.rpm glibc-2.17-260.el7.x86_64.rpm
rsyslog-8.24.0-34.el7.x86_64 No dependency
rsyslog-gnutls-8.24.0-34.el7.x86_64 No dependency
binutils-2.27-34.base.el7.x86_64 No dependency
patch-2.7.1-10.el7_5.x86_64.rpm No dependency
ntp-4.2.6p5-28.el7.x86_64 No dependency
Perform the following steps to install packages and their dependent RPMs while installing RHEL:
1 Mount the RHEL CD-ROM by running the following command and go to the Packages folder.:
Installing Packages and Dependent RPMs on RHEL for Access Manager 113
mount /dev/cdrom /mnt
NOTE: If the RHEL CD-ROM is auto mounted, the mount path will be /media/RHEL_x.x
x86_64 Disc 1. (The x in RHEL_x.x represents the version number) Unmount the default
mount path by using the unmount /media/RHEL_x.x\ x86_64\ Disc\ 1/command and
then mount the RHEL CD-ROM by using mount /dev/cdrom /mnt.
2 If you have a locally mounted ISO image, you can install RPMs for Access Manager by providing
the mount path to the installer. The install.sh scripts prompts for the mounted disc if it
identifies that the required RPMs are not installed. Provide the mount path to the installer with
an ending /. For example, /mnt/.
NOTE: Installer will install only RPMs required for Access Manager components. You need to
install iManager RPMs separately.
Install RPMs for SNMP after installing RPMs for Administration Console. See “RHEL Packages
and Their Dependent RPMs for SNMP” on page 114.
Use the following procedure to install these packages to avoid any dependency issue:
1 Mount the RHEL CD-ROM by running the following command:
mount /dev/cdrom /mnt
2 Run the following commands:
yum install --nogpgcheck net-snmp-libs-5.7.2-37.el7.x86_64.rpm
yum install --nogpgcheck net-snmp-5.7.2-37.el7.x86_64
3 After installation, run /etc/init.d/novell-snmpd start. This will succeed for a successful
installation.
114 Installing Packages and Dependent RPMs on RHEL for Access Manager
9 Uninstalling Components
9
IMPORTANT: If you are uninstalling all Access Manager devices, the primary Administration Console
must be the last device you uninstall. The uninstall programs for the other devices contact the
primary Administration Console and validate the admin’s credentials before allowing the device to
be removed.
./uninstall.sh
IMPORTANT: If SLES 12 SP4 has the latest patches from SUSE update channel, run the
systemctl enable ndsd.service command and then choose option 6.
NOTE: Some services are not completely removed. To remove it completely, you must remove few
registry settings after restarting the server. For information about removing required registry
settings, see “Deleting Services from Registry” on page 120.
This section discusses how to upgrade Access Manager to the newer version. You must take a backup
of the existing configurations before upgrading Access Manager components.
For more information, see “Back Up and Restore” in the Access Manager 4.5 Administration Guide.
NOTE: By default, the Access Manager configuration uses stronger TLS protocols, ciphers, and other
security settings. If you want to revert these settings after upgrading, see “Restoring Previous
Security Level After Upgrading Access Manager” in the NetIQ Access Manager 4.5 Security Guide .
When you upgrade Access Manager components, first back up your configuration and then move
Administration Console. You can then upgrade other devices that you have imported into
Administration Console.
You must upgrade the Access Manager components in the following sequence:
1. Administration Console
2. Identity Server
3. Access Gateway
4. (Optional) Analytics Server
Supported Upgrade Paths
To upgrade to Access Manager 4.5, you need to be on one of the following versions of Access
Manager:
4.4 Service Pack 2
4.4 Service Pack 3
4.4 Service Pack 4
For information about the latest supported upgrade paths, see the specific Release Notes on the
Access Manager Documentation Website (https://www.netiq.com/documentation/access-manager-
45/).
Important Points to Consider
If you have installed additional nodes of Administration Console on other servers for fault
tolerance, ensure to first upgrade the primary Administration Console. Else, the directory
schema does not get updated.
Upgrade all nodes of a cluster before you start upgrading another type of device.
When nodes in a cluster are running on different release versions, you must not change any
configuration through Administration Console.
Manager
Watch the following video for important considerations that you must know before starting the
Access Manager upgrade:
http://www.youtube.com/watch?v=u6l2815jhDM
Before performing an upgrade, ensure that the following prerequisites are met:
Any option that is configured through the nidpconfig.properties file will be overwritten
after upgrade. Therefore, back up the nidpconfig.properties file before upgrading to
Access Manager 4.5. After the upgrade, replace the new nidpconfig.properties file with
the backed up file.
Identity Server:
Linux: /opt/novell/nids/lib/webapp/WEB-INF/classes/nidpconfig.properties
Windows: C:\Program Files\Novell\Tomcat\webapps\nidp\WEB-
INF\classes\nidpconfig.properties
Access Gateway:
Linux: /opt/novell/nesp/lib/webapp/WEB-INF/classes/nidpconfig.properties
Windows: C:\Program Files\Novell\Tomcat\webapps\nesp\WEB-
INF\classes\nidpconfig.properties
Back up your current Access Manager configuration using ./ambkup.sh command. For more
information, see section Back Up and Restore in the Access Manager 4.5 Administration Guide.
Some of the options are supported only through Administration Console. After the upgrade,
configure those options through Administration Console. For the list of options that must be
configured through Administration Console, see Configuring Identity Server Global Options,
Configuring ESP Global Options, Defining Options for SAML 2.0 in the Access Manager 4.5
Administration Guide.
Access Manager 4.2 and later versions do not support Platform Agent and Novell Audit. If you
are upgrading from an older version of Access Manager where you have configured Platform
Agent, ensure to remove this configuration before upgrading to the latest version. Otherwise,
auditing will fail because the Platform Agent service is not available post upgrade.
The upgrade process overwrites all customized JSP files. If you have customized JSP files for
Identity Server or Access Gateway, you must perform manual steps to maintain the customized
JSP files. For more information, see Section 10.1, “Maintaining Customized JSP Files for Identity
Server,” on page 124 or Section 10.2, “Maintaining Customized JSP Files for Access Gateway,” on
page 126.
If you have customized any changes to tomcat.conf or server.xml, back up the files. After
the upgrade, restore the files.
NOTE: If you do not create the legacy folder, Access Manager uses the logic of the default new
login pages.
4 Copy your all backed up JSP files into the jsp directory.
Linux: /opt/novell/nids/lib/webapp/jsp
Windows: \Program Files\Novell\Tomcat\webapps\nidp\jsp
5 Refresh the browser to see the changes.
10.1.2 Using Customized JSP Pages from Access Manager 4.1 or Prior
and Enabling the New Access Manager Portal
1 Before upgrade, create a copy of all JSP files inside the jsp directory and place the copy
somewhere else.
Linux: /opt/novell/nids/lib/webapp/jsp
Windows: \Program Files\Novell\Tomcat\webapps\nidp\jsp
NOTE: If you do not create the legacy folder, Access Manager uses the logic of the default new
login pages.
4 Copy your all backed up JSP files into the jsp directory.
Linux: /opt/novell/nids/lib/webapp/jsp
Windows: \Program Files\Novell\Tomcat\webapps\nidp\jsp
boolean bGotoAlternateLandingPageUrl =
handler.gotoAlternateLandingPageUrl();
5c Find the first instance of <script></script> in the JSP file that is not <script
src></script>, then insert the following line in to the JavaScript section between the
<script></script> tags:
NOTE: If you do not create the legacy folder, Access Manager uses the logic of the default new
login pages.
4 Copy your all backed up JSP files into the jsp directory.
Linux: /opt/novell/nesp/lib/webapp/jsp
IMPORTANT: If the base operating system is RHEL 7.5, you must first upgrade to Access Manager
4.5, then upgrade to RHEL 7.6.
NOTE: For information about the name of the upgrade file, see the specific Release Notes on
the Access Manager Documentation Website (https://www.netiq.com/documentation/access-
manager-45/).
4 Change to the directory where you unpacked the file, then enter the following command in a
terminal window:
./upgrade.sh
5 The system displays the confirmation message along with the list of installed components. For
example, if Administration Console and Identity Server are installed on the same machine, the
following message is displayed:
NOTE: To prevent security vulnerability, Access Manager uses the jQuery version that is higher than
the version used in the earlier release of Access Manager. The higher version of jQuery is not
compatible with the Skype for Business 2016 application. Hence, after the upgrade, you cannot log
in to Skype for Business 2016 using the Identity Server login page.
If you want to continue using an old version of jQuery, which is less secure, see “Single Sign-on Fails
in Skype for Business 2016” in the Access Manager 4.5 Administration Guide.
5 Change to the directory where you unpacked the file, then enter the following command in a
terminal window:
./upgrade.sh
6 The system displays the confirmation message along with the list of installed components. For
example, if Administration Console and Identity Server are installed on the same machine, the
following message is displayed:
The following components were installed on this machine
NOTE: If the configuration backup fails, the system displays the following message:
The configuration backup failed. Do you want to continue the upgrade
without a backup (y/n)?
You can complete the upgrade by typing Y. However, the configuration will not have a backup.
If you encounter an error, see Section 17.2, “Troubleshooting Linux Administration Console
Upgrade,” on page 171.
NOTE: If you have enabled history for risk-based authentication in a prior version of Access Manager,
you must upgrade the database for risk-based authentication after upgrading to 4.5. You can find the
upgrade script here: C:\Program Files\Novell\Tomcat\webapps\nidp\WEB-
INF\RiskDBScript.zip.
If you have installed Administration Console and Identity Server on the same server, you must
upgrade both of them at the same time.
NOTE: To prevent security vulnerability, Access Manager uses the jQuery version that is higher than
the version used in the earlier release of Access Manager. The higher version of jQuery is not
compatible with the Skype for Business 2016 application. Hence, after the upgrade, you cannot log
in to Skype for Business 2016 using the Identity Server login page.
If you want to continue using an old version of jQuery, which is less secure, see “Single Sign-on Fails
in Skype for Business 2016” in the Access Manager 4.5 Administration Guide.
1 Manually back up your current Access Manager configuration using ambkup.bat file. For
instructions, see Back Up and Restore in the Access Manager 4.5 Administration Guide.
2 If Administration is installed on the same server, manually back up the JSP pages and related
files in the C:\Program Files\Novell\Tomcat\webapps\nidp\jsp directory.
3 If you have customized the tomcat.conf file or the server.xml file, back up these files
before upgrading. These files are overwritten during the upgrade process.
IMPORTANT: We recommend that you have your own backup of customized files.
4 Run the installation program. When the installation program detects an installed version of
Administration Console, it automatically prompts you to upgrade.
5 Read the Introduction, then click Next.
6 Accept the License Agreement, then click Next.
7 Select the component to upgrade that is currently installed, then click Next.
8 Type Y and press Enter.
The system displays an information message to enable Syslog on the Auditing user interface of
Administration Console after the upgrade.
9 Type Y to continue with the upgrade, then press Enter.
10 At the upgrade prompt, click Continue.
11 Specify the following information for the administrator account on Administration Console:
Administration user ID: Specify the name of the administration user for Administration
Console.
Password and Re-enter Password: Specify and re-enter the password for the administration
user account.
12 Decide whether you want the upgrade program to create a backup of your current
configuration:
If you have a recent backup, click Continue. If you choose to not create a backup when you
do not have a recent backup and you then encounter a problem during the upgrade, you
may be forced to re-create your configuration.
If you do not have a recent backup, click Run Config Backup. The program creates a backup
and stores it in the root of the operating system drive in the nambkup directory.
13 Review the summary, then click Install.
IMPORTANT: If the base operating system is RHEL 7.5, you must first upgrade to Access Manager
4.5, then upgrade to RHEL 7.6.
NOTE: If you have modified the JSP file to customize the login page, logout page, and error
messages, you can restore the JSP file after installation. You should sanitize the restored JSP file to
prevent XSS attacks. For more information, see Preventing Cross-site Scripting Attacks in the Access
Manager 4.5 Administration Guide.
NOTE: For information about the name of the upgrade file, see the specific Release Notes on
the Access Manager Documentation website (https://www.netiq.com/documentation/access-
manager-45/).
4 Change to the directory where you unpacked the file, then enter the following command in a
terminal window:
./upgrade.sh
1. Identity Server
NOTE: If OAuth and OpenID Connect protocol is enabled, then after upgrading all members of
Identity Server cluster, you must update Administration cluster to use the JSON Web Token (JWT
token). For more information about JWT token, see Understanding How Access Manager Uses OAuth
and OpenID Connect in the Access Manager 4.5 Administration Guide.
NOTE: To prevent security vulnerability, Access Manager uses the jQuery version that is higher than
the version used in the earlier release of Access Manager. The higher version of jQuery is not
compatible with the Skype for Business 2016 application. Hence, after the upgrade, you cannot log
in to Skype for Business 2016 using the Identity Server login page.
If you want to continue using an old version of jQuery, which is less secure, see “Single Sign-on Fails
in Skype for Business 2016” in the Access Manager 4.5 Administration Guide.
NOTE: For information about the name of the upgrade file, see the specific Release Notes on
the Access Manager Documentation website (https://www.netiq.com/documentation/access-
manager-45/).
5 Change to the directory where you unpacked the file, then enter the following command in a
terminal window:
./upgrade.sh
6 The system displays the following confirmation message:
1. Identity Server
Important Notes:
If you are using Kerberos and you have renamed nidpkey.keytab and bcsLogin.conf with
any other name, ensure that you modify the upgrade_utility_functions.sh script
located in the novell-access-manager-x.x.x.x-xxx/scripts folder with these names
before upgrading Access Manager.
If you have customized the Java settings in the /opt/novell/nam/idp/conf/tomcat.conf
file, then after the upgrade, you must copy the customized setting to the new file.
If you have modified the JSP file to customize the login page, logout page, and error messages,
you can restore the JSP file after installation. You should sanitize the restored JSP file to prevent
XSS attacks. For more information, see Preventing Cross-site Scripting Attacks in the Access
Manager 4.5 Administration Guide.
1 Manually back up the JSP pages and related files in the C:\Program Files
(x86)\Novell\Tomcat\webapps\nidp\jsp directory.
IMPORTANT: We recommend that you have your own backup of the customized files.
2 If you have customized the tomcat.conf file or the server.xml file at C:\Program Files
(x86)\Novell\Tomcat\conf\, back up these files before upgrading. The registries and the
file are overwritten during the upgrade process.
3 Download and run AM_45_AccessManagerService_Win64.exe file from NetIQ.
This file starts the installation program. When the program detects an installed version of
Identity Server, it automatically prompts you to upgrade.
4 On the Introduction page, click Next.
5 Accept the License Agreement.
6 At the upgrade prompt, click Continue.
7 Type Y and press Enter.
The system displays an information message to enable Syslog after the upgrade.
8 Type Y to continue with the upgrade, then press Enter.
9 Specify the following information for Administration Console:
Administration user ID: Specify the name of the administration user for Administration
Console.
Password and Re-enter Password: Specify and re-enter the password for the administration
user account.
10 If you have customized login pages, decide whether you want your customized pages restored
automatically. Be aware that any new feature introduced in the JSP files that have the same
name as your files are lost when your file overwrites the installed file with the automatic
restore.
You may want to wait until after the upgrade, then compare your customized file with the newly
installed file. You can then decide whether you need to modify your file before restoring it.
NOTE: Ensure that you sanitize the restored customized JSP file to prevent XSS attacks. For more
information about how to sanitize the JSP file, see Preventing Cross-site Scripting Attacks in the
Access Manager 4.5 Administration Guide.
IMPORTANT: If NetIQ Access Manager is federated with other service providers or if the users are
redirected to Access Gateway protected resources from Identity Server using the target_url, you may
see errors regardless of successful authentication. The ConfigUpgrade script enables ‘Allow any
target’ for the ‘Intersite Transfer Service’ configuration service for all the service providers.
IMPORTANT: If the base operating system is RHEL 7.5, you must first upgrade to Access Manager
4.5, and then upgrade to RHEL 7.6.
For information about upgrading from 4.4 to any of the supported upgrade version of Access
Gateway, see Upgrading Access Gateway Appliance in the NetIQ Access Manager 4.4 Installation and
Upgrade Guide (https://www.netiq.com/documentation/access-manager-44/install_upgrade/data/
bookinfo.html).
NOTE: All versions of Access Gateway Appliance 4.4.x do not support a direct upgrade to the latest
version. For the supported upgrade paths, see the release specific Release Notes.
NOTE: You can use the latest upgrade file to upgrade from 4.5 to the latest version of Access
Gateway Appliance.
If you are using Access Gateway Appliance 4.4 Service Pack 4 Hotfix 1 or earlier supported versions,
see “Upgrading from Access Gateway Appliance 4.4.x” on page 142.
NOTE: Some of the updates might require rebooting Access Gateway Appliance. It is
recommended to reboot Access Gateway Appliance in the following scenarios:
When Configuration console displays the Reboot Needed option in the upper right corner
of the Appliance Configuration pane.
When Configuration console displays a message or a warning to reboot.
Verifying the version of the base Operating System and Common Appliance Framework
(Applicable for upgrading Access Gateway Appliance to 4.5.2)
1 Open a terminal window and log in as the root user.
2 Use the following command to check the Operating System version:
cat /etc/os-release
Ensure that the version is SLES 12 SP4.
3 Use the following command to check the CAF version:
cat /etc/Novell-VA-base
Ensure that the version is 2.0.3.
Steps to upgrade from 4.5 to the latest version of Access Gateway Appliance:
1 Back up any customized JSP pages and related files.
Even though the upgrade program backs up the JSP directory and its related files in the /root/
nambkup folder, it is a good practice to backup these files.
2 Open a terminal window.
3 Log in as the root user.
4 Download the upgrade file from dl.netiq.com or from your purchased build, and then extract
the tar.gz file using the following command:
tar -xzvf <filename>
NOTE: For information about the name of the upgrade file, see the specific Release Notes on
the Access Manager Documentation website.
5 Change to the directory where you unpacked the file, then enter the following command in a
terminal window:
./ma_upgrade.sh
6 A warning message regarding backup and restore is displayed followed by the message for
including security settings.
If you have customized any files, take a backup and restore them after installation.
7 Would you like to continue this upgrade? Type Y to continue.
If you do not want to include the security configurations, then type n. This stops the upgrade.
8 Do you want to restore custom login pages? Type Y to confirm.
9 Enter the Access Manager Administration Console user ID.
10 Enter the Access Manager Administration Console password
Prerequisites
In addition to the Section 4.2.1, “Prerequisites for Installing Access Gateway Appliance,” on page 69,
ensure that the following prerequisites are met before migrating Access Gateway Appliance:
You have completed upgrading all instances of Administration Console and Identity Server
before migrating the Access Gateway Appliance.
(If the services are managed by an L4 switch) You have removed the device that needs to be
migrated from the L4 switch. This prevents the L4 switch from sending the request of the users
to that device during migration.
Add the device to the L4 switch after the migration is complete.
Workflow:
1 Back up any files that you have customized and note down the IP address and host name of the
existing Access Gateway Appliance.
2 Shut down the existing Access Gateway Appliance.
3 Install Access Gateway Appliance with the IP address and host name noted in Step 1.
4 Restore any customized files from the backup taken earlier.
Use case:
You are upgrading Access Manager 4.4 Service Pack 2 (4.4 SP2) to Access Manager 4.5. After
upgrading Administration Console and Identity Server to 4.5 version, you require to migrate Access
Gateway Appliance to the 4.5 version using the existing IP address.
This scenario assumes that you have a server with the system requirements as mentioned at NetIQ
Access Manager System Requirements to install the new Access Gateway Appliance.
Consider that the setup includes the following components:
Access Manager 4.5 Administration Console (primary Administration Console: AC 1)
Access Manager 4.5 Identity Server cluster (primary Identity Server: IDP 1 and secondary
Identity Server: IDP 2)
Access Manager 4.4 SP2 Access Gateway Appliance cluster (primary Access Gateway: AG 1 and
secondary Access Gateway: AG 1, AG 2 and A G 3)
Migration process:
1 If you are first migrating AG 2 using the existing IP address of AG 2, ensure you do the following:
1a Shut down AG 2
1b Ensure that you have met the “Prerequisites” on page 144.
NOTE: After the installed Access Gateway Appliance turns green, it is recommended to migrate
all the other members of Access Gateway Appliance to Access Gateway Appliance 4.5 before
applying the changes by using the update option in Administration Console.
3 Restore any customized files that you backed up earlier as part of “Prerequisites” on page 144.
server.xml: If you have modified any elements or attributes in the 4.4 Service Pack 2
environment, the corresponding changes will need to be applied to the /opt/novell/nam/
mag/conf/server.xml file of the new Access Gateway Appliance.
Typical changes done to the server.xml in 4.4 SP2 include modifying the 'Address='
attribute to restrict the IP address the application will listen on, or 'maxThreads=' attribute to
modify the number of threads.
In the following example, 4.4 SP2 has customized maxThreads value.
<Connector port="9029" enableLookups="false" protocol="AJP/1.3"
address="127.0.0.1" minSpareThreads="25" maxThreads="300" backlog="0"
connectionTimeout="20000", ... ../>
Make a note of the customizations and copy paste the changed values in the new server.xml
file.
4 Test the Access Gateway Appliance functionality by accessing Access Gateway protected
resources and ensuring that pages are rendered successfully.
5 Repeat Step 1 through Step 4 until you have completely migrated all the existing 4.4 SP2 Access
Gateway Appliance (AG 1 and AG 3) to Access Gateway Appliance 4.5.
6 On the newly added Access Gateway Appliance, restart Tomcat by using the /etc/init.d/
novell-mag restart or rcnovell- mag restart command.
Workflow:
1 Back up any files that you have customized.
2 Install the new Access Gateway Appliance.
For information about installing the new Access Gateway Appliance, see Section 4.2, “Installing
Access Gateway Appliance,” on page 68.
3 Restore the customized files from the backup taken earlier.
Use case
You are upgrading Access Manager 4.4 SP2 to Access Manager 4.5. After upgrading Administration
Console and Identity Server to 4.5 version, you require to migrate Access Gateway Appliance to the
4.5 version using the new IP address.
Migration process:
1 Determine the primary server in the 4.4 SP2 Access Gateway cluster.
In this scenario, AG 1 is the primary server. To verify which is the primary server in your set up,
perform the following:
1a Log in to Administration Console.
1b Click Devices > Access Gateways, and select the cluster.
The primary server is indicated by a red mark beside the IP address.
2 Install the new Access Gateway Appliance (newAGA 1). For more information, see Section 4.2,
“Installing Access Gateway Appliance,” on page 68.
After the installation, you must configure Access Gateway Appliance to specify the IP address of
Administration Console (AC 1), user name, and password in the Administration Console
Configuration field on the Appliance Configuration page.
3 Add the newly installed Access Gateway Appliance to the existing Access Gateway Appliance 4.4
Service Pack 2 cluster.
Prerequisites
Manually back up the tomcat.conf and the server.xml files from /opt/novell/nam/mag/
conf.
The ag_upgrade.sh script takes care of backing up the remaining customized files automatically.
These files get automatically backed up at the /root/nambkup folder and includes apache
configuration and error pages.
IMPORTANT: (Applicable for RHEL) When more than 60 proxy services are configured, Apache fails
to start after upgrade. RHEL has 128 semaphore arrays by default which is inadequate for more than
60 proxy services. Apache 2.4 requires a semaphore array for each proxy service.
You must increase the number of semaphore arrays depending on the number of proxy services you
are going to use. Perform the following steps to increase the number of semaphore arrays to the
recommended value:
1. Open /etc/sysctl.conf
2. Add kernel.sem = 250 256000 100 1024
This creates the following:
Maximum number of arrays = 1024 (number of proxy services x 2)
Maximum semaphores per array = 250
Maximum semaphores system wide = 256000 (Maximum number of arrays x Maximum
semaphores per array)
Maximum ops per semop call = 100
3. Use command sysctl -p to update the changes
4. Start Apache.
/root/novell_access_manager/apache2/ /opt/novell/apache2/share/apache2/
(contains apache var files) error
/root/novell_access_manager/nesp/ /var/opt/novell/tomcat/webapps/nesp/
(contains modified error pages) jsp/
server.xml:
If you have modified any elements or attributes in the 4.4.x environment the corresponding
changes will need to be applied to the 4.5 server.xml file.
Typical changes done to the server.xml include modifying the 'Address=' to restrict the IP
address the application will listen on, or 'maxThreads=' attributes to modify the number of
threads.
In the following example, 4.4.x has customized maxThreads value.
<<Connector port="9009" enableLookups="false" redirectPort="8443"
protocol="AJP/1.3" address="127.0.0.1" minSpareThreads="25"
maxThreads="700" backlog="0" connectionTimeout="20000, ... ../>
Make a note of the customizations and copy paste the changed values in the 4.5 server.xml
file
tomcat.conf:
Copy any elements or attributes that you have customized in the tomcat8.conf file to the
tomcat.conf file.
NOTE: If you have customized the Java settings in the /opt/novell/nam/idp/conf/tomcat.conf file,
then after the upgrade, you must copy the customized setting to the new file.
If these packages are installed, you will get a confirmation message. If the packages are not installed,
you will not receive any response.
It is recommended to use the latest Analytics Server shipped with Access Manager 4.5 Service Pack 3
HotFix 1. Upgrade to the latest Analytics Server is not supported from an earlier version. You must
perform a fresh installation.
However, you can use the new Analytics Dashboard along with the earlier Sentinel-based Analytics
Dashboard for events to be captured in both until all the data become available in the new
dashboard. For this, you need to configure two target servers, one for the old and one for the new
Analytics Dashboard. For more information, see “Setting Up Logging Server and Console Events” in
the Access Manager 4.5 Administration Guide.
You cannot launch the old Analytics Dashboard and reports from Administration Console. Instead,
you can access the old data using the following direct access links:
Dashboard: https://<Analytics IP>:8445/amdashboard/login
Reports: https:// <Analytics IP>:8443/sentinel
IMPORTANT: Before installing the new Analytics Server, ensure to delete Analytics Server nodes of
the earlier version from Administration Console.
Access Manager
The OpenSSL open source project team regularly releases updates to known OpenSSL vulnerabilities.
Access Gateway and Analytics Server use the OpenSSL library for cryptographic functions. It is
recommended that you keep Access Gateway and Analytics Server updated with the latest OpenSSL
patch.
Prerequisites
Before upgrading the kernel, ensure that you have updated the operating system to a supported
version.
Access Gateway Appliance installs a customized version of SLES 12 SP3. If you want to install the
latest patches as they become available, you must have a user account to receive Linux updates.
Ensure that you have obtained the activation code for Access Manager from Novell Customer
Center.
WARNING: Installing additional packages other than security updates and VMware tools breaks your
support agreement. If you encounter a problem, Technical Support might require you to remove the
additional packages and to reproduce the problem before providing any help with your problem.
WARNING: Before performing the online update, ensure to add rules in the firewall to allow https
traffic to the URLs such as nu.novell.com and secure-www.novell.com.
For more information about configuring the firewall and ports, see Setting Up Firewalls.
After completing the registration, you can view the lists of needed and installed updates.
NOTE: Some of the updates might require rebooting Access Gateway Appliance. It is
recommended to reboot Access Gateway Appliance in the following scenarios:
When Configuration console displays the Reboot Needed option in the upper right corner
of the Appliance Configuration pane.
When Configuration console displays a message or a warning to reboot.
Schedule: Configure the type of updates to download and whether to automatically agree to
the licenses.
To schedule online update:
1. Click the Schedule tab.
2. Select a schedule for download updates (Manual, Daily, Weekly, Monthly).
View Info: Click View Info to display a list of installed and downloaded software updates.
Refresh: Click Refresh to reload the status of updates on Access Gateway Appliance.
15.3.1 Updating Linux Access Gateway Service with the Latest OpenSSL
Patch
1 Download the openssl-update.sh script.
2 Change the file permission to executable:
chmod +x openssl-update.sh
3 Run the following command:
openssl-update.sh username password novell-nacm-apache-extra-4.2.1-
1.0.2u
NOTE: This downloads the 1.0.2r version of OpenSSL. Change the version number depending on
the version available on the appliance channel.
username and password are the mirror credentials for the Novell Customer Care Portal the
product is registered with.
NOTE: You must repeat these steps for all the Windows Access Gateway servers.
This command updates to OpenSSL 1.0.2r.
The local download location for the OpenSSL update is C:\Program
Files\Novell\apache\novell_patch.
Upgrade
IMPORTANT: Delete the log files after debugging because they contain sensitive
information in clear text.
8444
1443
1289
524
636
Ports 8080 and 8443 must be open between the server and the clients for the clients to log in to
Identity Server. For more information, see “Setting Up Firewalls” on page 28.
Time is synchronized between the two machines. Ensure that both machines are configured to
use a Network Time Protocol server.
If firewalls and time synchronization do not solve the problem, run the reimport script. See
“Reimporting Identity Server” on page 165.
If the ping command is unsuccessful, fix the network communication problem before
continuing.
3 In Administration Console, delete Identity Server.
For more information about how to delete Identity Server in Administration Console, see
Identity Server Advanced Configuration in the Access Manager 4.5 Administration Guide.
4 On the Identity Server machine, change to the jcc directory:
Linux: /opt/novell/devman/jcc
Windows: \Program Files\Novell\devman\jcc
5 Run the following script to configure jcc:
Linux: ./conf/reimport_nidp.sh jcc
Windows: conf\reimport_nidp.bat jcc
6 Run the following reimport script:
Linux: ./conf/reimport_nidp.sh nidp
Windows: conf\reimport_nidp.bat nidp <admin>
Replace <admin> with the name of your administrator for Administration Console.
7 If these steps do not work, reinstall the device.
Table 16-1 Installation Log Files for the Linux Identity Server
Table 16-2 Installation Log Files for the Windows Identity Server
nauditjar_InstallLog.log Contains the messages generated when installing Novell Audit JAR
files.
NMASjar_InstallLog.log Contains the messages generated when installing NMAS JAR files.
IMPORTANT: Delete the log files because they contain sensitive information in clear text.
Linux: /opt/novell/devman/share/logs/app_sc.0.log
Windows: \Program Files\Novell\log\app_sc.0.log
Tomcat Log on Administration Console:
Linux: /opt/novell/nam/device name/logs/catalina.out
The device name can be idp, mag, or adminconsole.
Windows: \Program Files\Novell\Tomcat\logs\stdout.log and \Program
Files\Novell\Tomcat\logs\stderr.log
JCC log on Access Gateway:
Linux Appliance or Service: /opt/novell/devman/jcc/logs/
Windows Service: \Program Files\Novell\devman\jcc\logs
Section 17.1, “Access Gateway Throws a 403 Forbidden Page Error for a Resource Protected by a
Form Fill Policy,” on page 171
Section 17.2, “Troubleshooting Linux Administration Console Upgrade,” on page 171
Section 17.3, “Upgrading Secondary Administration Console Fails with an Error,” on page 173
Section 17.4, “Issue in SSL Communication between Access Gateway and Web Applications,” on
page 173
Section 17.5, “Administration Console Fails to Start When You Upgrade the Operating System
After Upgrading Access Manager,” on page 173
Section 17.6, “Customized Login Pages Are Missing After Upgrading Access Manager,” on
page 174
Section 17.7, “The Email OTP JSP Page Does Not Render Properly on Internet Explorer 11,” on
page 174
Section 17.8, “Access Manager Upgrade Hangs While Upgrading eDirectory,” on page 174
Section 17.9, “X509 Authentication Does Not Work and Throws HTTP 500 Error After Upgrade,”
on page 175
Section 17.10, “Changes Required in server.xml for Apache Tomcat 8.5.51 after Upgrading to
Access Manager 4.5 Service Pack 2,” on page 175
tail -f /tmp/novell_access_manager/<file-name>
4c Restart the upgrade process.
17.7 The Email OTP JSP Page Does Not Render Properly on
Internet Explorer 11
This issue occurs when the Identity Server domain is added to the local Intranet or when the
compatibility mode is enabled.
To workaround this issue, add the following entry to the nidp_latest.jsp page:
response.setHeader("X-UA-Compatible","IE=edge"); after the first <%.
For example:
Embedded Service Provider configuration:
Linux: /opt/novell/nam/mag/conf/server.xml
/opt/novell/nam/mag/conf/server.xml <Connector port="9009"
enableLookups="false" redirectPort="8443" protocol="AJP/1.3"
address="127.0.0.1" minSpareThreads="25" maxThreads="600" backlog="0"
connectionTimeout="20000" packetSize="65536" maxPostSize="65536"
secret="namnetiq" />^M
Administration Console:
Windows: C:\Program Files\Novell\Tomcat\conf\server.xml
<Connector port="8009" protocol="AJP/1.3" redirectPort="8443"
secret="namnetiq" />
Identity Service Provider (IDP):
Windows: C:\Program Files\Novell\Tomcat\conf\server.xml
<Connector URIEncoding="utf-8" port="8009" protocol="AJP/1.3"
redirectPort="8443" secret="namnetiq" useBodyEncodingURI="false"/>
Linux: /opt/novell/nam/idp/conf/server.xml
<Connector address="127.0.0.1" backlog="0" connectionTimeout="20000"
enableLookups="false" maxPostSize="2097152" maxThreads="600"
minSpareThreads="25" port="9019" protocol="AJP/1.3" scheme="https"
secure="true" secret="namnetiq" />^M
3 Save the file and restart the Apache Tomcat Service.
Appendix 177
178 Appendix
A Configuring Administration Console
A
"com.microfocus.nam.adminconsole.localhost.ipaddress"
For example:
JAVA_OPTS="${JAVA_OPTS} -
Dcom.microfocus.nam.adminconsole.localhost.ipaddress=10.0.0.0"
Configuring Administration Console Ports 9000 and 9001 to Listen on the Specified Address 179
180 Configuring Administration Console Ports 9000 and 9001 to Listen on the Specified Address
B Recommendations for Scaling Access
B
IMPORTANT: You must perform this task only if you are upgrading to Access Manager 4.5 Service
Pack 2 (SP2) or later from an older version and your database contains the Risk Based Authentication
(RBA) data.
From Access Manger 4.5 SP2, a one-to-one data model is used to store the device information for
RBA in SQL database. The older versions of Access Manager uses the many-to-one data model to
provide the storage benefits of data normalization. The many-to-one data model can cause
performance issues in some versions of SQL database when the system is under heavy load.
If you are upgrading to Access Manager SP2 with existing RBA data in database, you must
denormalize the existing data. To denormalize your database, you must run a jar utility supplied
along with Access Manager 4.5 SP2. If you do not run this utility, the existing user data can become
irrelevant in RBA and may not be used for Risk Score calculation.
Refer the following points to know how this utility works:
It runs outside Access Manager as a separate JAR utility.
It runs on a configuration file and the configuration file is bundled with JAR.
It uses hibernate and native SQL queries to modify the database entries.
IMPORTANT: It is recommended to back up your database before you run the utility.
Make sure that enough Java heap space is available before you run the utility.
Provide appropriate hibernate connector JARs in classpath.
NOTE: If you want to use c3p0 connection pool libraries to optimize the database connection
usage while running the utility, you must place the c3p0 JAR files in the same location where
the utility JAR is extracted. Specify the c3p0 properties in the configuration file in the following
format:
<key=value>
4 Open the config.properties file that you extracted from utility JAR.
5 Specify the details that you noted in Step 2 in config.properties file:
For example, see the following information to understand what information is specified in
config.properties file:
hibernate.connection.url=<URL>
hibernate.connection.username=<Username>
hibernate.connection.password=<Password>
hibernate.dialect=<Database Dialect>
hibernate.connection.driver_class=<Database Driver>
6 Run command line or terminal as an administrator.
7 Run the following java command to run the utility:
IMPORTANT: Make sure that you specify absolute paths in classpath and arguments to avoid
platform specific issues.