RSA Archer 6.9 Platform Installation and Upgrade Guide
RSA Archer 6.9 Platform Installation and Upgrade Guide
Contents
Preface 9
About This Guide 9
Support and Service 9
Other Resources 9
RSA Archer Documentation 10
3
RSA Archer Platform Installation and Upgrade Guide
Installing Components 28
Installing the Web Application and Services Components 29
Installing the Services Server 37
4
RSA Archer Platform Installation and Upgrade Guide
5
RSA Archer Platform Installation and Upgrade Guide
6
RSA Archer Platform Installation and Upgrade Guide
7
RSA Archer Platform Installation and Upgrade Guide
Preparation Checklist 118
Installation Checklist 118
Upgrade Installation Checklist 120
Activation Checklist 123
Validation Checklist 125
Preparation Worksheet 126
Activation Worksheet 127
8
RSA Archer Platform Installation and Upgrade Guide
Preface
Other Resources
Resource Description
RSA Archer Our public forum, on the RSA Link Community platform, brings together
Community customers, prospects, consultants, RSA Archer thought leaders, partners and
on analysts to talk about risk and compliance as a practice, and includes product
RSA Link demos, videos, white papers, blogs and more.
https://community.rsa.com/community/products/archer-grc
RSA Archer Our private community, is a powerful governance, risk and compliance online
Customer / network that promotes collaboration among RSA Archer customers, partners,
Partner industry analysts, and product experts. Engaging with the RSA Archer
Community Community on RSA Link enables you to collaborate to solve problems, build best
on practices, establish peer connections and engage with RSA Archer thought
RSA Link leaders.
https://community.rsa.com/community/products/archer-grc/archer-customer-
partner-community
Preface 9
RSA Archer Platform Installation and Upgrade Guide
Resource Description
RSA Ready RSA's Technology Partner Program is where third parties gain access to RSA
Software in order to develop an interoperability and have it documented and
certified. RSA Ready certifications are posted to an online community and
supported by RSA Support.
https://community.rsa.com/community/products/rsa-ready
RSA The RSA Exchange for RSA Archer offerings help you rapidly deploy adjacent or
Exchange supporting risk business processes, quickly integrate new risk data sources, and
for implement administrative utilities to make the most out of their risk and
RSA Archer compliance investment.
https://community.rsa.com/community/products/archer-grc/exchange
Release Notes A list of issues fixed in the release, a list of issues known at the time of the
release, and an overview of the new and updated features in the current
release. Available in a Microsoft Excel workbook.
Installation Instructions for installing and upgrading to the latest RSA Archer release.
and Upgrade Available in PDF format.
Guide
Online Information for using RSA Archer, including how to set up and maintain the
Documentation RSA Archer Platform, how to use the RSA Archer Platform features, how to
use the RESTful, Web and Content APIs, security configuration information,
and how to install and use the solution use cases. Available from within the
product in HTML5 format using context-sensitive links, as well as in a ZIP
format for local installation.
Archer Control Information for using the RSA Archer Control Panel (RSA ACP) module to
Panel (ACP) manage the internal settings of the Platform, such as license keys, global paths
Help and settings. Available from within the RSA ACP module and in a ZIP format
for local installation.
Preface 10
RSA Archer Platform Installation and Upgrade Guide
Document Description
Planning Information about how to plan for your new RSA Archer installation. This
Guide document is intended for system administrators who are responsible for
installing and managing RSA Archer. Available in PDF format.
Qualified and Information on the required software platforms for running RSA Archer. This
Supported document is available on the RSA Archer Community on RSA Link
Environments at:https://community.rsa.com/docs/DOC-102657.
Security Information about security configuration settings available in the RSA Archer
Configuration Platform and security best practices for using those settings to help ensure
Guide secure operation of RSA Archer. Available in PDF format.
Preface 11
RSA Archer Platform Installation and Upgrade Guide
Web Application
The RSA Archer Platform uses a web-based user interface that runs on a Web Server. Manage the
Web Application through an Application Pool using Microsoft® Internet Information Services (IIS).
Microsoft Internet Information Service (IIS), Microsoft .NET Framework 4.7.2 is required for the
application. For additional information, see System Requirements. The application is managed
through an Application Pool through the Internet Information Services (IIS). For additional
information, see Application Pool Requirements.
Instance Database
An RSA Archer instance is a single setup that includes unique content in a database, the connection
to the database, the interface, and user credentials. For example, you may have individual instances
for each office location or region, or for development, test, and production environments.
File Repository
The File Repository serves many purposes for your RSA Archer configuration. For example, the File
Repository provides storage for the following services:
Configuration Database
RSA Archer uses the Configuration Database to store data that is not instance specific; for example,
client information and application information (including date and version).
Services
There are several services, listed with Microsoft Windows Services, that control various functions
of RSA Archer. They control features such as configuration data, job engine, and advanced
workflow.
The following table describes the RSA Archer services.
Service Description
Note: This service must be installed and enabled on all web and
Services Servers.
RSA Archer Supports message logging through Event Tracing for Windows (ETW)
Instrumentation to a database. For more information, see Message Logging.
Note: This service only needs to be active if you are using ETW.
RSA Archer Supports user and group maintenance by synchronizing the users and
LDAP Synchronization groups in RSA Archer to users and groups in another system through
Lightweight Directory Access Protocol (LDAP).
Note: This service only needs to be active if you are using LDAP to
manage user accounts.
Service Description
RSA Archer Job Administers all asynchronous job processing for RSA Archer data
Engine feeds, findings generation, notifications, recalculations, and system
jobs. For a complete listing of processing and system jobs, see "Job
Types" in the RSA Archer Control Panel Help.
RSA Archer Queuing Builds and maintains indexes for keyword search and file attachments.
You can only have one RSA Archer Queuing service enabled for an
RSA Archer instance.
Recommended Configuration
For optimal scalability and performance, it is recommended that you use a multiple server
configuration for RSA Archer. This configuration includes dedicated servers for hosting the Web
Application and the services. Each server plays a specific role within the RSA Archer configuration.
Database Description
For enhanced reliability, incorporate caching into your configuration by having multiple servers
running simultaneously. To enable third-party caching, follow the recommendations from the caching
provider. Caching is often installed one more than one server to ensure that if the main server goes
down, the traffic shifts to the another running server. These servers run the Cache Services only.
Recommended Configuration
Each server plays a role and runs IRM components specific to that role. The following table shows
the recommended configuration.
Services Database
Cache Servers Web Server File Server
Server Server
(Optional) (Optional)
ScaleOut ScaleOut
StateServer StateServer
Client Client
Services Database
Cache Servers Web Server File Server
Server Server
System Requirements
The recommended system requirements vary based on the number of concurrent users and the
amount of data stored in RSA Archer. RSA recommends using a server configuration that supports
moderate transaction levels. For a complete list of system performance requirements and
characteristics, see the RSA Archer Platform Planning Guide.
License Keys
License keys are required for certain situations.
Important: When upgrading, do not apply the new license key until after you upgrade the
RSA Archer Platform. If you apply the license first before upgrading, you may lose access to legacy
core applications that are no longer supported in the out-of-the-box use cases.
Azure (Standard_
Element Small Environment AWS (m4.xlarge)
DS3 package)
Memory 16 GB 16 GB 14 GB
Note: This table describes hardware requirements only. To understand all requirements for your
configuration, see "Sizing Guidelines" in the RSA Archer Platform Planning Guide.
l Communication between your on-premises systems and your cloud vendor is key. Contact your
vendor to select a method that works best for your environment.
For more information about the different vendor products offered, review the Azure and
AWS documentation:
l For Azure, see https://docs.microsoft.com/en-us/azure/.
l For AWS, see https://aws.amazon.com/.
Installation
Your RSA Archer infrastructure configuration must meet the minimum requirements outlined in
System Requirements. For more details on how to prepare, see Preparing the Servers.
These instructions follow the RSA recommended installation, in which you will install the Web
Application and Services components on all Web Servers and the Services component on all
Services Servers.
Verify that the databases meet the requirements in the following table.
Authentication methods authorize users to perform computer functions and determine the
connectivity to the databases. The method you use is entirely up to your business operations. The
following table describes two methods of connecting to the three databases in RSA Archer.
Database Description
Database Description
The Web Server hosts the Web Application and configuration service of RSA Archer. Use the
RSA Archer Platform Planning Guide to determine the best configuration for your data.
The following chart identifies each component on the Web Servers and its requirements. Set up your
Web Servers accordingly.
Component Requirement
Microsoft Windows Server 2012 R2 or 2016 Administrator rights during the installation
process.
Microsoft Internet Information Services (IIS) IIS must be installed prior to installing .NET. If
8.5 or 10 not, the appropriate .NET mappings may not be
applied. Failure to follow the proper
installation sequence as presented in this guide
may result in having to re-register Microsoft
.NET Framework 4.7.2.
(Optional) Microsoft Filter Pack 2.0 or later If you want keyword searches to include
Microsoft Office documents, install this on
your Web Servers.
Microsoft C++ 2010 Redistributable x64
installation is required in order to search PDF
files.
(Optional) ScaleOut StateServer Client If you want to enable caching with ScaleOut
StateServer, install the client on Web Server.
It is assumed that the IT Administrator is familiar with the process of configuring your IIS. The
IT Administrator should complete the following tasks after installing Microsoft .NET Framework
4.7.2. Use the Microsoft Server Manager Dashboard to configure the IIS accordingly.
2. Install the required IIS roles and features. Disable the WebDAV Feature (RSA Archer does not
support this feature).
Important: Only enable one authentication method, as more than one authentication method
causes errors in the Manage Users, Manage Groups, and Report features of RSA Archer.
4. Create the application pool. For information on how to create an application pool, go to
technet.microsoft.com.
Note: Ensure that the Managed pipeline mode is set to Integrated. Not all product features are
supported in Classic mode.
An application pool is required for administrating the RSA Archer Web Application. The application
pool defines the set of Web Applications that share one or more worker processes, which are
Windows processes that run Web Applications.
RSA Archer requires a specified user account for accessing the various files in the Web Server.
Make sure your credentials work appropriately.
Component Requirement
Microsoft Windows Server 2012 R2 or 2016 Administrator rights during the installation
process.
Note: Running the IIS Application Pool and the services as a domain-based services account
enables RSA Archer Platform to access the Network Share regardless of where they reside in the
network.
l Place search indexes and RSA Archer Queuing services on the same server.
l Reside on one of the following:
o One of the designated RSA Archer servers.
o Standardized file server/NAS.
The following table describes the authentication details depending on the number of servers in the
RSA Archer environment.
Windows Integrated
SQL Database Servers
DB Authentication
Windows Integrated
SQL Database Servers
DB Authentication
RSA Archer can perform keyword searches of Microsoft Office documents attachments. This
configuration is optional, but necessary if you are using the Microsoft Filter Pack 2.0 or later or
SMTP service.
If you are using localhost as the notifications mail relay server, install the SMTP Service in IIS and
configure the Relay Restrictions with the loopback IP address.
1. Verify the Cache Server software requirements from ScaleOut StateServer or Redis.
2. If you use Virtual Machines, contact your Virtual Infrastructure administrator to verify assigned
memory and guarantee 100% CPU resources. Performance degradation can occur if you do not
have sufficient resources
Installing Components
Once the servers are prepared, install RSA Archer using the following methods for each of your
servers.
See Appendix D: Installation Checklist for worksheets and checklists that you can use during
installation.
Task 2: Run the installer on all Web servers and Services servers
Important: You must use the same X.509 certificate during installations on all types of servers. For
more information, see X.509 Certificates.
b. In Specify the file to import into the certificate store, click and select the certificate
file.
c. Click OK.
d. In Type the password for the private key, enter the applicable certificate password.
o If selecting from a certificate store, do the following:
a. Choose Select from certificate store.
b. In Select a certificate from the store, expand the category and select the certificate.
2. Click Next.
Complete this task only if prompted during the installation process. If the installer detects the RSA
Archer Configuration service, the RSA Archer Platform - Configuration Database Options page
does not display.
1. Enter the port to securely communicate with the Advanced Workflow Service in HTTPS Port.
2. Do one of the following:
Note: The port numbers for Advanced Workflow REST URL and Advanced Workflow
Communication Port cannot be the same when using HTTPS. For example, by default, the
Advanced Workflow REST URL default port is 8443 and the Advanced Workflow
Communication default port is 8000.
l Use HTTPS
o Specify where to obtain the X.509. Do the following:
n If using current certificate, select Use current certificate.
Note: This option is unavailable, if this is the first installation for your configuration.
Note: If the system detects the specified port number is in use, you must confirm you wish
to replace the certificate bound to the specified port.
Task 7: Set the REST URL and Communication Port for Advanced Workflow service
Note: If this is a new install, the system populates this field with information from the
certificate and HTTPS port used to configure Advanced Workflow HTTPS.
c. Click Next.
Task 8: Select the language for RSA Archer and content (if prompted)
If you did not check the Instance Database box in Task 6, this task is skipped automatically.
Begin at the RSA Archer Platform Language page.
1. In Select the language for RSA Archer Platform, select the language that you want to use for
RSA Archer. By default, the language is US English. The supported languages are English (US),
Chinese, French, German, Italian, Japanese, Portuguese (Brazil), and Spanish.
2. Click Next.
2. If you are using a SQL Server account, enter the following, otherwise go to step 4.
l Login name
l Password
3. If you are using integrated security, do the following, otherwise go to step 4.
a. Select User integrated security.
b. In Database, enter the instance database.
4. Click Next.
Task 10: Set the default time zone for the configuration database (if prompted)
This time zone for the configuration database applies to all instances unless you override it for a
specific instance in the RSA Archer Control Panel.
Note: If the installer detects a timezone, the web application options page opens and you can move
on to task 11.
Task 12: Enable HTTPS automatically for communication between Web Servers and web traffic
If prompted, begin at the RSA Archer Platform - Specify HTTPS Binding Certificate page.
b. In Specify the file to import into the certificate store, click and select the file.
c. Click Open.
d. In Type the password for the private key, enter the applicable certificate password.
n If selecting from a certificate store, do the following:
a. Select from certificate store.
b. In Select a certificate from the store, expand the category and select the certificate.
2. Click Next.
Important: It is recommended to remove any existing HTTP binding from IIS to ensure secure
configuration.
Task 13: (Optional) Set the instrumentation database options for message logging
If you are using Message Logging or other event logging, enter the connections to the
instrumentation database. It is recommended to use a dedicated database and not the instance or
configuration database for this purpose.
Begin at the RSA Archer Platform - Instrumentation Database Options page.
1. Specify the setting for the Not using RSA Archer Instrumentation service option. Do one of the
following:
l If you do not want to use the service, select the option (default). Go to step 5.
l If you want to use the service, clear the option. Go to step 2.
2. In SQL Server, enter the server name.
If the SQL Server is configured for a custom port, enter [servername],[portID].
3. If you are using a SQL Server account, enter the following, otherwise go to step 5.
l Login name
l Password
Note: To allow correct RSA Archer Services installation, ensure that Log on as a Service is enabled
for the Window Services Account.
Note: It is recommended that you do not install Web Application or products in the same virtual
directory or Root of Archer. Browsers send Cookies if more than one Web Application resides in
same space; this behavior may lead to passing RSA Archer cookies to any other application
installed in same Root or Virtual Directory.
Task 16: Set the path for the installer log file
In the RSA Archer Control Panel, begin at the RSA Archer Platform - Instance Database Options
page.
1. In SQL Server, enter the server name. If the SQL Server is configured for a custom port, enter
[servername],[portID].
2. Do one of the following for connecting to the instance database:
Database Management System Do the following
3. Click Next.
Task 19: Stop all RSA Archer services except RSA Archer Configuration and RSA Archer Work-
flow services
Ensure all RSA Archer services are stopped, but the RSA Archer Configuration service continues to
run.
Note: Do not select RSA Archer Configuration or RSA Archer Workflow services.
b. Select Stop.
Note: When upgrading, options used in past installations are automatically selected.
l Services Server
2. Click Next.
Important: You must use the same X.509 certificate during installations on all types of servers. For
more information, see X.509 Certificates.
b. In Specify the file to import into the certificate store, click and select the certificate
file.
c. Click OK.
d. In Type the password for the private key, enter the applicable certificate password.
o If selecting from a certificate store, do the following:
a. Choose Select from certificate store.
b. In Select a certificate from the store, expand the category and select the certificate.
2. Click Next.
Complete this task only if prompted during the installation process. If the installer detects the RSA
Archer Configuration service, the RSA Archer Platform - Configuration Database Options page
does not display.
Task 6: (Optional) Set the instrumentation database options for message logging
If you are using Message Logging or other event logging, enter the connections to the
instrumentation database. It is recommended to use a dedicated database and not the instance or
configuration database for this purpose.
Begin at the RSA Archer Platform - Instrumentation Database Options page.
1. Specify the setting for the Not using RSA Archer Instrumentation service option. Do one of the
following:
l If you do not want to use the service, select the option (default). Go to step 5.
l If you want to use the service, clear the option. Go to step 2.
2. In SQL Server, enter the server name.
If the SQL Server is configured for a custom port, enter [servername],[portID].
3. If you are using a SQL Server account, enter the following, otherwise go to step 5.
l Login name
l Password
4. If you are using integrated security, do the following, otherwise go to step 5.
a. Select User integrated security.
b. In Database, enter the Instance Database.
5. Click Next.
Note: To allow correct RSA Archer Services installation, ensure that Log on as a Service is enabled
for the Window Services Account.
Note: It is recommended that you do not install Web Application or products in the same virtual
directory or Root of Archer. Browsers send Cookies if more than one Web Application resides in
same space; this behavior may lead to passing RSA Archer cookies to any other application
installed in same Root or Virtual Directory.
Note: If you are running RSA Archer 6.2 or earlier, you must first upgrade to 6.8 and then upgrade
to 6.9. For information about upgrading to RSA Archer 6.8, see the RSA Archer 6.8 Platform
Installation & Upgrade Guide on RSA Link.
Be aware that:
l All job engines and services must be stopped, except for RSA Archer Configuration Service.
l The X.509 certificate must be reused.
Note: Ensure that you are using the same certificate that you selected from your original
installation of RSA Archer.
Important: If you have previously used the Task Management application, ensure that the Status
fields are populated in the application before upgrading. For more information, see Changes Made to
the Task Management Application.
When you upgrade to release 6.8, users and groups selected in the Application Owner field are now
selected in both the Configuration Administrator and Content Administrator fields. New
configuration and content administration rights take effect immediately upon upgrade. Original
application owners should have the same access to configuration and content that they did prior to
the upgrade.
Important: You must run this upgrade on a Web Server or a server running IIS. Only run this
upgrade once for upgrading the instance database. Follow the instructions for upgrading the other
components at their respective web or Services Servers. See Upgrading the Web Servers and
Upgrading the Services Servers.
Task 3: Stop all RSA Archer services except RSA Archer Configuration
service
This process ensures that all RSA Archer services are stopped but the RSA Archer Configuration
service continues to run.
1. Run Windows Services as Administrator.
2. Scroll until the RSA Services appear.
a. Right click each Service in turn.
b. Select Stop.
5. Read the license agreement, and select I accept the terms in the license agreement.
6. Read the Diagnostics and System Data License.
7. Click Next.
Note: Make sure to select the same components previously installed before running the upgrade.
If running the installer against a specific component is required, ensure that the other components
installed on the same server are also selected—otherwise, the installer will uninstall them.
Clearing the Services component results in all installed services except for the Configuration
Service and Advanced Workflow Service being uninstalled. Clearing the Advanced Workflow
Service results in that service being uninstalled.
l Web Application
l Services
l Instance Database
l Advanced Workflow
2. Click Next.
1. Enter the port to securely communicate with the Advanced Workflow Service in HTTPS Port.
2. Do one of the following:
Note: The port numbers for Advanced Workflow REST URL and Advanced Workflow
Communication Port cannot be the same when using HTTPS. For example by default, the
Advanced Workflow REST URL default port is 8443 and the Advanced Workflow
Communication default port is 8000.
l Use HTTPS.
o Specify where to obtain the X.509, by doing one of the following:
l If using current certificate, select Use current certificate.
Note: This option is unavailable, if this is the first installation for your configuration.
Note: If the system detects the specified port number is in use, you must confirm you wish
to replace the certificate bound to the specified port.
b. Change the Advanced Workflow Communication Port to a different port than you specified
when configuring Advanced Workflow HTTPS. (The default value is 8000).
Note: If this is a new install, the system populates this field with information from the
certificate and HTTPS port used to configure Advanced Workflow HTTPS.
c. Click Next.
Task 10: Select the language for RSA Archer and content
If you did not check the Instance Database box in Task 6, this task is skipped automatically.
Begin at the RSA Archer Platform Language page.
1. In Select the language for RSA Archer Platform, select the language that you want to use for
RSA Archer. By default, the language is US English. The supported languages are English (US),
Chinese, French, German, Italian, Japanese, Portuguese (Brazil), and Spanish.
2. Click Next.
Note: Complete step 1 only when multiple instances exist. If the installer does not detect multiple
instances, it does not prompt for a database instance selection.
Task 13: (Optional) Set the instrumentation database options for message
logging
If you are using Message Logging or other event logging, enter the connections to the
instrumentation database. It is recommended to use a dedicated database and not the instance or
configuration database for this purpose.
Begin at the RSA Archer Platform - Instrumentation Database Options page.
1. Specify the setting for the Not using RSA Archer Instrumentation service option. Do one of the
following:
l If you do not want to use the service, select the option (default). Go to step 5.
l If you want to use the service, clear the option. Go to step 2.
2. In SQL Server, enter the server name.
If the SQL Server is configured for a custom port, enter [servername],[portID].
3. If you are using a SQL Server account, enter the following, otherwise go to step 5.
l Login name
l Password
4. If you are using integrated security, do the following, otherwise go to step 5.
a. Select User integrated security.
b. In Database, enter the Instance Database.
5. Click Next.
Note: It is recommended that you do not install Web Application or products in the same virtual
directory or Root of Archer. Browsers send Cookies if more than one Web Application resides in
same space; this behavior may lead to passing RSA Archer cookies to any other application installed
in same Root or Virtual Directory.
Task 15: Set the path for the installer log file
Begin at the RSA Archer Platform - Log Location page.
1. In Log Path, verify the path where the log file is stored, and click Next.
2. Confirm whether to copy the application files. Do one of the following:
l To copy the application files, click Yes, and select the folder to which you want to copy the
application files.
l To continue without copying the application files, click No.
3. Click OK.
1. Start all RSA Archer services, except RSA Archer Configuration Services which should already
be running.
Note: If you are using Advanced Workflow, start the RSA Archer Workflow server at the Web
Servers.
2. Go to Job Engine Manager in the RSA Archer Control Panel, and start job processing.
a. Click the Server tab and clear the Discontinue Job Processing checkbox to start processing
jobs.
b. In the Actions pane, click Save.
3. On the Installation Settings tab, verify the Logging and Default Local and Time Zone settings.
4. Double click the default instance to view the instance settings on the right pane and go to each
tab to verify that all information in the configuration is correct.
5. Click Save.
6. Repeat steps 4 and 5 for all other instances.
7. On the dedicated Services Server, start all RSA Archer services.
Task 3: Stop all RSA Archer services except RSA Archer Configuration
service.
This process ensures that all RSA Archer services are stopped but the RSA Archer Configuration
service continues to run.
1. Run Windows Services as Administrator.
2. Scroll until the RSA Services appear.
a. Right click each Service in turn.
b. Select Stop.
Note: When upgrading, options used in past installations are automatically selected.
l Services Server
2. Click Next.
Note: It is recommended that you do not install Web Application or products in the same virtual
directory or Root of Archer. Browsers send Cookies if more than one Web Application resides in
same space; this behavior may lead to passing RSA Archer cookies to any other application installed
in same Root or Virtual Directory.
Task 11: Set the path for the installer log file
Begin at the RSA Archer Platform - Log Location page.
1. In Log Path, verify the path where the log file is stored, and click Next.
2. Confirm whether to copy the application files. Do one of the following:
l To copy the application files, click Yes, and select the folder to which you want to copy the
application files.
l To continue without copying the application files, click No.
3. Click OK.
Note: If you are using Advanced Workflow, start the RSA Archer Workflow server at the Web
Servers.
2. Go to Job Engine Manager in the RSA Archer Control Panel, and start job processing.
a. Click the Server tab and clear the Discontinue Job Processing checkbox to start processing
jobs.
b. In the Actions pane, click Save.
3. At the Installation Settings tab, verify the global settings of the RSA Archer. These settings are
Logging, and Default Local and Time Zone.
4. Select the default instance and go to each tab and verify that all information in the configuration
is correct.
5. Click Save if you have made changes to the instance configuration.
6. Repeat steps 4 and 5 for all other instances.
7. On the dedicated Services Server, start all RSA Archer services.
Important: This version of RSA Archer requires Microsoft .NET Framework 4.7.2. For additional
information about system requirements, see System Requirements. Be sure to install all required
components before running the installer.
2. (Optional) Verify that you have downloaded the installer package correctly by comparing the
checksum values from your downloaded RSA Archer files to the checksum values for your
RSA Archer platform version displayed on the download page.
3. Use the Run as Administrator option to extract the installation package on the server to a
location that is accessible to other servers.
4. Back up the instance and configuration databases created during the server preparation process.
This process ensures that your data is current so that you can recover it if necessary.
Task 3: Stop all RSA Archer services except RSA Archer Configuration
service
This process ensures that all RSA Archer services are stopped but the RSA Archer Configuration
service continues to run.
1. Run Windows Services as Administrator.
2. Scroll until the RSA Services appear.
a. Right click each Service in turn.
b. Select Stop.
Note: When upgrading, options used in past installations are automatically selected.
l Web Application
l Services Server
l Advanced Workflow
2. Click Next.
1. Enter the port to securely communicate with the Advanced Workflow Service in HTTPS Port.
2. Do one of the following:
Note: The protocol and port numbers for this task must match those given in the following task.
l Use HTTPS.
o Specify where to obtain the X.509. Do one of the following:
l If using current certificate, select Use current certificate.
Note: This option is unavailable, if this is the first installation for your configuration.
Note: If the system detects the specified port number is in use, you must confirm you wish
to replace the certificate bound to the specified port.
Task 10: Set the REST URL and Communication Port for Advanced
Workflow service
Begin at the RSA Archer Platform Advanced Workflow Settings page.
1. If using HTTP, click Next.
2. During HTTP, the RSA Archer uses default ports and URLs.
3. If using HTTPS, do the following:
a. Change Advanced Workflow REST URL to the same value specified when configuring
Advanced Workflow HTTPS. For example, https://hostName:8000/ where hostName is the
fully qualified domain name of the host where the Advanced Workflow Service is installed.
If there are multiple Advanced Workflow Service hosts, hostName is the FQDN name for
the load balancer and the port number refers to the port for which you have configured the
load balancer.
b. Change the Advanced Workflow Communication Port to a different port than you specified
when configuring Advanced Workflow HTTPS. (The default value is 8000).
Note: If this is a new install, the system populates this field with information from the
certificate and HTTPS port used to configure Advanced Workflow HTTPS.
c. Click Next.
Task 11: Select the language for RSA Archer and content
If you did not check the Instance Database box in Task 6, this task is skipped automatically.
Task 13: (Optional) Set the instrumentation database options for message
logging
If you are using Message Logging or other event logging, enter the connections to the
instrumentation database. It is recommended to use a dedicated database and not the instance or
configuration database for this purpose.
Begin at the RSA Archer Platform - Instrumentation Database Options page.
1. Specify the setting for the Not using RSA Archer Instrumentation service option. Do one of the
following:
l If you do not want to use the service, select the option (default). Go to step 5.
l If you want to use the service, clear the option. Go to step 2.
2. In SQL Server, enter the server name.
If the SQL Server is configured for a custom port, enter [servername],[portID].
3. If you are using a SQL Server account, enter the following, otherwise go to step 5.
l Login name
l Password
Note: It is recommended that you do not install Web Application or products in the same virtual
directory or Root of Archer. Browsers send Cookies if more than one Web Application resides in
same space; this behavior may lead to passing RSA Archer cookies to any other application installed
in same Root or Virtual Directory.
Task 16: Set the path for the installer log file
Begin at the RSA Archer Platform - Log Location page.
1. In Log Path, verify the path where the log file is stored, and click Next.
2. Confirm whether to copy the application files. Do one of the following:
l To copy the application files, click Yes, and select the folder to which you want to copy the
application files.
l To continue without copying the application files, click No.
3. Click OK.
Note: If you are using Advanced Workflow, start the RSA Archer Workflow server at the Web
Servers.
2. Go to Job Engine Manager in the RSA Archer Control Panel, and start job processing.
a. Click the Server tab and clear the Discontinue Job Processing checkbox to start processing
jobs.
b. In the Actions pane, click Save.
3. At the Installation Settings tab, verify the global settings of the RSA Archer. These settings are
Logging, and Default Local and Time Zone.
4. Select the default instance and go to each tab and verify that all information in the configuration
is correct.
5. Save if you have made changes to the instance configuration.
6. Repeat steps 4 and 5 for all other instances.
7. On the dedicated Services Server, start all RSA Archer services.
1 Use the RSA Archer Control Panel to RSA Archer Control Panel Help:
configure the global settings for RSA l "Configuring Logging Rules"
Archer in the Installation Setting tab.
l "Configuring the Default Locale and
Time Zone"
2 Use the RSA Archer Control Panel to do RSA Archer Control Panel Help:
one of the following: l "Instance Configuration Settings"
l In the case of a vanilla installation, l "Completing the Default Creation"
create an RSA Archer instance and set
it as the default instance by selecting l "Setting the Default Instance"
the "Enable a default instance"
checkbox in Installation Settings.
l In the case of an upgrade, connect to
the existing instance.
Note: The SQL Server Agent must be running before you can execute the script.
3. Double-click jobDeployScript.sql.
4. Select the RSA Archer database as the current database.
5. Execute the script, which creates the Statistics Update and Index Rebuild database jobs.
Perform these steps in the Internet Information Services (IIS) manager, unless otherwise specified.
Note: When assigning the application pool, select the RSA Archer website for your company. The
website may reside on a virtual directory. These instructions reflect choosing the Default Web Site.
1. In the IIS Manager, go to Web Server > Sites > Default Web Site > website, for example RSA
Archer.
2. Right-click on website and select Manage Application > Advanced Settings.
The API must run under or have the same configuration as the application pool of the website.
Follow these steps to configure the application pool for the API, the Content API, as well as the
Platform API:
1. In the IIS Manager, go to Web Server > Sites > Default Web Site > website. For example, RSA
Archer.
2. Expand the website node and go to the api node.
3. Right-click on the node to configure and select Manage Application > Advanced Settings.
4. In General, verify that the Application Pool is the same as the website.
5. Do one of the following:
l If the application pool matches the website, go to the Step 6.
l If the application pool does not match the website, do the following:
a. In Application Pool, click the Ellipsis ( ... ) button
b. Select the application pool of the website, and click OK.
6. Click OK.
Task 4: Reconfigure the company_files directory as a virtual directory that is mapped to the net-
work share
Windows\Te SYSTEMDRIVE%\WINDOWS\
mp Microsoft.NET\Framework64\v4.0.30319\Te
mporary ASP.NET Files
company_ designated path on the Web Server or For the company_files, Log files,
files network share Search Index, and File
Repository, use the actual path
for your configuration.
For example,
Inetpub\wwwroot\RSAarcher\co
mpany_files
It is recommended that you routinely run virus scanning software on the deployed servers. However,
virus scanning software can interpret data inserted or updated in RSA Archer dependent directories
as a virus or malware, for example, as with the RSA Archer Threat Management solution.
1. Disable virus scanning on the folders that contain the following files:
l Windows\Microsoft.Net\Framework64
l RSA Archer Company Files
l RSA Archer Log Files
l RSA Archer Index
l RSA Archer File Repository
2. Disable virus scanning on the RSA Archer\Services\Workpoint\ folder in the RSA Archer
program files, to prevent server performance degradation with some anti-malware solutions.
For additional information on "Virus Scanning," see the RSA Archer Security Configuration Guide.
Task 1: Verify the domain user account has access to network share and company_file dir-
ectories on the network share
1. Ensure that the log file is on a local drive and not the network share.
2. From RSA Archer Control Panel, verify the path to Logging on the Installation Settings tab.
Make certain that the log file is on a local drive and not the network share.
3. In Explorer, verify that the Domain Account has Modify or Read/Write permissions.
4. Navigate to the network share and verify that the following folders have Modify or Read/Write
permissions.
l File Repository
l company_files
l Indexes
This task ensures that the service account used by the services have Read permissions to the
relevant X.509 certificate private key. This certificate was specified during the initial installation.
For more information, see X.509 Certificates.
1. Start the Microsoft Management Console (MMC). Do the following:
a. Click Start and Run.
b. In Open, enter :
mmc
c. Click OK. The Console Root window opens.
2. Click File > Add/Remove Snap-In.
3. In Available snap-ins, select Certificates and click Add.
4. Select Computer account and click Next. The Select Computer dialog box opens.
5. Select Local computer (the computer this console is running on), and click Finish.
6. Click OK.
7. Expand the Certificates (Local Computer) and the Personal folder, and click Certificates. If the
certificate was created during the initial installation, the RSA Archer Configuration certificate is
listed.
8. Right-click RSA Archer Configuration or the certificate specified during the installation and
click All Tasks > Manage Private Keys.
9. In Group or User Names, do one of the following:
l If the account is listed, go to the next step.
l If the account is not listed, do the following:
a. Click Add.
b. In Enter the object names to select, enter the applicable object names, and click OK.
10. In Permissions for [account], do the following:
a. At Full control, clear the Allow checkbox.
b. At Read, select the Allow checkbox.
11. Repeat steps 9 and 10 for each account running the RSA Archer Services.
12. Click OK, save and close the Console window.
Each time a job process starts, it validates the Certificate Revocation List (CRL). If a RSA Archer
server does not have direct internet access, making the CRL distribution point inaccessible, a 15-
second timeout occurs before the process can to continue. This timeout can introduce a significant
delay for each job process that the Job Engine service starts.
To eliminate the 15 second delay, complete one of the following tasks:
Complete this task to disable CRL validation for the user account running the Job Engine service.
Disabling CRL validation does NOT disable signature verification. The signing certificate still
matches against the trusted root store.
1. Open Command Prompt.
2. Enter:
wmic useraccount get name,sid
3. Click OK.
4. Find the SID for user account running Job Engine.
a. At the Command Prompt, enter:
RegEdit
b. Go to HKEY_USERS > [SID of user account running Job Engine] > Software > Microsoft >
Windows > CurrentVersion\WinTrust\Trust Providers > Software Publishing.
c. In the right pane, double-click State.
d. Change Value data (Hexadecimal) from 23c00 (default, checking enabled) to 23e00
(checking disabled).
5. Click OK.
Complete this task to set a system-level HTTP proxy so that any user who logs in to the system has
Internet access without having to take another action. This situation may not be desirable behavior.
1. Open Command Prompt.
2. Enter:
netsh winhttp set proxy proxy-server=”[MyProxyServer:port]” bypass-list=”<local>,”
where [MyProxyServer:port] is populated with an actual proxy server and port number.
3. Press Enter.
1 Use the RSA Archer Control Panel to do RSA Archer Control Panel Help:
one of the following: l "Instance Configuration Settings"
l In the case of an install, create the l "Completing the Default Creation"
default RSA Archer instance,
including setting the default instance l "Setting the Default Instance"
2 Create the RSA Archer Database Running the Maintenance SQL Script
Statistics Update job to update statistics
and the RSA Archer Database Index
Rebuild job to re-index the database.
Task 1: Use the RSA Archer Control Panel to license your RSA Archer software
Refer to the topic "Registering the Instance" in the RSA Archer Control Panel Help for complete
instructions.
Task 3: Use the RSA Archer Control Panel to initialize the search indexes
See "Rebuilding Search Indexes" in the RSA Archer Control Panel Help for complete instructions.
Note: The SQL Server Agent must be running before you can execute the script.
Note: Only the package file has been imported; you must map and install the package file to
migrate the components to your instance of RSA Archer.
2. In the Available Packages section, select the Admin Dashboard package, and click Install.
3. In the Configuration section, select the components of the package that you want to install.
l To select all components, select the top-level checkbox.
l To install only specific global reports in an already installed application, select the checkbox
associated with each report that you want to install.
Note: Items in the package that do not match an existing item in the target instance are selected
by default.
4. In the Configuration section, in the Install Method and Install Option fields, select one of the
following options for each selected component.
l Create New and Update
l Override Layout(s)
l Full Install
l Override Permission(s)
5. Click Install.
6. Click OK.
7. Review the Package Installation Log.
C:\ArcherFiles\Logging Write
Important: If the Windows host is renamed, Advanced Workflow does not synchronize correctly
until the property is updated.
Enabling Elasticsearch
Elasticsearch improves how quickly data gets indexed.
Enable Elasticsearch
1. Open the RSA Archer Control Panel, and go to the Installation Settings tab.
2. On the General tab, go to the Elasticsearch section.
3. In the Elasticsearch field, select Enable Elasticsearch.
4. In the Elasticsearch Cluster field, click Add.
5. In the Cluster Name field, enter the cluster name and click OK.
6. Next to the Elasticsearch Node IP Configuration field, click Add New.
7. In the Enter URL field, enter the complete URL for the Elasticsearch Node IP and click OK.
By default, Elasticsearch listens to port 9200. This port can be configured in the configuration
file of Elasticsearch. For a secure connection to Elasticsearch, you must use 'https' (for example,
https://1.1.1.1:9200).
8. To test the availability of the IPs, select the desired URL from the Elasticsearch Node IP
Configuration field and click the Test Availability link below. Enter the username and password
to authenticate and click Submit.
The values for the user name and password entered are used by the system to authenticate and
are not stored in a database. If you want to store these values, see "Store authentication
information for instances" below.
Note: If Elasticsearch is enabled, searches containing a hyphen (-) are not indexed as a single
word. Due to this, an inaccurate number of search results may return.
Note: Even with Elasticsearch enabled, statistics mode searches use SQL queries to obtain
results. For more information, see "Running Searches in Statistics Mode" in the RSA Archer
Online Documentation.
1 Start the browser, for example IE, and This URL is established in the Web
enter the Base URL to the RSA Archer. settings in the RSA Archer Control Panel.
2 Add the following field types: Each added field is listed on the Manage
l Text with Search Results enabled Fields page.
l Attachment
l Values List with three or more values
6 Go to your home page and open the The Search Results page opens for that
application that you created. application.
For information on working with records,
see the topics called "Working with
Records" in the RSA Archer Online Help.
7 Add two new records to the application The new records appear in the Search
and save. Results page of the application.
If you created an advanced workflow,
fields in the record are updated according
to your design.
1 Go to the Search Results page for the The Search Results page opens for that
application you created. application.
2 Run a Keyword Search using text entered Records found from the search are listed
in one of the records created in the test on the Search Results page.
application.
For information on keyword searches, see "Running Searches in Applications and Questionnaires"
and "Search Options: Keywords and Phrases" in the RSA Archer Online Help.
4 Attach the file to the record. The newly attached file is a link on the
record.
For information on working with attachments, see "Working with Records" and "Data Entry" in the
RSA Archer Online Help.
3 Open an application that has Advanced The application has advanced workflow
Workflow. tab.
For information on working with advanced workflow, see "Building Advanced Workflows" in the
RSA Archer Online Help.
1 Verify that the ASP.NET 4.x is set to ISAPI and CGI Restrictions
Allowed.
2 Verify that only one authentication option Sites > Default Web Site > RSAarcher >
is set for the default web site. Authentication
1. In Control Panel, open the Programs and 1. In Finder, display /Library/Internet Plug-
Features. Ins.
2. Locate the Microsoft Silverlight row. 2. Press control and click the
3. In the Version column, verify the version. Silverlight.plugin, then select Show
package contents.
3. Display the Contents/Resources folder and
double-click Silverlight.Preferences.app.
4. Verify the version.
Important: If you do not enable downloads and popups in your browser, the Export feature may not
function properly. A security message may display when using the Export feature.
Note: Most of these tasks require access to the server on which RSA Archer Advanced Workflow
service was installed. If you do not have access, contact your system administrator.
Field Value
Field Value
Question to
Step How to find out Result Action
answer
Question to
Step How to find out Result Action
answer
Note: C:\ArcherFiles is a configurable field in the Archer Control Panel. For more information see
the Archer Control Panel documentation.
Troubleshooting Cache
When working with Cache, it is important to understand the following:
Time Zones
During the initial installation, you must establish the default time zone for RSA Archer. This time
zone becomes the default time zone for all instances and users unless you override it. You can
override the default time zone in any instance (in the RSA Archer Control Panel) or for any user (in
the User Profile of RSA Archer).
The default time zone is stored in RSA Archer as Coordinated Universal Time (UTC). RSA Archer
uses this time standard for converting time and dates based on the instance or user locale. All time is
stored as UTC and converted based on the time zone of the user.
Each user account has a time zone associated with it. RSA Archer uses this time zone to
standardize dates and times entered by a user. When a date field includes the time component, it
uses the time zone to store the date and time in the database as UTC and displays it to other users
based on the time zone associated with the User Profile of the other user.
All values for date fields entered in RSA Archer reside in the database as UTC. However, the
Display Control type determines how RSA Archer handles time.
l For Date only, RSA Archer truncates the time.
l For Date and Time, RSA Archer converts the time based on the time zone associated with the
user profile.
User 1 enters the date 11/14/2017 and the time 10:13 P.M. in record A.
Action The date and time are converted based on the time zone of user 1. As a result the
date and time are stored in the database as 11/15/2017 04:13:00 UTC.
Data feeds and calculated fields use UTC. Consider a calculated field with the DATEFORMAT
function with Example 2, the date and time is displayed as 8/15/2012 04:13:00 UTC for all users
regardless of their time zone. The date and time are stored in a text field. When the date and time is
stored in a text field, the data is not converted because RSA Archer recognizes the date as text only.
The DATEFORMAT(NOW(),"yyyy-MM-dd hh:mm tt") function displays the current date and time
in UTC in the format you want. If you want to store it in a Date Field with time enabled, convert the
literal to a date time serial value.
DATETIMEVALUE(DATEFORMAT(NOW(),”yyyy-MM-dd hh:mm tt”)) displays the current date
and time converted from UTC to the current time zone of the user because the data is being
displayed in a Date field with time enabled.
A time zone is required when creating schedules to run processes like data feeds and scheduled
recalculations. If the time zone is not specified, the default time zone for the instance is used. This
time zone is set up in RSA Archer Control Panel during the initial installation. For more information,
see the RSA Archer Control Panel Help.
X.509 Certificates
The installation process requires an X.509 certificate. RSA Archer uses this certificate for
authentication between the Web Application and Archer services.
You can create a new certificate during the initial installation of RSA Archer. The certificate is
named RSA Archer Configuration and saved in the Personal area of the certificate store. Export this
certificate for use in future installations. You must always use the same certificate in subsequent
installations.
You can change the certificate later. To change the certificate after installation, rerun the installer,
select only Web Application and Services, and then select the Use a different certificate option.
If you already have an X.509 certificate, determine its location and provide that information when
requested during the installation.
Installation Options
During a new installation, RSA Archer prompts you to either create an X.509 certificate, import an
existing certificate, or select an existing certificate already in the certificate store. It is
recommended to create a new X.509 certificate for all new installations unless you have an existing
certificate.
Create a certificate
Create the RSA Archer Configuration certificate and save it in the Personal store of the certificate
store. If you choose to create a new certificate, the new certificate does not interfere with other
certificates in IIS, such as an SSL certificate. Make a note of this certificate so that you can use it
during the installation. The new X.509 certificate has the following parameters:
Parameter Value
Designates an existing certificate not yet imported into the certificate store. If you select to import a
certificate, you must select the file in which the certificate is located and provide the password to
the private key.
The X.509 certificate used for authentication to the RSA Archer Configuration service does not
interfere with other certificates used within IIS, such as your SSL certificate.
11. Designate a password to protect the private key, and select a local directory in which to export
the certificate.
Note: The permissions on the X.509 Certificate used by the web and application servers grant the
Active Directory domain account read access to the private key.
Installation process
1. Plan for installation.
2. Install the RSA Archer.
3. Update the web.config file on Web Servers.
4. Configure load balanced URL on software or hardware load balancer.
5. Verify RSA Archer can be accessed via the load balanced URL.
6. Test the installation.
Task 1: Preparation
Before configuring the Web Servers for load balancing, do the following:
1. Verify that load balancer, application, and database servers are located on the same local area
network.
2. Verify that you have the Platform installation package.
3. Verify that you have administrative access for all applications and Web Servers that will host the
RSA Archer Platform.
4. Create an X.509 Certificate to be used for authenticating to the configuration service from the
Web Application and RSA Archer Services. The certificate may be a new or existing
organizational X.509 Certificate, or you may elect to self-generate it as part of the installation
process.
5. Generate a common Machine Key to be used by IIS on all web farm servers.
6. Set up an Active Directory domain account for impersonation purposes, and configure a UNC-
accessible SMB file share accessible by all servers running RSA Archer application code.
These servers are used to host common files such as search indexes, file repository, and
company files.
7. Configure least-privilege permissions on a file system and shared directory structures, which will
host common files and verify that the Active Directory domain account has appropriate access to
the network share.
8. Modify the identity of the application pool used by the RSA Archer web and application services
for the Active Directory domain account configured above.
l Encryption Method
l Decryption Method
b. In the Validation Key and Decryption Key sections, clear any selected options.
c. In the actions panel, select Generate Keys.
4. In the Actions panel, click Apply to save the generated keys to the web.config file.
The generated keys appear in the Validation key and Decryption key sections.
5. For all subsequent Web Servers, do the following:
a. Copy the generated key values from the Validation key and Decryption key sections.
b. At the other Web Servers, repeat steps 1 - 3b to generate the machineKey.
c. Paste the values from the generated machineKey into the respective Validation key and
Decryption key boxes on the Machine Key page.
d. In the Actions panel, click Apply.
Note: Currently, Offline Access supports the Audit Engagement, Audit Entity, Audit Plan, Audit
Workpaper, IA Engagement and Assessment Results, Internal Audit Department Annual Review,
Plan Entity and Question Library applications.
Memory 8 GB RAM
Important: Microsoft Sync Framework 2.1 is required and must be installed on the Services Server.
For more information, see Preparing the Services Servers.
By default, the offline access data is stored on the local computer at C:\Users\
[username]\AppData\Roaming\RSA Archer\Offline Access\. Isolating the offline access data
ensures that each offline access user has their own environment for working offline. For example,
when a user purges offline access data, only the offline access data of that user is purged.
Anti-virus and firewall applications may interfere with Offline Access run-time activities. You must
add the Offline Access installation file as a trusted file/process/installer/updater for any anti-virus
and firewall applications that may interfere with the installation.
Before running offline access, start the Distributed Transaction Coordinator service on the laptop
using offline access.
Important: You must have administrator rights to install offline access. If you are upgrading offline
access, close the Offline Access utility before starting the installation.
Property Value
Message Logging
A log is a chronological record of system activities that enables the reconstruction and examination
of the sequence of environments and activities surrounding or leading to an operation, procedure, or
event in a security-relevant transaction from inception to final results.
RSA Archer logs Event Tracing for Windows (ETW) trace events and writes log messages to a
specified database. ETW is a kernel-level API that enables high-performance data collection and
tracing in Windows. It enables you to start and stop event tracing at a granular level, log to a very
efficient buffering system, and consume events across a system.
You can monitor the log messages with any tool that consumes ETW trace events. Message logging
provides an easier way to troubleshoot processing jobs when errors occur. For example, you can use
this log to troubleshoot errors that might occur in a data feed job. Messages are grouped by each data
feed with a Start and Stop event so that you can easily identify where the data feed failed.
Third-party tools request either the Provider Name or the Provider ID in order to consume the trace
events generated in RSA Archer:
l Provider ID: 472DD2D1-1B28-5523-9DDD-B4DEB8924408
l Provider Name: RSA-Archer-GRC-Platform
If you are using message logging, you must create a database dedicated to the RSA Archer
Instrumentation service. Do not use the same database that stores instance or configuration data.
Note: If you are specifying an account other than the Local System account to run the services and
you are using the RSA Archer Instrumentation service, you must add this user to the Performance
Log Users group to grant permission to write to ETW.
Log Description
The following table shows the security-relevant logs provided by RSA Archer.
Component Location
Component Location
RSA Archer Error Logs File system in the configured logging directory
Azure (Standard_
Element Small Environment AWS (m4.xlarge)
DS3 package)
Memory 16 GB 16 GB 14 GB
Note: This table describes hardware requirements only. To understand all requirements for your
configuration, see "Sizing Guidelines" in the RSA Archer Platform Planning Guide.
For more information about the different vendor products offered, review the Azure and
AWS documentation:
l For Azure, see https://docs.microsoft.com/en-us/azure/.
l For AWS, see https://aws.amazon.com/.
For more information about configuring Elasticsearch, see "Enabling Elasticsearch" in the
RSA Archer Control Panel Online Help.
Geocoding
If your environment uses geocoding, configure geocoding for RSA Archer. Three geocode keys are
included in the Web Configuration file.
The following table describes each geocode key.
Geocode Key Description
GeoCodeChunkSize The number added to the payload size for the network
traffic from the RSA Archer Client and the RSA Archer
Server. When the value is high, each requested geocode
payload size is high. When the value is low, each
requested geocode payload size is low.
The number of the geocodes that must be added. By
default, the GeoCodeChunkSize value is 100.
For more information about configuring Maps, see "Registering Your Bing Maps Account for
Whitelisting IP Addresses for an Instance" in the RSA Archer Control Panel Online Help.
Database Microsoft SQL Server 2016 SP 1 (64-bit) or 2016 Enterprise Edition (64-bit) or
2017 (64-bit)
SQL Express is not supported
Web and Microsoft Internet Information Services (included in Microsoft Windows Server
Services 2012 R2 or 2016
Microsoft Office 2010 or 2013 Filter Packs (to enable indexing of MS Office
files) Requires Microsoft Filter Pack 2.0 or later.
Microsoft Sync Framework 2.1 (for offline access)
For instructions on installing RSA Archer on a single server, see Installing All Components on
a Single Server. The following figure illustrates a single-server configuration.
Note: Make sure to select the same components previously installed before running the upgrade.
If running the installer against a specific component is required, ensure that the other components
installed on the same server are also selected—otherwise, the installer will uninstall them.
Clearing the Services component results in all installed services except for the Configuration
Service and Advanced Workflow Service being uninstalled. Clearing the Advanced Workflow
Service results in that service being uninstalled.
l Web Application
l Services
l Instance Database
l Advanced Workflow
2. Click Next.
Important: You must use the same X.509 certificate during installations on all types of servers. For
more information, see X.509 Certificates.
b. In Specify the file to import into the certificate store, click and select the certificate
file.
c. Click OK.
d. In Type the password for the private key, enter the applicable certificate password.
o If selecting from a certificate store, do the following:
a. Choose Select from certificate store.
b. In Select a certificate from the store, expand the category and select the certificate.
2. Click Next.
1. Enter the port to securely communicate with the Advanced Workflow Service in HTTPS Port.
2. Do one of the following:
Note: The port numbers for Advanced Workflow REST URL and Advanced Workflow
Communication Port cannot be the same when using HTTPS. For example, by default, the
Advanced Workflow REST URL default port is 8443 and the Advanced Workflow
Communication default port is 8000.
l Use HTTPS
o Specify where to obtain the X.509. Do the following:
n If using current certificate, select Use current certificate.
Note: This option is unavailable, if this is the first installation for your configuration.
Note: If the system detects the specified port number is in use, you must confirm you wish
to replace the certificate bound to the specified port.
Note: If this is a new install, the system populates this field with information from the
certificate and HTTPS port used to configure Advanced Workflow HTTPS.
c. Click Next.
Note: If the installer detects a timezone, the web application options page opens and you can move
on to task 11.
1. In Website, select the destination site for the RSA Archer Web Application.
2. Under Destination directory, verify that destination directory is set to the Web Application
installation:
l Install in the website's default application.
l Install in an IIS application.
3. Click Next.
4. Click Yes to confirm the destination directory.
b. In Specify the file to import into the certificate store, click and select the
certificate file.
c. Click Open.
d. In Type the password for the private key, enter the applicable certificate password.
n If selecting from a certificate store, do the following:
a. Select from certificate store.
b. In Select a certificate from the store, expand the category and select the certificate.
2. Click Next.
Important: It is recommended to remove any existing HTTP binding from IIS to ensure secure
configuration.
Note: To allow correct RSA Archer Services installation, ensure that Log on as a Service is enabled
for the Window Services Account.
Note: It is recommended that you do not install Web Application or products in the same virtual
directory or Root of Archer. Browsers send Cookies if more than one Web Application resides in
same space; this behavior may lead to passing RSA Archer cookies to any other application
installed in same Root or Virtual Directory.
3. Click Finish.
The RSA Archer Control Panel opens.
Preparation Checklist
This checklist is for a new installation and is provided for your convenience.
See Preparing the Database Server for information on completing each task.
See Preparing the Web Servers for information on completing each task.
See Preparing the Services Server for information on completing each task.
Installation Checklist
You must perform all new installations on the designated servers for the web and services roles. If
you are upgrading RSA Archer from an earlier version, please see Upgrading RSA Archer.
Run this installation on each web and Services Server. See Installing the Web Application and
Services Components for more details.
q Task 10: Set the default time zone for the configuration
database
q Task 16: Set the path for the installer log file
Run this installation on each Services Server. See Installing the Services for more details.
q Task 10: Set the path for the installer log file
Upgrade Installation Checklist
This checklist is for a upgrade installation and is provided for your convenience.
You may perform upgrades on all components at once or on individual components separately. If you
are installing RSA Archer on a fresh system, please see Installing RSA Archer.
Verify the version of RSA Archer that you are using.
Run the upgrade on all web and Services Servers. Refer to Upgrading All Components for details.
q Task 10: Select the language for RSA Archer and content
q Task 16: Set the path for the installer log file
Run the upgrade on Services Servers only. Refer to Upgrading the Services Servers for details.
q Task 11: Set the path for the installer log file
Run the upgrade on all Web Servers only. Refer to Upgrading the Web Servers for details.
q Task 11: Select the language for RSA Archer and content
q Task 16: Set the path for the installer log file
Activation Checklist
This checklist is for configuring your servers after an installation or upgrade and is provided for your
convenience. If you choose to document your installation, including passwords, secure the document
so you can protect passwords and configuration settings by keeping them confidential.
See Configuring the Web Server for more details. These steps are performed in the Internet
Information Services (IIS) manager, unless otherwise specified.
If you use Advanced Workflow, configure it accordingly. Review the following tasks and complete
any that are applicable to your environment. See Configuring Advanced Workflow for more details.
Validation Checklist
Use this checklist to ensure that RSA Archer is operational and that you have validated key
functionality. As with any system implementation, testing is vital. While this checklist helps you
ensure basic functionality, RSA recommends developing a more robust test plan to meet your
specific business practices.
This checklist is for verifying an installation or upgrade. It is provided for your convenience. If you
choose to document your installation, including passwords, secure the document so you can protect
passwords and configuration settings by keeping them confidential.
See Validating RSA Archer as a companion to this checklist.
RSA Archer Testing
If the RSA Archer Login page does not open, use the following section to troubleshoot system
components.
If the RSA Archer Login page does not open, use the following section to troubleshoot system
components.
Preparation Worksheet
This worksheet is for a new installation and is provided for your convenience.
Important: If you choose to document your installation, including passwords, secure the document
so you can protect passwords and configuration settings by keeping them confidential.
For more information, see Preparing RSA Archer for Installation as a companion to the worksheet.
Activation Worksheet
This worksheet is for configuring your servers after an installation or upgrade and is provided for
your convenience. If you choose to document your installation, including passwords, secure the
document so you can protect passwords and configuration settings by keeping them confidential.
For more information, see Activation Process as a companion to the worksheet.
Verification Worksheet
Use this worksheet to track details throughout the verification process. Remember to secure your
documents to protect passwords and configuration details.
Verification Worksheet
Service Account:
Automated
Manual
q Activation method
Client Computers
The following list is the recommendations for users accessing RSA Archer on client computers.
Component Description
For a list of supported third-party components in RSA Archer, see "RSA Archer Qualified and
Supported Environments" in the RSA Archer Online Help.
Component Description
Memory 8 GB RAM
RSA recommends that your client computers have dual CPU processors. The recommended disk
space is conditional upon the amount of data you download to the client computer.
For installation instructions, see Installing Offline Access.
Important: Do not perform this task if you are upgrading to a later version of RSA Archer. Run the
installer to upgrade the RSA Archer components. Make certain that the ArcherInstall.exe file is in
the same location it was when you installed RSA Archer. The unistall program needs to find this file
and uses its original path. If the file is no longer there, the uninstall will not work.
Appendix G: Reconciling Advanced Workflow Apply Conditional Layout Action Changes 131
RSA Archer Platform Installation and Upgrade Guide
When you install 6.2 or later, the system identifies those DDEs in your instance that are associated
with advanced workflow layout objects, removes the layout objects, and writes the results to the
DDE log file. After installing 6.2 or later, you must review the log file to determine the DDEs that
are affected by the changes and add permissions or rules to action buttons and user-initiated buttons
to that advanced workflows function as you intend.
Important: There is no automatic migration. You must manually convert any affected DDEs to
transition and/or user-initiated permissions and rules after upgrading to release 6.2 or later. The log
file also only returns results for applications and questionnaires that you have licensed at the time of
the upgrade. If you update your license key after installing release 6.2 or later, and that license key
provides access to additional applications that you did not previously have, the log file will not
identify any affected DDEs in the newly-licensed applications. To update core applications, you can
apply the appropriate 6.2 or later use case packages. These packages will update the advanced
workflows with new permissions and rules for action buttons and user-initiated buttons.
Reconcile DDEs
1. Open the DDE log file, which is located in the folder designated in the Log Path field during
Platform installation.
The log file contains two sections that list the affected DDEs in your system and what action
was set in the DDE prior to upgrade. One section lists DDEs that affect user-initiated buttons
and the other section lists DDEs that affect transition buttons.
User-initiated buttons:
Column Description
Appendix G: Reconciling Advanced Workflow Apply Conditional Layout Action Changes 132
RSA Archer Platform Installation and Upgrade Guide
Column Description
Node Name The node name associated with the outgoing transition.
Layout Name The layout associated to the node which also contains the affected DDE
action.
2. For each affected action, look at the rule associated with that action and determine which of the
following scenarios applies:
Users/groups
Scenario Intent of rule Convert to
applied to
User Action
Associated DDE rule Associated DDE action
transitions
Submit to Business Record Status Equals Disable both buttons for everyone
Unit Manager New or Updated except the Risk Manager
Submit to Risk
Specialist
Appendix G: Reconciling Advanced Workflow Apply Conditional Layout Action Changes 133
RSA Archer Platform Installation and Upgrade Guide
Because this action only applies to specific users and the rule always evaluates to true, this DDE
was likely intended to determine who could follow this transition. In release 6.2, you would
replace this DDE by configuring permissions on the transition itself:
Submit to Business Unit On each transition, create a permission and select the Risk
Manager Manager
Submit to Risk Specialist
Scenario B example
In release 6.1, say that you have the following transition out of a User Action node and an
associated DDE:
User Action
Associated DDE rule Associated DDE action
transition
Submit to Risk Risk Specialist Equals No Disable the Submit to Risk Specialist
Specialist Selection button for all users
Because this action applies to all users and the rule only evaluates to true under certain
conditions, this DDE was likely intended to determine when the transition could be followed. In
release 6.2, you would replace this DDE by configuring a rule on the transition itself:
3. Convert each affected DDE to rules and/or permissions. For detailed steps on configuring rules
and permissions, see "Building Workflows" in the Online Documentation.
Appendix G: Reconciling Advanced Workflow Apply Conditional Layout Action Changes 134
RSA Archer Platform Installation and Upgrade Guide
7. Save WpServiceHost.exe.
8. Run Windows Services as Administrator.
9. Scroll until the RSA Services appear.
a. Right click RSA Archer Workflow service.
b. Select Start.
10. Close Windows Services.
Renamed Fields
The following table lists the fields that were renamed in RSA Archer 6.0 or later.
Old Field Name New Field Name Field Type Required Locked
New Fields
The following fields were added to the application in RSA Archer 6.0 or later.
Important: These are new Subject and Priority fields, not the renamed fields mentioned previously.
Updated Fields
The following fields were not previously required to include data in them, but now must contain data
for core 6.1 functionality:
l Subject (New)
l Priority (New)
l Status
Important: If you have previously used the Task Management application, ensure that the Status
fields are populated in the application before upgrading.
Appendix J: Importing RSA Security LLC Certificate into Trusted Root CA Store 139