FastPass Password Manager v3.4 - Installation Guide (revision G)
Transcription
FastPass Password Manager v3.4 - Installation Guide (revision G)
FastPass Password Manager Version 3.4.2 Installation Guide Installation Guide Document Title Document Classification Document Revision Document Status Document Date Installation Guide Public G Final October 6, 2012 The specifications and information in this document are subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. This document may not be copied or distributed by any means, in whole or in part, for any reason, without the express written permission of FastPassCorp A/S. © 2004 - 2012 FastPassCorp A/S. All rights reserved. Lyngby Hovedgade 98, 2800 Kongens Lyngby, Denmark. http://www.fastpasscorp.com/. FastPass Password Manager is a trademark of FastPassCorp A/S. All further trademarks are the property of their respective owners. Limited Warranty No guarantee is given for the correctness of the information contained in this document. Please send any comments or corrections to [email protected]. Status: Final Date: October 6, 2012 Page 2 of 68 Installation Guide Table of Contents 1. 2. 3. Introduction.........................................................................................................................................................................5 1.1 Purpose .......................................................................................................................................................................5 1.2 Audience .....................................................................................................................................................................5 1.3 References ..................................................................................................................................................................5 1.4 How to use this document ..........................................................................................................................................5 1.5 Terms ..........................................................................................................................................................................5 About FastPass Password Manager.....................................................................................................................................6 2.1 The architecture of FastPass Password Manager .......................................................................................................7 2.2 Integration to Microsoft Active Directory ..................................................................................................................8 Installing FastPass Password Manager ..............................................................................................................................10 3.1 3.1.1 Defining the deployment architecture .................................................................................................................10 3.1.2 Creating User Accounts and Groups.....................................................................................................................12 3.1.3 Preparing the application servers ........................................................................................................................15 3.1.4 Preparing the target AD .......................................................................................................................................25 3.1.5 Requesting a FastPass Password Manager license ...............................................................................................26 3.2 5. Installing FastPass Password Manager .................................................................................................................26 3.2.2 Preparing the ADAM instance for FastPass ..........................................................................................................30 3.2.3 Initializing the FastPass Password Manager solution ...........................................................................................34 3.3 Service restart ...........................................................................................................................................................37 3.4 Configuring the FastPass Password Manager solution .............................................................................................37 Accessing the Administration Client ..................................................................................................................... 37 Installing the stand-alone FastPass Client .........................................................................................................................39 4.1 Installing ...................................................................................................................................................................39 4.2 Configuring the client ...............................................................................................................................................41 Installing Multisystem Password Reset and Synchronization ...........................................................................................45 5.1 Installing SQL Express ...............................................................................................................................................45 5.2 Configuring Microsoft SQL-Express for use with Sync Server ...................................................................................51 5.2.1 6. Installing ...................................................................................................................................................................26 3.2.1 3.4.1 4. Preparing the Installation .........................................................................................................................................10 Enabling encryption for SQL server ...................................................................................................................... 53 5.3 Pre-requisites for the connectors .............................................................................................................................54 5.4 Install Password Sync Server ....................................................................................................................................54 Additional information ......................................................................................................................................................59 Status: Final Date: October 6, 2012 Page 3 of 68 Installation Guide 7. Appendices ........................................................................................................................................................................60 7.1 Appendix A: Backing Up AD LDS Database on Windows 2008 Server. ....................................................................60 7.2 Appendix B: Restart FastPass Services .............................................................................................................................67 7.3 Appendix C: Recommended changes when installing for more than 10.000 users ................................................68 7.3.1 Separate ADAM instances......................................................................................................................................68 7.1.1 Tweaking ADAM/ADLDS settings .........................................................................................................................68 Status: Final Date: October 6, 2012 Page 4 of 68 Installation Guide 1. Introduction The document has last been updated October 6, 2012 and is now targeted the FastPass Password Manager version 3.4.2 1.1 Purpose The purpose of this document is to describe the steps included in the process of performing a FastPass Password Manager implementation. Although the document is written as a tutorial for performing a real installation the reader shall expect to change input values to match the standards and requirements of their own environment. 1.2 Audience The intended audience of this document is personnel either responsible for, preparing or performing the application installation. 1.3 References This document references the following documents: Version 3.4.2 Administrators Guide. 1.4 How to use this document Chapter 3 outlines the installation process. Chapter 4 describes the preparation steps for the installation. Chapter 5 describes the actual installation. 1.5 Terms The following technical and product specific terms are used without further explanation throughout the document. Status: Final Date: October 6, 2012 Page 5 of 68 Installation Guide 2. About FastPass Password Manager FastPass Password Manager is a secure web-based solution offering self-service password operations to end-users. Users are required to remember many more complex passwords on more systems than ever before. Research suggests that 30% of all calls to Help Desks are related to forgotten passwords. Built to use Active Directory as the authoritative repository, FastPass are capable of delivering an instant ROI by deploying in just a few hours on your existing Microsoft environment. Further value can be gained by integrating these tools with Microsoft Identity Integration Server (MIIS/ILM 2007) for an industry leading Identity and Access solution. Introduce Self-Service Users only need a web browser to access FastPass whether on the corporate intranet or across the internet. In addition an easily integrated deployment via SharePoint Portal or the SAP Portal gives a secure single point of entry to all applications and supports anonymous access for users who have forgotten their passwords. FastPass enables self-service enrollment and password resets as well as self service account mapping utilizing the same Web UI and saving directly into Active Directory. Captured password resets can be synchronized across multiple platforms without integration to Microsoft Identity Integration Server (MIIS/ILM 2007). FastPass help to reduce the workload within the Help Desk, Increase end-user productivity and Strengthen Security A Password Management solution from FastPassCorp saves both time and money for all parties involved: . For Executives: • • • • • Reduce workload in help desk Make it possible for your employees to access systems even when the Help Desk is closed Enhance security Leverage past investments in Active Directory or ADAM Achieve ROI within 3-9 months (no investment needed) For Help Desk Managers: • • • • • • Remove 30% of calls to help desk Enhance logging and reporting Significantly lower total cost per forgotten password Increase employee satisfaction Easy implementation (from minutes to days depending on complexity) Easy roll-out using automated enrollment services For Employees: • • • • • Extremely fast solution to a forgotten password situation Access to systems 24/7/365 No need to involve others No barrier to comply with strict password security policies Simple to use Status: Final Date: October 6, 2012 Page 6 of 68 Installation Guide 2.1 The architecture of FastPass Password Manager The following describes and illustrates the architecture of FastPass Password Manager. From a user perspective the Password Manager is offering web based self-service features to maintain passwords in the enterprise. This is what is illustrated below. Logically the Password Manager Server is built of multiple sub components each offering its own set of functions for the total solution. The main components are listed in the table below: Component Backend Server Client Server Gateway Server Description Implement the control of all end-user transactions, communication to the Gateway Server, scheduled discovery of users in the domain infrastructure, control and coordination of password synchronizations, invitations of users and much more. Implements the Web-interface for the end-users and communicates with the Backend Server. Implements the access to the domain infrastructure and other Password Sync target systems. All three main components are by default installed on the Password Manager Server and are directly configured to operate together. A full implementation can be built on additional Client Servers and Gateway Servers and this is shown on the illustration below. Status: Final Date: October 6, 2012 Page 7 of 68 Installation Guide The solution is built as a service oriented architecture meaning that all main components are web services implemented in Microsoft Internet Information Server (IIS) and communication using SOAP over HTTPS. 2.2 Integration to Microsoft Active Directory Password Manager supports easy integration into multiple Microsoft Active Directories from a single implementation. The configuration is done from the Password Manager Administration Client implemented as part of the Password Manager Backend Server. The communication to the Active Directory infrastructure is done from the Password Manager Gateway Server. The integration is implemented using LDAP v3 communication and this can optionally be implemented to use either secure mode or SSL mode. Secure mode is the default and the one used by Microsoft Active Directory internally for synchronizing passwords between Domain Controllers. Password Manager requires the following parameters to be configured to be able to access a Microsoft Active Directory Domain. Parameter Domain Name Domain Alias Status: Final Date: October 6, 2012 Description The full qualified domain name of the domain like mycorporation.com. A label typically the same as the NetBIOS name for the domain which is what is Page 8 of 68 Installation Guide LDAP Base DN Connection Mode Domain Account Name Domain Account Password shown in desktop login interfaces. The distinguished name (DN) to use as the offset in the LDAP tree structure. This can point to an Organization Unit (OU) like in OU=Employess,DC=mycorporation,DC=com or to the root node like in DC=mycorporation,DC=com. The connection mode to use for the communication. Microsoft Active Directory offers the modes normal, secure and SSL but Password Manager only supports Secure and SSL mode. The secure mode used Kerberos for the authentication which is dependent on normal domain communication from the Password Manager Gateway Server and to the Domain Controller in addition to communication on port 389 (TCP). The SSL mode requires a certificate to be implemented on the Domain Controller which is not a trivial task but then as an advantage it only requires communication on port 636 (TCP) from the Password Manager Gateway Server and to the Domain Controller. The name for the account with privileges to read user attributes and to reset passwords. The password for the account specified. All parameters are stored in the Password Manager Data Storage (ADAM / AD LDS) and sensitive information like account name and password is stored with strong encryption. (ADAM and AD LDS are both names for the database that has FastPass uses for storing data. Under Windows Server 2003 the name was ADAM under Windows Server 2008 the name has changed to AD LDS further in this document AD LDS will be used, but essentially they are identical.) Status: Final Date: October 6, 2012 Page 9 of 68 Installation Guide 3. Installing FastPass Password Manager The task of installing FastPass Password Manager can be described as in the following list: 1. 2. Preparing the installation a. Defining the deployment architecture b. Creating user accounts and groups c. Preparing the application server 1. Implementing pre-requisites 2. Preparing IIS servers 3. Installing ADAM/AD LDS and/or creating an ADAM/AD LDS instance d. Preparing the target AD e. Requesting a FastPass Password Manager license Installing and configuring the software a. Installing FastPass Password Manager b. Preparing the AD LDS instance for FastPass Password Manager c. Initializing the FastPass Password Manager solution d. Configuring the FastPass Password Manager solution When knowing the steps and requirements the actual installation can be done in less than half an hour. It is recommended that all details of accounts, groups, hostnames and IP addresses are carefully noted and kept securely for later use. 3.1 Preparing the Installation Generally, it is recommended that all machines be patched and scrutinized for security optimizations. FastPass Password Manager is a password management application that requires to be highly and efficiently secured. Special care should be taken on passwords for the accounts used by FastPass Password Manager. 3.1.1 Defining the deployment architecture The architecture of the FastPass Password Manager solution is very flexible – meaning that it can be implemented in many different ways reflecting various requirements. For most implementations a single or two servers are sufficient and this/these can without problems also be running as virtual servers and/or on shared servers. This typical environment looks like shown in the illustration here below. Status: Final Date: October 6, 2012 Page 10 of 68 Installation Guide To support large multi-organizational and Service Providers needs where network complexity and security disallows the communication to go from a central server to AD servers or other target types on remote networks additional servers might be required. For this scenario FastPass Password Manager can be installed with multiple Client Servers and/or Multiple Gateway Servers. The illustration below gives an example of such a deployment scenario. Status: Final Date: October 6, 2012 Page 11 of 68 Installation Guide No matter what deployment scenario is needed fault tolerance is always a matter and since FastPass Password Manager is only using well-known technologies such as IIS and AD LDS, there is build-in support of using various clustering technologies like Microsoft Cluster. Since FastPass Password Manager is also relatively uncomplicated to handle when it comes to backup and restore exercises it is also not uncommon that customers choose to select this as their fault tolerance strategy where a new environment can typically be build in just 30 minutes. In the remaining sections of this document the typical deployment architecture is described. For information about complex deployments please contact us by sending an email to [email protected]. 3.1.2 Creating User Accounts and Groups FastPass Password Manager makes use of a number of accounts and groups which shall be created prior to the installation. All accounts can be named as wanted or existing accounts can be used. The use of accounts doesn’t have to be consistent throughout managed domains but we recommend that a standard similar to this is used. NOTE: If our suggested names are not planned to be used it is recommended to write the alternate names in the schema. Status: Final Date: October 6, 2012 Page 12 of 68 Installation Guide ACCOUNTS FPADAMUser DETAILS Description: Used to manage the ADAM instance used for FastPass data repository. Username: ____________ Password: ____________ Member of: + Domain Users or Users Special privileges: n/a Where to create: In the domain of the FastPass Backend Server or as a local user on the FastPass Backend Server. Note: The create ADAM instance tool delivered from Microsoft do not allow blanks and certain special characters in passwords for this account. FPIISUser Description: Used to run the IIS Application Pool. Username: ____________ Member of: + Domain Users or Users + IIS_WPG + IIS_IUSRS (local group) Password: ____________ Special privileges: + Log on as a batch job Where to create: In all domains hosting FastPass components or as local users on all servers hosting FastPass components. Note: This account can be created by the FastPass installers. Just specify the username and the installer will prompt for confirmation to create the account. FPGWUser Status: Final Date: October 6, 2012 Description: Authentication to Gateways for remote configuration Page 13 of 68 Installation Guide Username: ____________ Password: ____________ Member of: + Domain Users or Users + FPGWGroup Special privileges: + Log on Locally Where to create: In all domains hosting the FastPass Backend Server or FastPass Gateway Server components or as local users on the servers (recommended). FPDomainAdmin Description: The administrative user used against Active Directory. Username: ____________ Member of: + Domain Users Password: ____________ Special privileges: + Domain Admin or delegated permissions Where to create: In all managed domains Note: Read and follow the description for defining this privileged account with delegated permissions refer to the “Delegating permissions in Active Directory” document. Alternatively for this somehow complicated process of defining an account the account can also just be made member of the Domain Admins group. All groups can be named as wanted or existing groups can be used. The use of groups doesn’t have to be consistent throughout managed domains but we recommend that a standard similar to this is used and we highly recommend that the FastPass Admins group is created instead of using an existing group. NOTE: If the suggested names are not planned to be used it is recommended to write the name of the alternate group in the schema. GROUPS FastPass Admins Status: Final Date: October 6, 2012 DETAILS Description: Page 14 of 68 Installation Guide Users that can use the FastPass Administration Client to administer the FastPass solution Group: _______________ Member of: + Domain Users or Users Special privileges: + Log On Locally (on the gateways) Where to create: In the domain of the FastPass Server or as local group on the server. FPGWGroup Description: Users that can reconfigure the FastPass Gateway Group: _______________ Member of: + Domain Users or Users Special privileges: + Log On Locally (on the gateways) Where to create: In the domain of the FastPass Backend Server and of the FastPass Gateway Servers or as local users on the servers. 3.1.3 Preparing the application servers The application servers are the servers running the FastPass components, which are all implemented as Web-Services. Preparing means: • Installing .NET Framework 3.5 SP1 • Implement software pre-requisites • Implement IIS and a SSL certificate • Implement AD LDS and/or create an AD LDS instance The following sub-sections describe how to perform these tasks. 3.1.3.1 Pre-requisites The following table lists the software pre-requisites for various FastPass Password Manager Components. Status: Final Date: October 6, 2012 Page 15 of 68 Installation Guide FastPass Gateway Server X Windows Client X X X X X X X X X X X X Windows 7 (64 bit) X X Windows 7 (32 bit) FastPass Client Server + Self-Service Client + Mobile Self-Service Client + Service Provider Client X Windows Vista (64 bit) X Windows Vista (32 bit) X Windows XP (64 bit) AD LDS/ADAM SP1 X Windows XP (32 bit) IIS 7.0 and 7.5 FastPass Backend Server Windows Server 2008R2 (32 bit) Windows Server 2008 R2(64 bit) Windows Server 2003 R2 (32 bit) Windows Server 2003R2 (64 bit) IIS 6.0 FastPass will have to connect to a domain controller running Windows server 2003 or 2008 including R2 releases. FastPass is not compatible with Windows Server 2000 Domain Controllers. X X X X X X Besides these pre-requisites it shall also be mentioned that we currently only support Internet Explorer 6.x and higher for interfaces but that other web browsers is known to be working. 3.1.3.2 Preparing IIS servers FastPass Password Manager operates almost completely as a pure web-application where all components use SOAP over HTTPS for communication in a true SOA architecture. This means that the application usually can be installed on existing servers and thereby utilize hardware investments even more efficiently. The most important requirements when choosing a server is security and stability and just as for the connections to the AD there is also a requirement for having trusted certificates implemented. SSL-encryption of communication is mandatory for all communication between the Backend Server, Infrastructure Gateway and User Repository. Although unencrypted communication can be configured to be accepted between some components this is absolutely not recommended and should only be done if components are installed on the same machine and when this machine is live audited by a remote system. (Anyway a certificate will be needed to install the product) As for the AD communication both certificates signed by well-known certificate authorities as well as self-signed certificates is accepted as long as the certificate path is known by the system calling the IIS server. To register a CA certificate, required for the SSL encryption, you may follow the steps below. 1. In the Microsoft Management Console, add a snap-in. 2. Add certificates – for Computer Account, choose Local Computer. 3. In Trusted Root Certification Authorities, choose to Import. 4. Browse to the CA certificate for the CA that has signed the certificate used on the IIS server. 5. Verify that Place all certificates in the following store is ticked. Status: Final Date: October 6, 2012 Page 16 of 68 Installation Guide 6. The Server, Client and Gateway installer programs all check not just for the presence of a certificate but also if it is required and if not, presents a warning. The easiest method to test for a valid certificate is opening an https connection from a web-browser to the IIS server. If the browser warns about an invalid certificate then the certificate path is not recognized and accepted by the local system. Port numbers are configurable in the solution but it is recommended to use 443 since this typically does not meet restrictions in network configurations. Windows Server 2008 users have to install the Metabase Compatibility as shown in Figure 1 Figure 1 Preparing IIS7 on Server 2008 – installing Metabase Compatibility For security and stability reasons FastPass recommends only adding the following Role Services to the web server installation: Status: Final Date: October 6, 2012 Page 17 of 68 Installation Guide Figure 2 Advised role services to install for the Web Server on Windows 2008 3.1.3.3 Installing AD LDS and/or creating an AD LDS instance As written and illustrated above the FastPass Password Manager uses a Microsoft AD LDS instance as data repository. If you are installing Password Manger for use by more than 10.000 users please refer to Appendix C regarding split AD LDS instances and tweaking of the default settings. The recommendation is to install AD LDS on the same machine as the FastPass Server but it is not required. To secure data in the best possible way a dedicated instance is required and the issues to take into account are included in the following list. Please note the values that are given during the installation. You will need them when installing the Data Repository. Status: Final Date: October 6, 2012 Page 18 of 68 Installation Guide 1. 2. 3. 4. 5. A windows account must be created. It need only be a member of Domain Users or if implemented as a local user then just member of the Users group. A unique AD LDS -instance must be created. This is done by completing a wizard that can be started from the menu by selecting Start, Programs, AD LDS, Create an AD LDS instance. FastPassCorp recommends using non-default ports e.g. 50000 and 50001. A specific name must be provided, such as ‘O=Passwordmanager’. FastPassCorp recommends that the AD LDS instance be set up to run as the above created account and the above account assigned as the administrator of this instance. The information used to create the AD LDS -instance, must be provided when installing the actual Data Repository, see elsewhere. ADAM is part of the Microsoft Windows Server 2003 R2 and Microsoft Windows 2008 release. From server 2003 R2 it can be installed through the Optional Component Manager. In Microsoft Windows 2008 Server AD LDS’s name is changed, the new name is AD LDS (Active Directory Lightweight Directory Services), this component is installed as a separate Role. For other versions AD LDS it can be downloaded from Microsoft at the following URL: http://www.microsoft.com/download/en/details.aspx?DisplayLang=en&id=4201 This download is also for upgrading older version to Service Pack 1 for ADAM (SP1). Beware that ADAM Service Pack 1 is not available for Itanium-based systems!! After ADAM is installed a new ADAM instance needs to be created and the following screenshots visualizes an example performed on a Windows Server 2003 (English). From the Windows Start button select Programs, then ADAM and then Create and ADAM Instance. Using a 2008 server choose the Start button select Administrative Tools and chose Active Directory Lightweight Directory Services Setup Wizard Figure 3 Click the Next button. Status: Final Date: October 6, 2012 Page 19 of 68 Installation Guide Figure 4 Select the A unique instance radio button and click the Next button. Figure 5 Enter a name for the ADAM instance and click on the Next button. Status: Final Date: October 6, 2012 Page 20 of 68 Installation Guide Figure 6 Enter LDAP port number and SSL port number where 50000 and 50001 is typicallyy used numbers. Figure 7 Select the Yes, create an application directory partition radio button and click on the Next button. Status: Final Date: October 6, 2012 Page 21 of 68 Installation Guide Figure 8 Specify where to place the Data files and Data recovery files. Typically production servers use the D: drive for data but accept the default values if acceptable for your installation. NOTE: The ADAM data storage can grow relatively large in size. Our measures have been that a data repository holding 10000 users requires about 175 MB of disk space. After specifying the paths click on the Next button. Figure 9 Select the NetworkServices acoount radio button. If the popup windows appears: Answer Yes. Status: Final Date: October 6, 2012 Page 22 of 68 Installation Guide Figure 10 Select the This account radio button and browse the account to be used for administrating the ADAM instance. The recommendation is to use the same account as just specified in the previous screen and as defined in section 5.3. Click Next to continue. Figure 11 Select the Do not import LDIF files for this instance of ADAM and click on the Next button. Status: Final Date: October 6, 2012 Page 23 of 68 Installation Guide Figure 12 Check that the information is as expected and corrects them if they are wrong. When verified click on the Next button. Figure 13 Now the ADAM Instance is created and imported. When the actual import starts you will be prompted to enter the username and password for the ADAM administrator account specified in the ADAM Administrators screen. Status: Final Date: October 6, 2012 Page 24 of 68 Installation Guide Figure 14 Finally the completion status screen is displayed and the Finish button is clicked. 3.1.4 Preparing the target AD FastPass Password Manager is capable of managing any number of domains without the need to modify the schema or anything else in the domain infrastructure. This means that customers only need to prepare for communication with the AD using LDAP. Right out of the box a Microsoft Windows Server is prepared for LDAP in Simple mode, Secure mode and SSL mode but the latter requires a certificate to be operational. FastPass supports only two of these modes; Secure and SSL. Secure mode is the same as Windows is using internally for synchronizing passwords between domain controllers and SSL is a even more protective mode but that are also more complex to deploy. Certificates can be signed by well-known certificate authorities like Thawte or VeriSign but can also be created internally by the customer (self-signed). The important issue is that the caller of the server that is configured to use a certificate trusts the authority that signed the certificate. For well-known certificate authorities this trust exists because Microsoft Windows keeps a list of root certificates but for self-signed this list is manually updated. To import the certificate for a non well-known certificate authority you may follow the steps below. 1. In the Microsoft Management Console, add a snap-in. 2. Add certificates – for Computer Account, choose Local Computer. 3. In Trusted Root Certification Authorities, choose to Import. 4. Browse to and select the CA certificate. 5. Verify that “Place all certificates in the following store” is ticked. To ease implementation FastPassCorp delivers a testing tool named “Domain Operation Test Tool” (domainoperationtest.exe) that can be used to verify connectivity on the network, validity of the AD certificate and admin user privileges. Status: Final Date: October 6, 2012 Page 25 of 68 Installation Guide 3.1.5 Requesting a FastPass Password Manager license FastPass Password Manager Licenses are provided by FastPassCorp as plain text files but signed and cannot be edited without being corrupted. FastPassCorp provides this file, as part of the deliverance of the software. Extending the licenses requires a new license file. The license file must be placed in C:\Program Files\FastPassCorp\License FastPass licenses are coming in more variations counting on different measures like number of Identities, Users, Organizations or Domains and with or without restrictions on technologies, named domains or organizations. Search your FastPass representative for advice. If buying new licenses to an existing license please remember to tell your FastPass representative if the will be used on the same server or not. Changing an existing license requires the old license being blacklisted before getting the new. 3.2 Installing Installing a FastPass Password Manager Solution will, if all preparations described in chapter 4 have been successfully completed, not take more than 15 minutes. The task of installing FastPass Password Manager can be described as in the following list: 1. Installing FastPass Password Manager 2. Preparing the AD LDS instance for FastPass Password Manager 3. Initializing the FastPass Password Manager solution 4. Configuring the FastPass Password Manager solution As also described and illustrated in chapter 3 FastPass Password Manager is highly flexible in how to implement. All components can work out of the same machine as well as of different machines. Furthermore the solution has been successfully tested in virtual environments as well as in clustered environments and FastPassCorp will in the near future release Best Practice documentation for such implementations. This section will describe an all-in-one-machine installation. 3.2.1 Installing FastPass Password Manager The FastPass Password Manager has the flexibility to be installable on a standalone server, a domain member server or a domain controller without any difference. Note that the last option is not recommended. ! Important note for server 2008 users: “Every time you execute an installation package right click the package and choose run as administrator”. The FastPass Password Manager Backend Server is installed by running the InstallShield executable PasswordManagerServer.exe and the following screenshots illustrate an installation sample. Status: Final Date: October 6, 2012 Page 26 of 68 Installation Guide Figure 15 Click the Next button to continue the installation. Figure 16 Click the I Accept the terms of the license agreement radio button and then the Next button to continue the installation. Status: Final Date: October 6, 2012 Page 27 of 68 Installation Guide Figure 17 Enter User Name and Company Name into the fields and click the Next button to continue the installation. Figure 18 Enter the IIS Application Pool User Name and Password that will be used to run the application under IIS. The entered User Name must have the format HOSTNAME\USERNAME for local accounts or DOMAIN\USERNAME for domain accounts. If the specified account does not exist the installer will prompt for confirmation on whether to create the account. Read the definition for how to define the account in section 5.3. Status: Final Date: October 6, 2012 Page 28 of 68 Installation Guide Figure 19 Accept the default installation folder by clicking next or click the Change button to change the folder. The installer will create a sub folder named FastPassCorp under the specified folder so typically the default installation folder will not be changed. The specified folder will be used for other FastPass products and will in the current version not reach a size of more than 5 MB plus the space taken by log files which will typically not be larger than 20 MB. Figure 20 The installer is now ready to begin the actual installation and after clicking the Install button the installation will commence. 1. If installation directory isn’t available, it will be created. 2. Files are copied. 3. Assemblies are registered in GAC (Global Assembly Cache). Status: Final Date: October 6, 2012 Page 29 of 68 Installation Guide 4. An application pool, FastPassServer, is created in IIS. 5. A virtual directory, FastPassServer, is created in IIS. 6. An application pool, FastPassClient, is created in IIS. 7. A virtual directory, FastPassClient, is created in IIS. 8. An application pool, FastPassGateway, is created in IIS. 9. A virtual directory, FastPassGateway, is created in IIS. 10. An application pool, FastPassAdministrationClient, is created in IIS. 11. A virtual directory, FastPassAdministrationClient, is created in IIS. 12. A virtual directory, FastPassCorp, is created in IIS. 13. Various registry keys and values are created. Figure 21 Upon successful completion of all installation tasks the installer will show this screen and the Finish button can be clicked. If the Installer does not show this screen but instead an error screen the messages shall be noted and the specified reasons shall be examined and solved if possible. Next step is to prepare the AD LDS instance to be used by FastPass. 3.2.2 Preparing the AD LDS instance for FastPass In chapter 4 (section 4.4.3) it was described how to prepare the AD LDS instance in general and this must have been completed before proceeding further. The preparation of the AD LDS instance for FastPass means creating the schema and initializing objects so that the instance is ready to be used by the FastPass Server. Status: Final Date: October 6, 2012 Page 30 of 68 Installation Guide The preparation is performed by running the executable ADAMInstaller.exe on the machine where the AD LDS instance is defined. The following screenshots illustrates an installation sample. Figure 22 Click the Next button to continue. Figure 23 Enter the information that reflects to the AD LDS installation as performed when preparing the AD LDS installation (Figure 7 and ). Click the Next button to continue. Status: Final Date: October 6, 2012 Page 31 of 68 Installation Guide Figure 24 Enter the authentication information that reflects to the ADAM installation as performed when preparing the ADAM installation (Figure 10). Click the Next button to continue. After clicking the Next button the connection is verified and if succeeded the next screen will be shown. Figure 25 Click the Next button to continue. Status: Final Date: October 6, 2012 Page 32 of 68 Installation Guide Figure 24 A progress bar and detail progress information will be shown. On completion, review the status and click the Next button to continue. Figure 25 Click the Finish button to end the program. Now the ADAM instance is ready for use meaning that the whole FastPass Password Manager is now almost ready to serve end-users. Next step is to initialize the environment. Status: Final Date: October 6, 2012 Page 33 of 68 Installation Guide 3.2.3 Initializing the FastPass Password Manager solution In the two previous steps the software was installed and the ADAM instance was prepared. This almost makes the system ready for use. In the following it will be described how to initialize the environment which is the last step needed before getting into the real use of the solution. The initialization is performed by running the executable ServerInit.exe. The following screenshots illustrates an installation sample. Figure 26 Click the Next button to continue. Figure 27 Enter a name and description for your Organization. The name will be shown in the Administration Client as well as in the Self-Service Client. Click the Next button to continue. Status: Final Date: October 6, 2012 Page 34 of 68 Installation Guide Figure 28 Verify the value written into the hostname me field and verify that this name is the same as used in the IIS Certificate implemented on the server. When the Next button is activated the settings are verified against the server. Figure 29 Verify that all IP addresses of the he server are listed in the IP Address List field. Now specify pecify the group that shall be used for authorization of administrators trying to login to the FastPass Administration Client,, by using the AD group selector as shown in Figure 29. Click the Next button to continue. Status: Final Date: October 6, 2012 Page 35 of 68 Installation Guide Figure 30 Specify the group that shall be used for authorization of Gateway Administrators and specify an Account and a Password for a user that is member of that group. This group and account is used internally by the FastPass Password Manager and shall not be used again unless other components like FastPass Password Sync is implemented and integrated into the solution. Click the Next button to continue. After clicking the Next button the entered information is verified and if valid the next screen will be shown. Figure 31 Click the Next button to continue. Status: Final Date: October 6, 2012 Page 36 of 68 Installation Guide Figure 32 Click the Finish button to end the program. Now the FastPass Password Manager solution is ready to be accessed by administrators and the next step is to open the Administration Client which is done from an Internet Explorer and typing in the URL https://SERVERNAME.DOMAIN/FastPassAdministrationClient where SERVERNAME.DOMAIN is replaced with your fully qualified server name (the hostname specified in Figure 28). 3.3 Service restart Before operation be sure to schedule the service restart script found under the <INSTALLPATH>\FastPassCorp\tools\ folder to ensure continuous operation. 3.4 Configuring the FastPass Password Manager solution In the three previous steps the software was installed and the ADAM instance was prepared and the environment was initialized. This makes the system ready for Administering and this is the absolute last step before letting users into the solution. 3.4.1 Accessing the Administration Client The Administration Client is accessed by opening an Internet Explorer and typing in the URL https://SERVERNAME.DOMAIN/FastPassAdministrationClient where SERVERNAME.DOMAIN shall be replaced with your fully qualified server name (the hostname specified in Figure 28). Status: Final Date: October 6, 2012 Page 37 of 68 Installation Guide Figure 33 Login with an account that is member of the Administrators Group specified in Figure 28. For more information about the configuration read the Administrators Guide. Status: Final Date: October 6, 2012 Page 38 of 68 Installation Guide 4. Installing the stand-alone FastPass Client The FastPass client is included in the FastPass main server installation. The stand-alone client is used for DMZ installations and other situations where a stand-alone version is needed. The installation and configuration is very simple. .Net 3.5 SP1 and IIS is need on the server. 4.1 Installing Right click the PasswordManagerClient.exe from your FastPass installation package and run it as administrator. Figure 34 Click the Next button to continue the installation. Figure 35 Read the License Agreement and select “I accept the …“ to continue the installation Status: Final Date: October 6, 2012 Page 39 of 68 Installation Guide Figure 36 The FastPass Client needs an application Pool user to run – please refer to section 3.2.1 to locate the details regarding this user – and remember that FastPass can create this user under the installation. Figure 37 Select an installation folder Status: Final Date: October 6, 2012 click next Page 40 of 68 Installation Guide Figure 38 Click install to complete the installation. 4.2 Configuring the client The client needs to know where to find the Password Manager server - this information is stored in the <installdir>\configuration\FastPassClient\CAconfig.xml file. Edit this file and replace the server name with the correct servername in the CAWSurl, CAWTextUrl, CAWSHelpDeskUrl,PMWSCustomTaskUrl, PMWSOpenServiceUrl . (Please note that the server where the client is installed has to trust the SSL certificate of the server, and must be able to lookup the server name in the certificate). Now you need to fill in the CADedicatedToOrg, which is the organization ID for the Organization this installation is intended for - you find this by: 1. 2. 3. 4. Login to the administration client Click on the "Basic Settings" icon. In the URL you will find the Organization ID eg.:https://Myserver/FastPassAdministrationClient/Organization/BasicSettings.aspx?TargetOrganizationID=64E0A5 93-A020-4F48-B5AC-EA3574A7E6F6 Now copy the ID part: 64E0A593-A020-4F48-B5AC-EA3574A7E6F6 this is the organizationID. Figure 39 Found on the FastPass Server Next you will need to enable the Captcha by editing the OrgCaptchaConfig.xml file setting the Organization ID. The file is located in <INSTALLPATH>\FastPassCorp\Configuration\FastPassClient Status: Final Date: October 6, 2012 Page 41 of 68 Installation Guide Figure 40 Insert the Organization ID as shown Set the CaptchaEnable to true as shown above. Next we ned to tell FastPass which server to talk to. Openthe CAconfig file (Same path as above) insert the Organization ID from the FastPass Server to the FastPass DMZ Server and change the values on the CAWSurl, CAWTextUrl, CAWSHelpDeskUrl,PMWSCustomTaskUrl, PMWSOpenServiceUrl to the path of the FastPass Server. Status: Final Date: October 6, 2012 Page 42 of 68 Installation Guide Figure 41 Now we need to inform the Password Manager server that a client will be connecting from a different IP than expected. Please take a note of the IP Address of the DMZ server. Open the CWconfig.xml file found on the FastPass LAN server in the <INSTALLPATH>\FastPassCorp\Configuration\FastPassServer\ directory. Copy a “<data Value… “ line and edit the IP address. Figure 42 Now you need to copy the Registry value on the FastPass Server. Open the key as shown (Please note that the GUID value differs from system to system). This value will tell the FastPass DMZ server which menus to present to the end-user. The value must be inserted on the DMZ server in the same location as on the LAN server. Status: Final Date: October 6, 2012 Page 43 of 68 Installation Guide Figure 43 If missing DNS in the DMZ Zone you have to manual insert on the DMZ Server the IP address and the same name as in the CAconfig file on the DMZ Server. This is to resolve the name to the IP address. Now restart the IIS server on both servers. (IISRESET) Status: Final Date: October 6, 2012 Page 44 of 68 Installation Guide 5. Installing Multisystem Password Reset and Synchronization This option enforces the Password Manager the ability to reset passwords on other systems. There are 2 ways of using this feature: 1. 2. The overall process here is: 1. 2. 3. 4. 5. Synchronizing passwords: by installing FastPass Interceptor on the domain controller all password resets and password changes are synchronized to the target systems Selective Password Reset: With this option we let the user decide on which target system the password should be reset Install SQL-express server (another MSSQL-server can also be used) Configure the SQL server for use with FastPass Pre-requisites – depending on target Install Password Sync Server Installation of FastPass Password Sync Interceptor (Only used for Synchronizing) – please refer to the Password Sync interceptor Install guide. Please note that you cannot install the Sync Server without having installed Password Manager. 5.1 Installing SQL Express The SQL server should be configures in the mixed mode. And the TCP protocol should be enabled running on port 1433. The installer should run as the administrator of the machine, otherwise this may fail. There is another prerequisite for Sync Server installation which is FastPass Password Manager. You can install the system using the Express edition of Microsoft SQL Server. The 2005 express SQL-Server can be downloaded here (MS SQL-Server Express edition SP3) with Management Tools http://www.microsoft.com/en-us/download/details.aspx?id=23650 Execute the file after download. Status: Final Date: October 6, 2012 Page 45 of 68 Installation Guide Figure 44 Click next to continue installing Figure 45 Click Install to continue Status: Final Date: October 6, 2012 Page 46 of 68 Installation Guide Figure 46 Click Next button to continue the installation. Figure 47 Please check the list to ensure that the system configuration is ok. Status: Final Date: October 6, 2012 Page 47 of 68 Installation Guide Figure 48 Adjust the name and Company to your organization Figure 49 The above shows the minimum installation necessary to run with FastPass. Status: Final Date: October 6, 2012 Page 48 of 68 Installation Guide Figure 50 Choose “Mixed mode” and enter a password. Please take a note of this password. Figure 51 Status: Final Date: October 6, 2012 Page 49 of 68 Installation Guide Figure 52 We recommend leaving these blank. Figure 53 Finally ready for installation. Status: Final Date: October 6, 2012 Page 50 of 68 Installation Guide Figure 54 The installation completed Click Next 5.2 Configuring Microsoft SQL-Express for use with Sync Server Start up the “SQL Server Configuration Manager” – it can be found in Start->Microsoft SQL Server 2005.> Configuration Tools->SQL Server Configuration Manager Figure 55 Make sure that the TCP/IP setting is enabled. Right click the TCP/IP settings and set the port number to 1433 for the IP All section Status: Final Date: October 6, 2012 Page 51 of 68 Installation Guide Figure 56 Figure 57 Depending on the specific version some of the SQL server settings change – please check the following settings by opening the “SQL Server Surface Area Configuration” and choosing “Surface Area Configuration for Services and Connections”: As Shown on the Warning You need to restart the SQL-Service before the changes will take effect. Status: Final Date: October 6, 2012 Page 52 of 68 Installation Guide Figure 58 After changing the setting –restart the service. 5.2.1 Enabling encryption for SQL server We recommend using SSL encryption for data operations with SQL server. Please follow these guides setting op SSL certificates: To setup encryption please follow these instructions: http://support.microsoft.com/kb/316898 for the following versions: 1. 2. 3. 4. 5. 6. 7. Microsoft SQL Server 2000 Standard Edition Microsoft SQL Server 2000 64-bit Edition Microsoft SQL Server 2005 Standard Edition Microsoft SQL Server 2005 Developer Edition Microsoft SQL Server 2005 Enterprise Edition Microsoft SQL Server 2005 Express Edition Microsoft SQL Server 2005 Workgroup Edition If you are using other version of MSSQL server please use the appropriate link: SQL Server 2005: http://msdn.microsoft.com/en-us/library/ms189067(SQL.90).aspx SQL Server 2008: http://msdn.microsoft.com/en-us/library/ms189067.aspx Status: Final Date: October 6, 2012 Page 53 of 68 Installation Guide 5.3 Pre-requisites for the connectors Depending on each connector some changes has to be made for the installation to work. Currently there are these connectors: 1. AD – this connector can send reset a password on a Microsoft Active Directory server. It will work “out of the box” 2. SAP – this connector works out of the box on the Password Manager Server – however you need to install a small piece of software on the SAP instances – please refer to the SAP connector documentation 3. IBMiSeries connector. For this connector to work you will need to install the latest java runtime from Sun http://www.oracle.com 4. MSSQL, Oracle, CLI, SSH and the SPI connectors will all works out of the box on the Password Manager Server 5.4 Install Password Sync Server Installing a FastPass Password Manager Solution will, if all preparations described in chapter 4 have been successfully completed, not take more than 15 minutes. Click on the Installer file (FastPass-PasswordSync-Server.msi) and following screen will be appeared. Figure 59 The FastPass Password Manager is already installed as this component is the prerequisite of the Sync Server installation. To proceed with the Sync Server installation we need to choose Yes. This will show welcome screen of the Sync Server installation. (Figure 60) Figure 60 Now click on the Next button. Status: Final Date: October 6, 2012 Page 54 of 68 Installation Guide Figure 61 In the “License Agreement”screen user need to accept the license agreement and click on Next button. Figure 62 In the “Customer Information” screen user can put User and Organization name or keep the default data shown in the screen and click on Next button. Status: Final Date: October 6, 2012 Page 55 of 68 Installation Guide Figure 63 In the “Destination Folder” screen user can’t change the Installation location as the other FastPass component already installed. And this installation will be done on that folder. This screen is showing the installation location. And click on the Next button to open the next screen. Figure 64 In this screen we need to configure the database server where we need to input server, login id, and Password database name. By default the installation assumes that a local database is active on port 1433. If the database already exists, it will be replaced and if no database exists with this name, this will create new database. On click Next, the database will be created (or replaced) with the necessary table, stored procedures, triggers etc. Also, a database user will be created with name ‘FPsyncUser’ along with necessary permission to the database. The Sync Server will use this user to connect to the database. Finally, the following screen will be shown Status: Final Date: October 6, 2012 Page 56 of 68 Installation Guide Figure 65 Now we are ready to install the product. To start the installation click on the Install button. Figure 66 Installation process is completed. Now to close this dialog need to click on Finish button. You have now successfully installed the connectors for FastPass. To configure selective password reset or synchronization please look at the chapters in the administration guide covering these issues. Status: Final Date: October 6, 2012 Page 57 of 68 Installation Guide If you are facing problems with installing the Password Sync Server you must install this from a command prompt with Administrative privileges. Figure 67 Showing the Command Prompt Go to the Start menu and right click the cmd.exe and Run as administrator. Go to where the Fastpass-PasswordSync-Server is placed in the command prompt. Type in the name FastPass-PasswordSync-Servr.msi and press Enter. You will now be able to install the Sync Server. Status: Final Date: October 6, 2012 Page 58 of 68 Installation Guide 6. Additional information Additional information and help is available from FastPass partners and from FastPassCorp. FastPassCorp are continuously working on making the solution as easy as possible to implement, to evaluate and to use and we are aware that this is the key to our success. We are continuously also writing Best Practice Guides so please visit our website or contact your sales representative for information about available guides. Status: Final Date: October 6, 2012 Page 59 of 68 Installation Guide 7. Appendices 7.1 Appendix A: Backing Up AD LDS Database on Windows 2008 Server. We recommend the Backup to run at least once a week. If any users have enrolled between the last backup and the restore the users will need to enroll again into the system. The script and receipt focuses on Windows Server 2008 and will not work for the ADAM database on Windows Server 2003. Please Notice: It is important that you don’t run this task when the Discovery and Enrollment Services runs, therefore you should schedule the services to run at other timeframes. Figure 68 Log on to your server with Administrative Rights Start Administrative Tools Task Scheduler Figure 69 Expand the Task Scheduler Status: Final Date: October 6, 2012 Mark the Windows Unit Left Click the Icon with Create Basic Task. Page 60 of 68 Installation Guide Figure 70 Under Name give the Task a Name as a headline to the Task Give the Task a Description Click Next Figure 71 Choose a Trigger to Run the Task Status: Final Date: October 6, 2012 Click Next Page 61 of 68 Installation Guide Figure 72 Put in a Checkmark which day or (Days) of the week the Task must Run Click Next Figure 73 Click on Browse to find the script to Run. Status: Final Date: October 6, 2012 Page 62 of 68 Installation Guide Figure 74 Mark the BackupADLDS.cmd file Click Open. Figure 75 Click Next Status: Final Date: October 6, 2012 Page 63 of 68 Installation Guide Figure 76 Click Finish Figure 77 We recommend you to run the scheduled task as “System” to avoid any issues with service users changing password etc. Status: Final Date: October 6, 2012 Page 64 of 68 Installation Guide Figure 78 In the script you will need to change some settings to make the script fit to your needs and setup. 1. Name = Set Instance name. In the AD LDS Backup Script change the Instance name. • Where to find the instance name: To find the instance name of your AD LDS please following these guidelines: Go to Windows Services and under the Description find the AD LDS instance. On you left side under Name you will find the instance Name. Figure 79 2. 3. Change the set numberOfBackups= • Here you can setup the numbers of backups you would like to safe. If you set this 4 the script will create 4 backups. When the Fifth backup runs the oldest backup will be deleted and the rest of the backup will be renamed. That means you will only have the last 4 backups available. Set backuppath= • c:\backup\adam creates the folders where you path you want to place your AD LDS Backup. Now you are Able to Backup Your AD LDS Database. Figure 80 Status Screen of the dsdutil.exe Status: Final Date: October 6, 2012 Page 65 of 68 Installation Guide Figure 81 To test the Backup Script open a Command Prompt and browse your-self where the script is placed and run the BackupASLDS.cmd. Status: Final Date: October 6, 2012 Page 66 of 68 Installation Guide 7.2 Appendix B: Restart FastPass Services To have a stabile solution running without outages we recommend restarting the FastPass Services on a weekly basis. FastPass comes with a script that can restart all the services, placed in the tools folder. Below you will find a description of how to add the restart in the Windows task scheduler. Log on to your server with Administrative Rights Start Administrative Tools Task Scheduler Go through the same process same as the AD LDS Backup but this time chooses the RestartPMAll Script. Figure 82 Click on Browse to find the program or Command to Run. Mark the Script or Command and Click Open. “It is very important that you don’t run this task when the Discovery and Enrollment Services runs”. You will need to let Discovery and Enrollment Services to run uninterrupted. Status: Final Date: October 6, 2012 Page 67 of 68 Installation Guide 7.3 Appendix C: Recommended changes when installing for more than 10.000 users 7.3.1 Storing Event data on SQL Using SQL for storing event data will speed up reports and limit the data in your ADAM/AD LDS instance. To enable the storage of events: 1. Install the MSSQL server and Sync-Server as described. 2. Create and set the following Registry value(REG_SZ): HKEY_LOCAL_MACHINE\SOFTWARE\FastPassCorp\Password Manager\DataStorageTypeEvent Value Data: MSSQL After this the Events will be automatically stored on the event table in the PasswordSync database. To ensure the database will run full. Implement the following SQL to run on a daily basis: http://server400.fastpasscorp.com/files/tools/CleanDB-MSSQL-DiscEvents.zip 7.1.1 Tweaking ADAM/ADLDS settings ADAM is very slow giving up space, especially in the default settings; this may lead to very big ADAM instances taking up unnecessary resources here are why: Whenever a delete operation is been triggered, ADAM archives the object deleted. This results in the increase of the ”dit” file size. To avoid the “dit” file size growing enormously, we are required to configure garbagecollperiod and tombstonelifetime parameters in ADAM.(The contents of the Deleted Objects container are visible if you search by using the 1.2.840.113556.1.4.417 control, which enables you to see deleted objects.) These two attributes are available in: CN=DirectoryService, CN=WindowsNT, CN=Services, CN=Configuration Steps to configure garbagecollperiod and tombstonelifetime: Open ADAM-ADSI Edit. (The shortcut is mostly available on Desktop or you can go to Program Files/ADAM-/ADAM-ADSI Edit) Open Connect to dialog box. In the Connect to dialog enter the desired information. Select NamingContext radio button and select configuration from the drop down. Once you are connected to Configuration go to (Please beware that this is in reverse mode) CN=Services, CN=Windows NT,CN=Services, CN=Configuration. Open the property sheet of the Directory Service. Go to garbagecollperiod attribute. Select edit and enter an appropriate value. The value entered is in hours. The minimum value is 1 hour and by default it is set to 12 hours. This is also recommended. Go to tombstonelifetime attribute. Select edit and enter an appropriate value. The value entered in days. The minimum value is 1 day. The default is 180 days. We recommend setting this attribute to 7 days. For more Information visit: http://www.msresource.net/knowledge_base/articles/info:_the_directory_service_garbage_collection_process.html This operation should be done on all you ADAM instances. Status: Final Date: October 6, 2012 Page 68 of 68