Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Security Management Server Installation and Migration Guide v11.9

Install Back-End Server with Existing Database

NOTE:

If you have a functional Dell Server v9.2 or later, see instructions in Upgrade/Migrate Back End Server(s).

You can install a new Security Management Server and connect to a SQL database in one of these ways:
  • Connect to a SQL database created during Pre-Installation Configuration.

    Or

  • Connect to an existing SQL database that is v9.x or later, when the schema version matches the Security Management Server version to be installed.

OR

The user account from which the installation is performed must have database owner privileges for the SQL database. If you are uncertain about access privileges or connectivity to the database, ask your database administrator to confirm these options before you begin installation.

If the existing database has previously been installed with Security Management Server, before you begin installation, ensure that the database, configuration files, and the secretKeyStore are backed up and accessible from the server on which you are installing Security Management Server. Access to these files is necessary to configure Security Management Server and the existing database. The folder structure created by the installer during installation (example shown below) must remain unchanged.

  1. In the Dell installation media, go to the Security Management Server directory. Extract (DO NOT copy and paste or drag and drop) Security Management Server-x64 to the root directory of the server where you are installing the Security Management Server. Copying and pasting or dragging and dropping produces errors and an unsuccessful installation.
  2. Double-click setup.exe.
  3. Select the language for installation, and then click OK.
  4. If prerequisites are not already installed, a message displays to inform you of which prerequisites will be installed. Click Install.
  5. In the Welcome dialog, click Next.
  6. Read the license agreement, accept the terms, and then click Next.
  7. If you optionally copied your EnterpriseServerInstallKey.ini file to C:\Windows as explained in Pre-Installation Configuration, click Next. If not, enter the 32-character Product Key and then click Next. The Product Key is in the EnterpriseServerInstallKey.ini file.
  8. Select Back End Install and Recovery Installation, and click Next.
  9. To install the Security Management Server to the default location of C:\Program Files\Dell, click Next. Otherwise, click Change to select a different location, and then click Next.
  10. To select a location for backup configuration recovery files to be stored, click Change, go to your choice of folder, and then click Next.

    Dell Technologies recommends that you select a remote network location or external drive for backup.

    After installation, any changes to configuration files, including changes that are made with the Server Configuration Tool, must be manually backed up in these folders. Configuration files are an important part of the total information that is used to manually restore the Dell Server.

    NOTE:The folder structure created by the installer during installation (example shown below) must remain unchanged.
  11. You have a choice of digital certificate types to use. It is highly recommended that you use a digital certificate from a trusted certificate authority.

    Select option "a" or "b" below:

    1. To use an existing certificate that was purchased from a CA authority, select Import an existing certificate and click Next.

      Click Browse to enter the path to the certificate.

      Enter the password associated with this certificate. The key store file must be .p12 or pfx. See Exporting a Certificate to .PFX Using the Certificate Management Console for instructions.

      Click Next.

      NOTE:

      To use this setting, confirm that the exported CA certificate being imported has the full trust chain. If unsure, reexport the CA certificate and ensure that the following options are selected in the "Certificate Export Wizard":

      • Personal Information Exchange - PKCS#12 (.PFX)
      • Include all certificates in the certification path if possible.
      • Export all extended properties.

      OR

    2. To create a self-signed certificate, select Create a self-signed certificate and import it to key store and click Next.

      At the Create Self-Signed Certificate dialog, enter the following information:

      Fully qualified computer name (example: computername.domain.com)

      Organization

      Organizational Unit (example: Security)

      City

      State (full name)

      Country: Two-letter country or region abbreviation

      Click Next.

      NOTE:The certificate expires in 10 years, by default.
  12. From the Back-End Server Install Setup dialog, you can view or edit hostnames and ports.
    • To accept the default hostnames and ports, in the Back-End Server Install Setup dialog, click Next.
    • If you are using a front-end server, select Works with Front End to communicate with clients internally in your network or externally in the DMZ. Then enter the front-end Security Server hostname (for example, server.domain.com).

    • To view or edit hostnames, click Edit Hostnames. Edit hostnames only if necessary. Dell Technologies recommends using the defaults.

      NOTE:A hostname cannot contain an underscore character ("_").

      When finished, click OK.

    • To view or edit ports, click Edit Ports. Edit ports only if necessary. Dell Technologies recommends using the defaults. When finished, click OK.

  13. Specify the authentication method for the installer to use.
    1. Click Browse to select the server where the database resides.
    2. Select the authentication type.
      • Windows authentication credentials of current user

        If you choose Windows Authentication, the same credentials that were used to log in to Windows are used for authentication. (User Name and Password are not editable.) Ensure that the account has system administrator rights and the ability to manage the SQL Server.

        OR

      • SQL server authentication using the credentials below

        If you use SQL authentication, the SQL account that is used must have system administrator rights on the SQL Server.

        The installer must authenticate to the SQL Server with these permissions: create database, add user, assign permissions.

    3. Click Browse to select the name of the existing database catalog.
    4. Click Next.
  14. If the Existing Database Error dialog displays, select the appropriate option.

    If the installer detects a problem with the database, an Existing Database Error dialog displays. The options in the dialog depend on the circumstances:

    • The database schema is from a previous version. (See step a.)
    • The database already has a database schema that matches the version currently being installed. (See step b.)
    1. When the database schema is from a previous version, select Exit Installer to end this installation. Next, you must back up the database.

      The following options MUST be used only with the help of Dell ProSupport:

      • The Migrate this database to the current schema option is used to recover a good database from a failed server implementation. This option uses the recovery files in the \Backup folder to reconnect to the database, and then migrates the database to the current schema. This option should only be used after first trying to reinstall the correct version of Security Management Server, and then running the latest installer to upgrade.
      • The Proceed without migrating the database option installs the Security Management Server files without completely configuring the database. Database configuration must be completed later, manually, using the Server Configuration tool and requires further manual changes.
    2. When the database schema already has the schema of the current version, but is not connected to a Security Management Server backend, it is considered a Recovery. If Recovery Installation was not selected in this step, this dialog appears:
      • Select Recovery Install Mode to continue the installation with the selected database.

      • Select Select a New Database to choose a different database.

      • Select Exit Installer to end this installation.

    3. Click Next.
  15. Select the authentication method for the product to use. This authentication is the account that the product uses to engage with the database and Dell services.
    • To use Windows authentication:

      Select Windows authentication using the credentials below. Enter the credentials for the account that the product can use, and then click Next.

      Ensure that the account has system administrator rights and the ability to manage the SQL Server. The user account must have the SQL Server permissions Default Schema: dbo and Database Role Membership: dbo_owner, public.

      OR

    • To use SQL Server authentication:

      Select SQL server authentication using the credentials below. Enter the SQL Server credentials, and then click Next.

      The user account must have the SQL Server permissions Default Schema: dbo and Database Role Membership: dbo_owner, public.

  16. In the Ready to Install the Program dialog, click Install.

    A progress dialog displays status throughout the installation process.

    When the installation is completed, click Finish.

    Back-end server installation tasks are complete.

    Dell Services are restarted at the end of installation. It is not necessary to reboot the server.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\