Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Profitez de récompenses et de remises réservées aux membres
  • Créez et accédez à une liste de vos produits
  • Gérer vos sites, vos produits et vos contacts au niveau des produits Dell EMC à l’aide de la rubrique Gestion des informations de l’entreprise.

Endpoint Security Suite Pro Advanced Installation Guide v1.8

PDF

Key Server Config File - Add User for Security Management Server Communication

  1. Navigate to <Key Server install dir>.
  2. Open Credant.KeyServer.exe.config with a text editor.
  3. Go to <add key="user" value="superadmin" /> and change the "superadmin" value to the name of the appropriate user (you may also leave as "superadmin").

    The "superadmin" format can be any method that can authenticate to the Security Management Server. The SAM account name, UPN, or domain\username is acceptable. Any method that can authenticate to the Security Management Server is acceptable because validation is required for that user account for authorization against Active Directory.

    For example, in a multi-domain environment, only entering a SAM account name such as "jdoe" will likely fail because the Security Management Server will not be able to authenticate "jdoe" because it cannot find "jdoe". In a multi-domain environment, the UPN is recommended, although the domain\username format is acceptable. In a single domain environment, the SAM account name is acceptable.

  4. Go to <add key="epw" value="<encrypted value of the password>" /> and change "epw" to "password". Then change "<encrypted value of the password>" to the password of the user from Step 3. This password is re-encrypted when the Security Management Server restarts.

    If using "superadmin" in Step 3, and the superadmin password is not "changeit", it must be changed here. Save and close the file.

Sample Configuration File

<?xml version="1.0" encoding="utf-8" ?>

   <configuration>

     <appSettings>

        <add key="port" value="8050" /> [TCP port the Key Server will listen to. Default is 8050.]

        <add key="maxConnections" value="2000" /> [number of active socket connections the Key Server will allow]

        <add key="url" value="https://keyserver.domain.com:8443/xapi/" /> [Security Server (formerly Device Server) URL (the format is 8081/xapi for a pre-v7.7 Security Management Server)]

        <add key="verifyCertificate" value="false" /> [true verifies certs/set to false to not verify or if using self-signed certs]

<add key="user" value="superadmin" /> [User name used to communicate with the Security Server. This user must have the administrator role selected in the Remote Management Console. The "superadmin" format can be any method that can authenticate to the Security Management Server. The SAM account name, UPN, or domain\username is acceptable. Any method that can authenticate to the Security Management Server is acceptable because validation is required for that user account for authorization against Active Directory. For example, in a multi-domain environment, only entering a SAM account name such as "jdoe" will likely fail because the Security Management Server will not be able to authenticate "jdoe" because it cannot find "jdoe". In a multi-domain environment, the UPN is recommended, although the domain\username format is acceptable. In a single domain environment, the SAM account name is acceptable.]

        <add key="cacheExpiration" value="30" /> [How often (in seconds) the Service should check to see who is allowed to ask for keys. The Service keeps a cache and keeps track of how old it is. Once the cache is older than the value, it gets a new list. When a user connects, the Key Server needs to download authorized users from the Security Server. If there is no cache of these users, or the list has not been downloaded in the last "x" seconds, it will be downloaded again. There is no polling, but this value configures how stale the list can become before it is refreshed when it is needed.]

        <add key="epw" value="encrypted value of the password" /> [Password used to communicate with the Security Server. If the superadmin password has been changed, it must be changed here.]

     </appSettings>

   </configuration>


Évaluez ce contenu

Précis
Utile
Facile à comprendre
Avez-vous trouvé cet article utile ?
0/3000 characters
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez attribuer une note (1 à 5 étoiles).
  Veuillez indiquer si l’article a été utile ou non.
  Les commentaires ne doivent pas contenir les caractères spéciaux : <>()\