Migrating the Verify Privilege Manager Server
If you are moving/migrating Verify Privilege Manager to a new machine and have installed IIS and .NET Framework as described in the Installation Guide on the new machine, you do not need to run the installer, simply follow the steps below:
-
Copy the folder that holds your Verify Privilege Manager instance to the new computer.
-
Shut down the old web site and recycle its application pool as it is running background threads which are accessing the database.
-
Set up the new folder in Internet Information Server (IIS) as a virtual directory/application under the Default Web Site or as a separate Website (refer to the Advanced Installation section of the Installation Guide for detailed instructions).
-
Browse to your TMS URL database connection page e.g.
https://<YOUR_URL_INSTANCE>/TMS/setup/database/connectdatabase
(for Arellia this URL would be slightly different e.g.https://<YOUR_URL_INSTANCE>/ams/setup/database/connectdatabase
) and you will see a page to enter your database connection details. -
Activate the licenses for the new server by going to the Licenses page.
-
If you are using certs, remember to set them on your new IIS, then browse to Verify Privilege Manager over HTTPS and re-enable force HTTPS if this was set on the original machine.
-
Re-enable DPAPI if this was disabled in the earlier step.
If you're migrating the Verify Privilege Manager web application from Windows Server 2008 to 2012 or newer AND your Verify Privilege Manager is below version 8.5, make sure that:
- .Net extensions 3.5 and ASP.Net 3.5 when adding the IIS role on the new server.
- Change the Verify Privilege Manager Application Pool to 2.0 and recycle the application pool after running the installer.
Steps to Setup Secondary Node with both Verify Privilege Vault & Verify Privilege Manager
If you are migrating a combined install environment, also perform these steps:
-
Check web-auth.config and web-cookie.config (in Verify Privilege Vault web folder) to make sure forceSSL = 'false'.
-
Confirm app pool account and IIS settings (confirm if SS and TMS are virtual directories, confirm IIS auth settings).
-
Disable DPAPI.
-
Disable Force SSL.
-
Decrypt connectionStrings.config on primary web server:
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe -pd "connectionStrings" -app "/Tms"
-
Copy files to secondary.
-
Download current installer to secondary server.
-
Run installer to confirm and fix pre-requisites only. DO NOT install the application with the installer.
-
Make sure Verify Privilege Vault and TMS web folders from primary are in
C:\inetpub\wwwroot
(or a similar location). -
Create 4 app pools: SecretServer, TMS, TMSAgent, and TMSWorker (same as set for primary node).
-
Assign service account to all 4 app pools (same as set for primary node).
-
If the Verify Privilege Vault and TMS directories do not appear in IIS Manager, add the virual directories (same as set for primary).
-
Convert to Applications
- Right-click on Secret Server > Convert to Application, make sure SecretServer app pool is assigned.
- Right-click on TMS > Convert to Application, make sure TMS app pool is used.
- Under TMS, right-click on Agent > Convert to Application, make sure TMSAgent app pool is used.
- Under TMS, right-click on ServiceBus > Convert to Application, make sure TMSWorker app pool is used.
- Under TMS, right-click on Services > Convert to Application, make sure TMS app pool is used.
- Under TMS, right-click on Setup > Convert to Application, make sure TMS app pool is used.
- Under TMS, right-click on Worker > Convert to Application, make sure TMSWorker app pool is used.
-
Run the ASP.NET IIS Registration Tool:
- Change the directory to your .NET framework installation directory using the "cd" command (i.e.:
C:\Windows\Microsoft.NET\Framework\v4.0.30319
orC:\Windows\Microsoft.NET\Framework64\v4.0.30319
). - Type in
.\aspnet_regiis -ga <domain name>\<user name>
and press enter.
- Change the directory to your .NET framework installation directory using the "cd" command (i.e.:
-
Assign folder permissions:
- Give your service account "modify" access to
C:\Windows\TEMP
. - Give your service account "modify" access to the Verify Privilege Vault web folder.
- Give your service account "modify" access to the TMS web folder.
- Give your service account "modify" access to
-
Set IIS authentications (set to same as primary, depending on IWA and other settings), typical example:
- Verify Privilege Vault (Anonymous & Forms, except winauthwebservices = Forms & Windows; see TMS notes)
-
Install certfification on new server, if not already done.
-
Give the 3 TMS App Pools read access on the PrivateKey of the cert.
- MMC snap-in > Certificates.
- Find the certificate (most like in personal store).
- Right-click > All Tasks > Manage PrivateKey.
- Choose local computer name from location and format is iis apppool\tms, iis apppool\tmsagent, iis apppool\tmsworker.
-
Login in to Verify Privilege Vault.
-
Activate licenses.
-
Re-enabled Force SSL.
-
Re-enabled DPAPI on all web nodes.
-
Re-encrypt connectionStrings.config on all web nodes:
C
:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe -pe "connectionStrings" -app "/Tms"