Management Center - Get started

Scenario
Use case - Getting started with Management Center This use case provides a quick-start guide for setting up Management Center and its associated products.
Note: A valid license agreement is required for each product included in this setup.
The document is intentionally concise and structured to ensure that tasks are performed in the correct order. The goal is to help you quickly deploy a test environment that you can use to explore, test, and learn from.
The starting point for this scenario is a Windows Server with Active Directory installed. By the end of the use case, you will be able to log in to Active Directory, test authentication flows and much more.
(While multiple platforms and user sources are supported, this setup provides the simplest path to illustrate the initial configuration process.)
Prerequisite
There are some prerequisite for this use case. You will need the following:
Windows server
At least 16 GB of RAM
A server certificate so LDAPS is supported for Active Directory
Active Directory (e.g. installed in the same machine)
A number of user created.
Have some of the user being manager for others.
Make sure all of them a mail attribute populated with an mail address.
A number of groups created with some user added
Fortified ID Management Center
Installation media for Windows
A license file
Installation
Installation and post-installation
Install Management Center on a Windows server
Click following link to Install on Windows
You should now have:
Management Center installed
Verified file system, services and log file location
Post-installation tasks
Click following link for post-installation tasks
You should now have verified that the three products that come with the management center:
Are installed
Running the latest version
You have tested default configuration that comes with each product
Add Forms and Portal to Access
Click following to add Forms and Portal as SAML SPs to use Access as SAML IdP, Add SAML SPs to SAML IdP
You should now have verified:
That Portal and Forms now are SAML SPs to Access acting as SAML IdP
Logged in as default static SAML IdP user Peter Bishop to Portal. Peter will have some default apps in Portal.
Change look and feel
By default look and feel is Fortified ID, you can easily change that to your organizations look and feel. Click following link to change look and feel, Change look and feel
You should now have verified:
You have changed look and feel to your images and colors.
Add LDAP as an authentication source
Click following link to add LDAP as an authentication source, LDAP as authN source.
You should now have verified:
You can choose "Active Directory" as authentication method when logging into Portal
Add ADEdition to Forms
Click following link to add ADEdition to forms.
You should now have verified:
You have an number och flows to test delegated administration with Active Directory
Last updated