Management Center - Get started

Scenario

Use case - Getting started with Management Center This use case provides a quick-start guide for setting up Management Center and its associated products.

Note: A valid license agreement is required for each product included in this setup.

The document is intentionally concise and structured to ensure that tasks are performed in the correct order. The goal is to help you quickly deploy a test environment that you can use to explore, test, and learn from.

The starting point for this scenario is a Windows Server with Active Directory installed. By the end of the use case, you will be able to log in to Active Directory, test authentication flows and much more.

(While multiple platforms and user sources are supported, this setup provides the simplest path to illustrate the initial configuration process.)

Prerequisite

There are some prerequisite for this use case. You will need the following:

  • Windows server

    • At least 16 GB of RAM

    • A server certificate so LDAPS is supported for Active Directory

  • Active Directory (e.g. installed in the same machine)

    • A number of user created.

      • Have some of the user being manager for others.

      • Make sure all of them a mail attribute populated with an mail address.

    • A number of groups created with some user added

  • Fortified ID Management Center

    • Installation media for Windows

    • A license file

Installation

Installation and post-installation

Install Management Center on a Windows server

Click following link to Install on Windows

You should now have:

  • Management Center installed

  • Verified file system, services and log file location

Post-installation tasks

Click following link for post-installation tasks

You should now have verified that the three products that come with the management center:

  • Are installed

  • Running the latest version

  • You have tested default configuration that comes with each product

Add Forms and Portal to Access

Click following to add Forms and Portal as SAML SPs to use Access as SAML IdP, Add SAML SPs to SAML IdP

You should now have verified:

  • That Portal and Forms now are SAML SPs to Access acting as SAML IdP

  • Logged in as default static SAML IdP user Peter Bishop to Portal. Peter will have some default apps in Portal.

Change look and feel

By default look and feel is Fortified ID, you can easily change that to your organizations look and feel. Click following link to change look and feel, Change look and feel

You should now have verified:

  • You have changed look and feel to your images and colors.

Add LDAP as an authentication source

Click following link to add LDAP as an authentication source, LDAP as authN source.

You should now have verified:

  • You can choose "Active Directory" as authentication method when logging into Portal

Add ADEdition to Forms

Click following link to add ADEdition to forms.

You should now have verified:

  • You have an number och flows to test delegated administration with Active Directory

Last updated