06.05.2013 Views

The eG Installation Guide - eG Innovations

The eG Installation Guide - eG Innovations

The eG Installation Guide - eG Innovations

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Installing and Configuring on Windows Environments<br />

In other words, to extract installation inputs from the <strong>eG</strong>Agent.iss file that was created in our<br />

example above (see step 4), the command will be: <strong>eG</strong>Agent_.exe -a –s<br />

/f1”c:\script\<strong>eG</strong>Agent.iss”.<br />

<strong>The</strong> <strong>eG</strong> agent uninstallation will then begin and proceed in the silent mode. Setup will extract<br />

the required inputs from the iss file and perform the uninstallation automatically, requiring no<br />

user intervention of any kind.<br />

3.3 Configuring Redundancy for the <strong>eG</strong> Manager on<br />

Windows<br />

To enable redundancy for a manager on Windows, a special batch file needs to be executed. This<br />

batch file, named setup_cluster.bat, resides in the \lib directory, and when executed,<br />

requests the following inputs.<br />

<strong>The</strong> setup_cluster batch file will first request your confirmation to proceed with enabling manager<br />

redundancy.<br />

Would you like to enable <strong>eG</strong> Manager redundancy y/n [n]? y<br />

Specifying n here will terminate the script execution. If you enter y, steps 12 to 22 of Section 2.1.4 will<br />

follow.<br />

3.4 SSL-enabling the <strong>eG</strong> Manager on Windows<br />

<strong>The</strong> <strong>eG</strong> manager on Windows includes a default SSL certificate. If you choose not to use the default<br />

certificate, then, you can generate a self-signed certificate by following the steps given below:<br />

Generating the Keystore file<br />

Extracting the certificate to a Certificate file (OR) requesting a Certificate Authority for a Valid<br />

Certificate<br />

Configuring Tomcat for using the Keystore file<br />

<strong>The</strong> sections that follow will discuss each of these steps in detail.<br />

3.4.1 Generating the Keystore File<br />

<strong>The</strong> keystore file stores the details of the certificates necessary to make the protocol secure.<br />

Certificates contain the information pertaining to the source of the application data, and helps validate<br />

the source. To generate the keystore, use the keytool command. For this purpose, login to the Windows<br />

manager and go to the command prompt. <strong>The</strong>n, execute the following commands, one after another:<br />

cd %JAVA_HOME%\bin<br />

keytool -genkey -alias egitlab1 -keypass mykey -keystore .keystore -storepass mykey -keysize<br />

1024 -validity 1095<br />

<strong>The</strong> text in Bold in the above command line indicates those inputs that can change according to the<br />

requirements of your environment. <strong>The</strong>se inputs have been described below:<br />

-alias : an alias name for the certificate being generated<br />

235

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!