Converse agora com nosso suporte
Chat com o suporte

Identity Manager 8.1.5 - Installation Guide

About this guide One Identity Manager overview Installation prerequisites Installing One Identity Manager Installing and configuring the One Identity Manager Service Automatic updating of One Identity Manager Updating One Identity Manager Installing and updating an application server Installing the API Server Installing, configuring, and maintaining the Web Portal Installing and updating the Manager web application Logging in to One Identity Manager tools Troubleshooting Creating a One Identity Manager database for a test or development environment from a database backup Advanced configuration of the Manager web application Machine roles and installation packages

File download

To enable the download of larger files, the Manager web application requires a directory in which the download can be made available to the user. This effects reports, for example, which are generated by the application and saved as PDF by the user.

Table 54: Meaning of the configuration settings for the file download
Setting Description

Enable file download

Specifies whether file download is enabled. Enable this setting to allow larger files, such as reports, to be downloaded. If file download is not set, certain functions are not available.

Download directory

Directory for the application to use to make download available. The application requires full access rights to this directory.

Cleanup interval

Time in minutes search for and remove redundant files.

Supply time

Time in minutes before download is available to the user. Once a download has been initiated, the application cannot verify when and if the download was executed by the user so that the download must be aborted after a set time interval.

ASP.Net basic settings

In the area ASP.NET settings you can see some settings of ASP.Net, which can be edited by the Manager Web Configuration Editor.

Table 55: Meaning of configuration settings for ASP.Net
Setting Description

Max request length

Maximum length of the user request in kilobytes (KB). This limits, amongst others, the maximum size of file that can be loaded.

Execution timeout

Maximum time in seconds for processing a user request. The user request is aborted if timeout is exceeded.

NOTE: This time should not be too short because the user session can be lost if the timeout is exceeded.

Directories

In the Directories area you configure all the directories required by the Manager web application.

Table 56: Meaning of configuration settings for directories
Setting Description

Application directory

Full path to the application's installation directory. This is the directory where you will find the file web.config.

NOTE: Ensure correct case.

Log directory

Directory to which the application log is written. This directory can be relative to the application directory.

Database cache

Full path to the directory to save frequently used database contents.

Script assembly cache

Full path to the directory for caching assembler files.

SQL log directory

Full path to the directory where database accesses are logged. The SQL log is only used for finding errors and must be enabled through the Enable SQL log option in the Debugging pane.

Related topics

Application pool

In the Application pool view, you define all applications that work together to make the application available to the user in multiple languages.

  • Click Add application to define another application.
  • Click Remove application to select an application to remove.
  • You can change the order by using the arrows on the right side.

NOTE: You must at least define the currently configured application. The order has immediately effect on login performance because the status of configured applications is queried in the defined order.

Table 57: Meaning of the configuration settings for the application pool
Setting Description

Redirect URL

Full address of the application. It must also be possible to resolve this address on the client side through the user's browser.

NOTE: Ensure correct case.

Authentication

The applications communicate with each other over the defined URL. Permissions are required to do this if anonymous access is not permitted. The application required the same access rights as required when the URL is called by browser on the server.

Related topics
Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação