Step 2: Configure Windows Network Load Balancing
Step 2: Configure Windows Network Load Balancing
This step shows you how to configure the Network Load Balancing process. This task will be executed on one of the hosts that should be clustered for Network Load Balancing. These settings require you to have administrative privileges on the selected hosts.
To configure Network Load Balancing (manually)
- Start Network Load Balancing Manager.
- In the menu Cluster, click on New.
- Preform the following tasks in the window "New Cluster: Connect".
- Connect to your first host, e.g.: web01.democorp.com and click Connect.
- In the list of network interfaces, select Ethernet 2 - with the IP that is dedicated to Network Load Balancing and set to "static".
- Click Next.
- In the window "New Cluster: Host Parameters", click Next.
- Preform the following tasks in the window "New Cluster: Cluster IP Addresses".
- Click Add and enter the Cluster IP: 192.168.0.50 with matching subnet mask.
- Click Next.
- Preform the following tasks in the window "New Cluster: Cluster Parameters".
- Enter the Full Internet Name, e.g.: ServiceCluster.democorp.com.
- Click Next.
- Preform the following tasks in the window "New Cluster: Port Rules".
- Select the existing rule and click Remove.
- Click Add.
- Preform the following tasks in the window "Add/Edit Port Rule".
- Set the Port range to: From 443 To 443.
- Select "TCP" as protocol.
- Set the Filtering Mode to "Multiple Host".
- Set the Affinity to match your requirements or leave it at "Single (*)".
- Click OK.
- Click Finish.
(*) The affinity is used to determine to which back-end server a client is connected. The Webservice uses a stateless architecture, thus any affinity will work.
To add additional hosts to the Network Load Balancing cluster
- Start Network Load Balancing Manager.
- In the menu Cluster, click on Connect to existing.
- In the window "Connect to Existing: Connect", enter the Cluster IP / FQDN and click Connect.
- In the Clusters list, select the Cluster and click Finish.
- In the tree view, select the cluster.
- In the menu Cluster, click on Add Host.
- Preform the following tasks in the window "Add Host to Cluster: Connect".
- Connect to your next host, e.g.: web02.democorp.com and click Connect.
- In the list of network interfaces, select Ethernet 2 - with the IP that is dedicated to Network Load Balancing and set to "static".
- Click Next.
- In the window "Add Host to Cluster: Host Parameters", click Next.
- In the window "Add Host to Cluster: Port Rules", click Finish.
Step 3: Configuration Validation
Before changing the configuration of the One Identity Manager Password Capture Agent, you must validate the configuration. After the previous steps, you should be able to access https://ServiceCluster.democorp.com and see the IIS welcome screen.
Step 4: Applying Password Capture Agent Web Service URL on the Password Capture Agent
Step 4: Applying Password Capture Agent Web Service URL on the Password Capture Agent
To set the Password Capture Agent web service URL
- Start an elevated command line.
- Execute command to modify the web service URL at the Password Capture Agent.
REG ADD "\\<COMPUTERNAME>\HKLM\Software\One Identity\One Identity Manager\Password Capture Agent" /v "WebService_URL" /t REG_SZ /d "https://ServiceCluster.democorp.com/SoapService/Q1IMService.asmx"
- Execute commands to restart the Password Capture Agent service.
sc \\<COMPUTERNAME> stop "Password Capture Agent"
sc \\<COMPUTERNAME> start "Password Capture Agent"
Troubleshooting
When accessing https://ServiceCluster.democorp.com I receive an invalid certificate error in my browser.
Since you are not accessing each host by its real host name, you have to ensure that the SSL certificate was issued to the common name matching the cluster’s fully qualified domain name and that the fully qualified domain name is set in the Subject Alternative Names (SAN) field.
When accessing https://ServiceCluster.democorp.com Kerberos authentication fails.
Since you are accessing all servers in this cluster with the same fully qualified domain name, Kerberos authentication will fail. If you have NT Lan Manager disabled as fallback, authentication will not work.