Configure the Server

Configure APM Server

Before You Begin

  • Ensure that the APM Server is installed and the server is configured to use SSL.
  • Ensure that you can access the APM application in a web browser using HTTPS protocol.
  • Ensure that the APM data source is configured and you can log in with administrative privileges.

Procedure

  1. Using a web browser, log in to APM as an Administrator.
  2. In the Applications menu, navigate to ADMIN > Operations Manager > Data Sources.
    The Data Sources page appears.
  3. In the Data Source Host box, enter the name of the APM server, and then select Save.
  4. Enable LDAP Integration, configure Domain Record, and then schedule and run LDAP synchronization.
    Note: For more information on how to enable LDAP Integration, configure a Domain Record, and schedule LDAP synchronization, refer to the Lightweight Directory Access Protocol documentation.
    The users from Active Directory are now imported to APM and are assigned the appropriate Security Roles and Groups.
  5. Stop IIS, the Redis service, and all Meridium Windows services.
  6. Navigate to C:\Program Files\Meridium\ApplicationServer\api
  7. Using a json or text editor, access the file saml.json.
  8. Add a new configuration to <PartnerIdentityProviderConfigurations> json array or update the existing configuration by setting the following attributes:
    The following example shows the configured saml.json file:
    {"SAML": 
    {
    	"$schema": "https://www.componentspace.com/schemas/saml-config-schema-v1.0.json",
    	"Configurations": 
    	[
    	{	
    		"LocalServiceProviderConfiguration": 
    		{
    			"Name": "urn:componentspace:Meridium",	
    			"AssertionConsumerServiceUrl": "https://<APM Server Name>/Meridium/api/v1/core/security/ssologinauth",
    			"LocalCertificates": 
    			[
    			{
    				"FileName": "sp.pfx",
    				"Password": "password"
    			}
    			]
    		},
    		"PartnerIdentityProviderConfigurations": 
    		[
    		{
    			"Name": "http://fs.xyz.com/adfs/services/trust",
    			"Description": "ADFS",
    			"SignAuthnRequest": true,
    			"WantSamlResponseSigned": false,
    			"UseEmbeddedCertificate": true,
    			"WantAssertionEncrypted": false,
    			"WantAssertionSigned": true,
    			"SingleSignOnServiceUrl": "https://fs.xyz.com/adfs/ls/idpinitiatedsignon.aspx",
    			"PartnerCertificates": 
    			[
    			{
    				"FileName": "idp.cer"
    			}
    			]
    		}
    		]
    	}
    	]
    }
    }
  9. Save and close the file saml.json.
  10. Start IIS, the Redis service, and all Meridium Windows Services.