Optional Configuration
Manually validate the APM Connect Administration Center License
To use the APM Connect Administration Center, you must validate your Administration Center license. Typically, validation is done automatically. However, user specific environment configuration, such as firewalls, may require manual validation. This topic describes how to manually validate your APM Connect Administration Center license.
Procedure
Results
The license is validated manually.
Set Java Environment Variables
About This Task
The Java Environment variables are set automatically when you run the APM Connect installer. However, if you need to update or reinstall Java without reinstalling APM Connect, complete these steps to configure Java on your APM Connect server.
Procedure
Enable Test Connection
About This Task
Procedure
- Access your APM Connect Installation package, navigate to the Jobs folder, and then copy the file CheckConnections.jar.
- On your APM Connect server, navigate to C:\APMConnect\Utilities\runtime\deploy.
- In the deploy directory, paste the file CheckConnections.jar.
What To Do Next
- Test the connections required to complete a data load.
Create APM Service User
Jobs in the APM Connect Administration Center are run by users. The apmService user is required to facilitate communication between APM Connect and Predix Essentials.
About This Task
Procedure
Results
The apmService user is created, and it appears in the list of users.
Import Adapter Jobs
A job is used to extract information from the source and push it into Predix Essentials. Before you can initiate a job using the APM Connect Administration Center, you must first load the jobs into the APM Connect Administration Center.
About This Task
Loading the jobs is accomplished by importing the jobs from a .zip file. This topic describes how to import jobs into the APM Connect Administration Center.
Procedure
Results
Each Job is automatically categorized into the correct project.
Configure Karaf (APM Container) User Security
Apache Karaf provides an advanced and flexible security system, powered by JAAS (Java Authentication and Authorization Service) in an OSGi compliant way. The default security configuration uses a property file located at C:\APMConnect\Utilities\runtime\etc\users.properties to store the authorized user and their password details.
The default username is tadmin, tesb and karaf and the associated password are tadmin, tesb and karaf.
Users, Groups, Roles, and Passwords
This login module uses the etc/users.properties
file as storage for the users, groups, roles and passwords.
The initial etc/users.properties file contains:
## # #%L # TESB :: Assembly # %% # Copyright (C) 2011-2019 Talend Inc. # %% # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # #L% ### # # This file contains the users, groups, and roles. # Each line has to be of the format: # # USER=PASSWORD,ROLE1,ROLE2,... # USER=PASSWORD,_g_:GROUP,... # _g_\:GROUP=ROLE1,ROLE2,... # # All users, groups, and roles entered in this file are available after Karaf startup # and modifiable via the JAAS command group. These users reside in a JAAS domain # with the name "karaf". # tadmin=tadmin,_g_:admingroup,sl_admin tesb=tesb,_g_:admingroup,sl_maintain karaf = karaf,_g_:admingroup _g_\:admingroup = group,admin,manager,viewer,systembundles
We have default users: tadmin,tesb
and karaf
and the associated password is tadmin,tesb
and karaf
.
The users tadmin,tesb
and karaf
are members of the admingroup
. A group is always prefixed by g:
. An entry without this prefix is a user.
admingroup
defines the below mentioned roles:group
admin
manager
viewer
It means that the tadmin,tesb
and karaf
user will have the roles that are defined by the admingroup
.
Password Encryption
About This Task
By default, all the passwords are stored in a clear form in the etc/users.properties file. You can enable encryption in the configuration file located at etc/org.apache.karaf.jaas.cfg.