Installing the Front-End Applications

You can install the ActivID Management Console, Self-Service Portal, and RADIUS Front End on a separate appliance using the Front-End installation option during the appliance initialization process.

Important:  
  • When you install Front-End applications alone on an appliance, you must install them for the same set or a subset of the domains installed on the back-end appliance.

  • You can deploy the back-end appliance with an HSM, but Front-End applications can be installed on an appliance with software cryptography as they do not use the HSM.

Install the Front-End Applications

Prerequisites:  
  • The ActivID Authentication Services have already been installed on the back-end appliance(s) using the Full installation option (see Initializing the ActivID Appliance)

  • You know passwords for the ftinit accounts associated to the security domains(s) that the front-end installation will join

  • Download the Appliance Root CA certificate for the back-end appliance (or the CA certificate if you customized the back-end TLS server certificate) and make sure that it is accessible from the system where you will install the front-end appliance

  • You have configured the appliance network using the ActivID UNIX Terminal as described in Configuring the Initial Appliance Settings

  • If the back-end appliance is not in the DNS, add the back-end's IP/hostname in the /etc/hosts file of the front-end appliance

  1. From any browser, access the ActivID Console using the following URL:

    https://<appliance-hostname>:1005

    The first time you access the ActivID Console, you are prompted to trust the connection to the site.

  2. Click Proceed to <appliance site>.

  3. Enter the credentials for the Appliance Administrator account (appadmin and the password you set during the initial configuration using the UNIX terminal).

  4. Under Appliance in the left-hand menu, select Dashboard.

  5. Select I accept the agreement and click Next.

  6. In the Initialization section of the appliance dashboard, select Front-End installation.

    Important: Once an installation type is applied, the only way to change it is to revert the appliance to the Initial State.
  7. Enter the hostname and https port for the back-end appliance where you installed the ActivID Authentication Services.

  8. Upload the SSL Server Root CA Certificate for the back-end appliance (the Appliance Root CA certificate or the customized CA certificate that you downloaded before starting the installation).

  9. Click Initialize.

  10. Under Configuration in the left-side menu, select Key Stores.

  11. Download the Appliance Root CA Certificate for the front-end appliance that you will need to upload to the back-end appliance.

  12. Log on to the ActivID Console for the back-end appliance and, under Configuration in the left-side menu, select Key Stores.

  13. Browse to the Appliance Root CA Certificate for the front-end appliance and click Import.

  14. Under Configuration in the left-side menu, click Applications, and then click Restart all Applications to establish the trusted connection to the front-end appliance.

  15. Return to the ActivID Console for the front-end appliance and, under Configuration in the left-side menu, click Security Domains.

  16. Click Join.

  17. Enter the name(s) of the Security Domains and the Password(s) for the corresponding ftinit users that the front-end installation should join.

    You can join all or only a subset of the security domains.

    Important: The names of the security domains must be exactly as defined in the back-end appliance (including upper or lower case).

Enable the RADIUS Front End (Optional)

For ActivID RADIUS applications installed on a front-end appliance, you need to activate the service on all or a subset of the security domains and configure the application instance for the node hosting the client application on the back-end appliance.

  1. To deploy the ActivID RADIUS Front End on one or more security domains, under Configuration in the left-side menu, select RADIUS Front End.

  2. Select the domain(s) on which you want to activate the RADIUS Front End services, and click Activate on domain(s) and then OK to confirm the operation.

  3. Under Configuration in the left menu, select Applications.

  4. Click Restart RADIUS Front End to restart the RADIUS service to update the RADIUS configuration.

  5. Under Configuration in the left menu, select Key Stores.

  6. Select Private Certificates.

  7. Download the ActivID RFE Push-based Client Certificate (TLS).

  8. Log on to the ActivID Console for the back-end appliance and, under Configuration in the left menu, select Push-based Authentication.

  9. Click Edit to configure the default ActivIDRFE client application.

  10. Click Add to add an instance for the front-end client application.

  11. Enter a Name for the instance and then upload the TLS client certificate (the ActivID RFE Push-based Client Certificate) for the front-end client application and click Save.

  12. If required, configure the ActivID RADIUS Front End for the push-based solution.

    Important: For push-based authentication, the RADIUS client application (NAS) must be configured to use the PAP mode RADIUS protocol
  13. Once the configuration is complete, log on to the ActivID Management Console and Self-Service Portal to perform RADIUS-based authentications.

Installing the Front Ends in Dual Mode

To deploy several appliances as front ends in a dual mode deployment, you should proceed in a certain order to minimize some reconfiguration requirements.

Sample high availability deployment:

  • Appliance A – Back-End appliance (that is, ActivID Authentication Services deployed)

  • Appliance B – Back-End appliance (that is, ActivID Authentication Services deployed)

  • Appliance C – Front-End appliance – linked to Appliance A

  • Appliance D – Front-End appliance – linked to Appliance B

Recommended order:

  1. Set Appliances A and B to dual mode.

  1. Initialize Appliance C so that it is linked to Appliance A.

  2. Initialize Appliance D so that it is linked to Appliance B.

However, if you do NOT follow the recommended, for example:

  1. Initialize Appliance D so that it is linked to Appliance B.

  1. Set Appliances A and B to dual mode (‘source’ node is A and ‘target’ node is B).

  2. Initialize Appliance C so that it is linked to Appliance A.

Then the front-end Appliance D should be reconfigured as the ‘target’ Appliance B was overwritten during the dual mode configuration.

In this case, you have to repair the domains configured on the front-end Appliance D:

  1. Log on to the ActivID Console and, under Configuration, select Security Domains.

  1. For each of the defined security domains:

    1. Click Repair.

    2. Enter the password of the ActivID Initialization User (ftinit) user.

    3. Click Recover.