2.3 Restoring the Administration Console Configuration

The restore script replaces the configuration records in the configuration database with the records in the backup of the configuration store. It should be used to restore configuration data for one of the following types of scenarios:

If the primary Administration Console machine has failed, you have lost both the configuration and the configuration database. To recover from this scenario, you need to do more than restore the configuration.

For instructions, see Section 6.6, Moving the Primary Administration Console to New Hardware.

The restore script cannot be used to move the Administration Console to a different platform, even if the new machine is configured to use the same IP address and DNS name. The backup files contains path information that is specific to the operating system. To move the Administration Console from Linux to Windows or Windows to Linux, you need to install a secondary Administration Console on the desired platform, then promote it to being the primary Administration Console. For instructions on this process, see Section 6.7, Converting a Secondary Administration Console into a Primary Console.

The restoration steps are dependent upon whether the Administration Console is installed on its own machine or with other Access Manager components:

NOTE:Restore should be made on the same version that was used to take the backup.

2.3.1 Restoring the Configuration on a Standalone Administration Console or with a Traditional SSL VPN Server

  1. Ensure that the .zip file created during the backup process is accessible.

  2. Log in as root.

  3. (Conditional) If you have modified the Tomcat password in the server.xml file on a Linux Administration Console, back up this file. This file is located in the following directory:

    /opt/novell/nam/adminconsole/conf

    The feature to modify this password was removed in Access Manager 3.0 SP3.

  4. Change to the utility directory.

    Linux: /opt/novell/devman/bin

    Windows Server 2008: \Program Files (x86)\Novell\bin

  5. Run the following command:

    Linux: ./amrestore.sh

    Windows: amrestore.bat

  6. Specify and re-specify the Access Manager administration password.

  7. (Windows) Specify the path to where the backup file is stored.

  8. Specify the name of the backup file. Do not include the .zip extension.

  9. Specify the private key encryption password, then press Enter.

  10. Re-specify the private key encryption password, then press Enter.

  11. (Conditional) If you have modified the Tomcat password or any other configuration on the Linux machine:

    1. Modify the server.xml file with changes that you have made in the Tomcat directory.

      /opt/novell/nam/adminconsole/conf

    2. Restart Tomcat with the following command:

      /etc/init.d/novell-ac restart OR rcnovell-ac restart

  12. (Windows) Reboot the machine.

  13. (Conditional) If you have a secondary Administration Console installed, reboot the machines.

  14. (Conditional) If any devices report certificate errors, you need to re-push the certificates.

    1. Click Auditing > Troubleshooting > Certificates.

    2. Select the store that is reporting errors, then click Re-push certificates.

      You can select multiple stores at the same time.

    3. (Optional) To verify that the re-push of the certificates was successful, click Security > Command Status.

If you are restoring only the Administration Console, other components should still function properly after the restore.

2.3.2 Restoring the Configuration with an Identity Server on the Same Machine

Select the type of machine the Administration Console is installed on:

Linux

Whenever you run the amrestore.sh script, the Administration Console is restored as a standalone Administration Console. You must perform the steps described in Step 10 to restore your Identity Server into the configuration.

  1. Ensure that the .zip file created during the backup process is accessible.

  2. Log in as root.

  3. Change to the /opt/novell/devman/bin directory.

  4. Run the following command:

    ./amrestore.sh

  5. Specify the Access Manager administration user ID.

  6. Specify the Access Manager administration password.

  7. Specify the name of the backup file. Do not include the .zip extension.

  8. Specify the private key encryption password, then press Enter.

  9. Re-specify the private key encryption password, then press Enter.

  10. For the Identity Server, complete the following steps after the restore process has finished:

    1. Remove the Identity Server from the cluster configuration. See Removing a Server from a Cluster Configuration in the NetIQ Access Manager 3.2 SP2 Identity Server Guide.

    2. Delete the Identity Server from the Administration Console. (See Managing an Identity Server in the NetIQ Access Manager 3.2 SP2 Identity Server Guide.)

    3. Uninstall the Identity Server. (See Uninstalling the Identity Server in the NetIQ Access Manager 3.2 SP2 IR2 Installation Guide.)

      This is required if the Identity Server is installed on the machine. If you installed the Identity Server before running the amrestore.sh script, you need to uninstall the Identity Server.

    4. Install the Identity Server. (See Installing the NetIQ Identity Server in the NetIQ Access Manager 3.2 SP2 IR2 Installation Guide.

    5. If you have customized login pages, error pages, messages, or configuration files, copy these files to the Identity Server.

    6. Reassign the Identity Server to the cluster configuration that it was removed from. (See Assigning an Identity Server to a Cluster Configuration in the NetIQ Access Manager 3.2 SP2 Identity Server Guide.)

    7. Update the Identity Server.

  11. (Conditional) If any devices report certificate errors, you need to re-push the certificates.

    1. Click Auditing > Troubleshooting > Certificates.

    2. Select the store that is reporting errors, then click Re-push certificates.

      You can select multiple stores at the same time.

    3. (Optional) To verify that the re-push of the certificates was successful, click Security > Command Status.

Windows

To perform a restore when a Windows Administration Console and an Identity Server are installed on the same machine:

  1. Log in as the administrator user.

  2. Run the Access Manager Restore utility.

    1. From a command line, change to the utility directory:

      Windows Server 2008: \Program Files (x86)\Novell\bin directory.

    2. Specify amrestore.bat.

    3. Answer the prompts.

  3. Remove the Identity Server from the cluster configuration. (See Removing a Server from a Cluster Configuration in the NetIQ Access Manager 3.2 SP2 Identity Server Guide.)

  4. Delete the Identity Server from the Administration Console. (See Managing an Identity Server in the NetIQ Access Manager 3.2 SP2 Identity Server Guide.)

  5. Install the Identity Server on the Administration Console. (See Installing the NetIQ Identity Server in the NetIQ Access Manager 3.2 SP2 IR2 Installation Guide.

  6. If you have customized login pages, error pages, messages, or configuration files, copy these files to the Identity Server.

  7. Reassign the Identity Server to the cluster configuration that it was removed from. (See Assigning an Identity Server to a Cluster Configuration in the NetIQ Access Manager 3.2 SP2 Identity Server Guide.)

  8. Update the Identity Server.

2.3.3 Restoring the Configuration with an ESP-Enabled SSL VPN Server

Whenever you run the amrestore.sh script, the Administration Console is restored as a standalone Administration Console. You must perform the steps described in Step 10 to restore your ESP-enabled SSL VPN server into the configuration.

  1. Ensure that the .zip file created during the backup process is accessible.

  2. Log in as root.

  3. Change to the /opt/novell/devman/bin directory.

  4. Run the following command:

    ./amrestore.sh

  5. Specify the Access Manager administration user ID.

  6. Specify the Access Manager administration password.

  7. Specify the name of the backup file. Do not include the .zip extension.

  8. Specify the private key encryption password, then press Enter.

  9. Re-specify the private key encryption password, then press Enter.

  10. For the SSL VPN Server, complete the following steps after the restore has finished:

    1. Remove the SSL VPN Server from the cluster configuration.

    2. Delete the SSL VPN Server from the Administration Console.

    3. Uninstall the SSL VPN server.

    4. Install the SSL VPN server.

    5. Reassign the SSL VPN server to the cluster configuration that it was removed from.

    6. Update the SSL VPN server.

  11. (Conditional) If any devices report certificate errors, you need to re-push the certificates.

    1. Click Auditing > Troubleshooting > Certificates.

    2. Select the store that is reporting errors, then click Re-push certificates.

      You can select multiple stores at the same time.

    3. (Optional) To verify that the re-push of the certificates was successful, click Security > Command Status.

NOTE:After running the restore script, verify the logs to confirm that no errors occurred while running the script. The log file location is displayed during the script execution.