8.5 Converting a Secondary Access Manager Appliance into a Primary Appliance

To convert a secondary Access Manager Appliance into a primary Access Manager Appliance, a recent backup of Access Manager Appliance must be available. For information about how to perform a backup, see Section 2.2, Backing Up the Access Manager Appliance Configuration. A backup is necessary to restore the certificate authority (CA).

If the failed server holds a master replica of any partition, you must use ndsrepair to designate a new master replica on a different server in the replica list.

This conversion includes the following tasks:

8.5.1 Shutting Down the Primary Access Manager Appliance

If your primary Access Manager Appliance is running, you must log in as the administrator and shut down the service.

Start YaST, click System > System Services (Runlevel), then select to stop the ndsd service.

8.5.2 Changing the Master Replica

Changing the master replica to reside on the new primary Access Manager Appliance makes this Access Manager Appliance into the certificate authority for Access Manager. You need to first designate the replica on the new primary Access Manager Appliance as the master replica. Then you need to remove the old primary Access Manager Appliance from the replica ring.

Secondary Administration Console

  1. At the secondary Access Manager Appliance, log in as root.

  2. Change to the /opt/novell/eDirectory/bin directory.

  3. Run DSRepair with the following options:

    ./ndsrepair -P -Ad

  4. Select the one available replica.

  5. Select Designate this server as the new master replica.

  6. Run ndsrepair -P -Ad again.

  7. Select the one available replica.

  8. Select View replica ring.

  9. Select the name of the failed primary server.

  10. Select Remove this server from replica ring.

  11. Specify the DN of the admin user in leading dot notation. For example:

    .admin.novell

  12. Specify password.

  13. Type I Agree when prompted.

  14. Continue with Section 8.5.3, Restoring CA Certificates.

8.5.3 Restoring CA Certificates

The following steps are performed on the machine that you are promoting to be a primary Appliance.

  1. Copy your most recent Access Manager Appliance backup files to your new primary Access Manager Appliance.

  2. Change to the backup bin directory:

    /opt/novell/devman/bin

  3. Verify the IP address in the backup file. The IP_Address parameter value should be the IP address of the new Primary Administration Console.

    1. Open the backup file:

      defbkparm.sh

    2. Verify that the value in the IP_Address parameter is the IP address of your new primary console.

    3. Save the file.

  4. Run the certificate restore script:

    sh aminst-certs.sh

  5. When prompted, specify the administrator’s password and location of the backup files.

  6. Continue with Section 8.5.4, Verifying the vcdn.conf File.

8.5.4 Verifying the vcdn.conf File

Verify whether the vcdn.conf file contains IP address of the new Administration Console. If it contains IP address of the failed primary Administration Console, replace it with the new IP address.

  1. Change to the Appliance configuration directory:

    opt/novell/devman/share/conf

  2. Run the following command in the command line interface to restart Access Manager Appliance:

    /etc/init.d/novell-ac restart OR rcnovell-ac restart

  3. Continue with Section 8.5.5, Deleting Objects from the eDirectory Configuration Store.

8.5.5 Deleting Objects from the eDirectory Configuration Store

Objects representing the failed primary Access Manager Appliance in the configuration store must be deleted.

  1. Log in to the new Administration Console, then click Access Gateways.

  2. If the failed primary Appliance's Access Gateway is the primary server (has the red icon next to it), then change the primary Access Gateway server.

    1. Click [Access Gateway cluster name] > Edit.

    2. Select a different primary Access Gateway > click Ok > click Close.

      Ignore any trust store related warnings.

    3. Click Update All.

      Wait until the status becomes current for all except the failed primary Appliance.

  3. Click Auditing > Troubleshooting.

  4. In the Other Known Device Manager Servers section, select the old primary Appliance, then click Remove.

  5. Remove traces of the failed primary Access Manager Appliance from the configuration datastore:

    1. In the NetIQ Access Manager menu bar, select View Objects.

    2. In the Tree view, select novell.

    3. Delete all objects that reference the failed primary Access Manager Appliance.

      You should find the following types of objects:

      • SAS Service object with the hostname of the failed primary console

      • An object that starts with the last octet of the IP address of the failed primary console

      • DNS AG object with the hostname of the failed primary console

      • DNS IP object with the hostname of the failed primary console

      • SSL CertificateDNS with the hostname of the failed primary console

      • SSL CertificateIP with the hostname of the failed primary console

  6. Continue with Section 8.5.6, Performing Component-Specific Procedures.

8.5.6 Performing Component-Specific Procedures

If you have installed the following components, perform the cleanup steps for the component:

Third Access Manager Appliance

If you installed a third Appliance used for failover, you must manually perform the following steps on that server:

  1. Open the vcdn.conf file.

    /opt/novell/devman/share/conf

  2. In the file, look for the line that is similar to the following:

    <vcdnPrimaryAddress>10.1.1.1</vcdnPrimaryAddress>

    In this line, 10.1.1.1 represents the failed primary Appliance IP address.

  3. Change this IP address to the IP address of the new primary Appliance.

  4. Restart the Access Manager Appliance by entering the following command from the command line interface:

    /etc/init.d/novell-ac restart OR rcnovell-ac restart

Access Gateway Services

For each Access Gateway Service imported into the Administration Console, edit the settings.properties file on the Access Gateway if the primary Administration Console was not configured as the Audit Server.

If the primary Administration Console was configured as an Audit Server, you must edit the config.xml file and the settings.properties file on the Access Gateway and edit the CurrentConfig and WorkingConfig XML documents in the configuration store on the new primary Administration Console.

  1. At the Access Gateway Service, log in as the root or the Administrator user.

  2. Shut down all Access Gateway Services.

    /etc/init.d/novell-appliance stop OR rcnovell-appliance stop

  3. (Conditional) If your audit server was on the primary Administration Console, edit the config.xml file:

    1. Change to the directory and open the file.

      /opt/novell/nam/adminconsole/webapps/agm/WEB-INF/config/current

    2. Find the NsureAuditSetting entry.

      In the IPv4Address field, change the IP address from the failed Administration Console to the new primary Appliance address.

    3. Save and exit.

  4. Edit the settings.properties file:

    1. Change to the directory and open the file.

      /opt/novell/devman/jcc/conf

    2. Change the IP address in the remotemgmtip list from the IP address of the failed Appliance to the address of the new primary Appliance.

    3. Save and exit.

  5. At the Access Gateway Service, start all services by entering the following command:

    /etc/init.d/novell-appliance start OR rcnovell-appliance start

  6. (Conditional) Repeat this process for each Access Gateway Service that has been imported into the Administration Console.

SSL VPN

For each SSL VPN component imported into the Administration Console, you must edit the config.xml file and the settings.properties file on the SSL VPN server and edit the current config and working config XML documents in the configuration store on the new primary Appliance.

  1. Log in as the root user.

  2. Open a terminal window and shut down all services by entering the following commands:

    • /etc/init.d/novell-jcc stop OR rcnovell-jcc stop

    • /etc/init.d/novell-sslvpn stop OR rcnovell-sslvpn stop

  3. Edit the config.xml file:

    1. Enter: vi /etc/opt/novell/sslvpn/config.xml

    2. Enter /DeviceManagerAddress, then press Enter.

    3. Change the IP address to that of the new primary Appliance.

    4. Enter :wq! to save and exit.

  4. At the new primary Appliance, open an LDAP browser and edit the CurrentConfig object of the SSL VPN.

    IMPORTANT:You should use an LDAP browser for the following steps, rather than iManager. iManager is slow at saving large files, and your iManager connection might time out before your modifications are saved.

    1. Browse to the following container: novell > accessManagerContainer > VCDN_Root > PartitionsContainer > Partition > AppliancesContainer.

      A list of devices appears. SSL VPN devices have an sslvpn prefix.

    2. Expand an SSL VPN container, then select the CurrentConfig object.

    3. Select the romaSSLVPNConfigurationXMLDoc attribute and open it.

    4. Copy the contents of the attribute to a text editor.

    5. Search for the <DeviceManagerAddress> element.

    6. Change the IP address of the <DeviceManagerAddress> element so that it matches the IP address of the new primary Administration Console.

    7. Copy the modified document in the text editor to the value field of the romaSSLVPNConfigurationXMLDoc attribute.

    8. Save your changes.

  5. At the new primary Appliance, edit the WorkingConfig object of the SSL VPN container:

    Use an LDAP browser for these steps.

    1. Browse to the SSL VPN object by expanding the following containers: novell > accessManagerContainer > VCDN_Root > PartitionsContainer > Partition > AppliancesContainer.

      A list of devices appears.

    2. Expand the SSL VPN container, then select the WorkingConfig object.

    3. Select the romaSSLVPNConfigurationXMLDoc attribute and open it.

    4. Copy the contents of the attribute to a text editor.

    5. Search for the <DeviceManagerAddress> element.

    6. Change the IP address of the <DeviceManagerAddress> element so that it matches the IP address of the new primary Administration Console.

    7. Copy the modified document in the text editor to the value field of the romaSSLVPNConfigurationXMLDoc attribute.

    8. Save your changes.

  6. Start all services by entering the following commands:

    • /etc/init.d/novell-jcc start OR rcnovell-jcc start

    • /etc/init.d/novell-sslvpn start OR rcnovell-sslvpn start

  7. (Conditional) If the SSL VPN server is still not functioning, restart the Linux server by entering reboot.

  8. (Conditional) Repeat this process for each SSL VPN server that has been imported into the Administration Console.

8.5.7 Enabling Backup on the New Primary Appliance

  1. On the new primary Appliance, change to the /opt/novell/devman/bin directory.

  2. Open the defbkparm.sh file and find the following lines:

    EDIR TREE=<tree_name>
    EDIR CA=<CA name>
    

    These lines contain values using the hostname of the Appliance you are on.

  3. Modify these lines to use the hostname of the failed Appliance.

    When you install the primary Appliance, the EDIR TREE parameter is set to the hostname of the server with _tree appended to it. The EDIR CA parameter is set to the hostname of the server with _tree CA appended to it.

    If the failed Appliance had amlab as its hostname, you would change these lines to have the following values:

    EDIR TREE="amlab_tree"
    EDIR CA="amlab_tree CA"
    
  4. Save your changes.

  5. Take a backup from your new primary Appliance.

    WARNING:After configuring the secondary Appliance to be the new primary Appliance and performing all the cleanup steps, you cannot restore an old backup from the primary Appliance.

    Take a new backup as soon as your new primary Appliance is functional.