4.1 Remote Installation Using UAM

This section includes the following topics:

4.1.1 Installing UAM

UAM is a console used to manage all components across your enterprise. You can use UAM to install the Agent on several computers at the same time.

After you have installed UAM, you can set up users and assign access to them. For more information about managing UAM users, see Section 6.0, Managing Users Using UAM. The following sections guide you through installing UAM:

Installing UAM on Microsoft Windows

Complete the following steps to install the UAM server, the UAM console, or both on a Windows computer.

To install UAM on a Windows computer:

  1. Log on to the Windows computer using a local administrator account.

  2. Download and run UAMInstaller.MSI from the package in the root folder of the installation kit and continue with the installation as prompted.

    NOTE:Do not restrict communication security settings to Federal Information Processing Standard (FIPS) encrypted algorithms unless you are certain that your environment requires that restriction. If you enable FIPS 140-2 mode, UAM cannot communicate with Agents that are running in non-FIPS mode. For more information about FIPS and the other security level options, see Section 7.0, Converting Agent from Non-FIPS to FIPS mode.

  3. Complete the automatic installer wizard.

  4. Specify and confirm a password for the UAM server. The administrator user account must use this password.

    NOTE:To change the administrative password for the UAM server, start the server using the old password and then reset it in Manage Server window by clicking Reset Admin Password.

  5. Continue with the installation as prompted until the installation is complete.

Installing UAM on Linux

Complete the following steps to install the UAM server, the UAM console, or both on a Linux computer.

To install the UAM on a Linux computer:

  1. Download the package in the root folder and specify the following command to extract the install files from the tar file.

    tar -zxvf <install_filename>

    Replace <install_filename> with the actual name of the install file.

  2. Change to the directory where you extracted the installer:

    cd <directory_name>

  3. Extract the appropriate .tar.gz file for your platform.

  4. (Conditional) Specify the following command to enable FIPS:

    ./enablefips.sh on

    NOTE:Do not restrict communication security settings to Federal Information Processing Standard (FIPS) encrypted algorithms unless you are certain that your environment requires that restriction. If you enable FIPS 140-2 mode, UAM cannot communicate with Agents that are running in non-FIPS mode. For more information about FIPS and the other security level options, see Section 7.0, Converting Agent from Non-FIPS to FIPS mode.

  5. Specify the following command to install the UAM in the new UAM folder:

    ./installserver.sh install

  6. Specify and confirm a password for the UAM server. The administrator user account can use this password.

  7. Run the following script to create the UAM database and set the administrator password before you run the run.sh script:

    ./runserver.sh

  8. Run the following script to start the UAM console:

    ./run.sh

  9. Continue with the installation as prompted until the installation is complete.

4.1.2 Installing the Agent Using UAM

To remotely deploy the Agent components:

  1. Install and launch UAM. For more information, see Installing UAM.

  2. Go to File > Remote Deployment.

  3. Select Add Host, specify the host name of the computer on which you want to install the Agent and click OK.

  4. Select the checkbox next to the added host, fill in all the details on the right panel, and click Next.

  5. Specify the User name and Password of the target computer.

  6. Select Create a new configuration in the Prepare Agent Configuration window and click Next.

    NOTE:If you have already saved the configuration file from a previous installation or silent installation file, you can use the other options accordingly.

  7. (Conditional) If you have already installed components on host(s) and want to use them, select Add the selected components to the existing install in the Installation type.

  8. (Conditional) If you are installing the components on the host(s) newly, select Create a new install with the selected components in the Installation type. This will remove any components already installed on the host(s), including AppManager components.

  9. Select the required components to install and click Next.

  10. (Conditional) Go to the Required Configuration window, specify the Port as 2620 and select Enable FIPS Security Restrictions, and complete the installation.

    NOTE:Do not restrict communication security settings to Federal Information Processing Standard (FIPS) encrypted algorithms unless you are certain that your environment requires that restriction. If you enable FIPS 140-2 mode, UAM cannot communicate with Agents that are running in non-FIPS mode. For more information about FIPS and the other security level options, see Section 7.0, Converting Agent from Non-FIPS to FIPS mode.

  11. When prompted, specify rclink. rclink is the default option for restart method. For more information about restart methods, see Restart Methods for the Security Agent for UNIX.

  12. (Conditional) If you are monitoring Secure Configuration Manager servers, go to the Secure Configuration Manager Configuration window and specify the following:

    • uvserv Port: Enter 1622.

    • Hostname: Specify the host name.

    • Port: Enter 1627.

    • SCM Core Version: Specify the version of Secure Configuration Manager server.

    NOTE:To enable FIPS communication between the Agent and Secure Configuration Manager server, select the checkbox next to Enable FIPS Security Restrictions.

  13. (Conditional) If you are monitoring Change Guardian servers, go to the Change Guardian Configuration window and specify the following:

    • CGU Component Startup Type: Select rc scripts.

    • Hostname: Specify the host name.

    • Port: Enter 8094.

    • Username: Enter the user name.

    • Password: Enter the password.

      NOTE:You can specify the other details and click Next.

  14. (Conditional) If you are monitoring Sentinel servers, go to the Sentinel Configuration window and specify the following:

    • Sentinel Component Startup Type: Select rc scripts.

    • Hostname: Specify the host name.

    • Port: Enter 1590.

    • Failover 1: Specify the IP address of the first server.

    • Failover 2: Specify the IP address of the second server.

    • SNMP Console Host Name: Specify the IP address of the SNMP host.

      NOTE:You can specify the other details and click Next.

  15. Continue with the installation as prompted until the installation is complete.

  16. (Conditional) If you are monitoring Oracle databases with Sentinel, provide the configuration information for the computer by clicking Configure > Sentinel Options > Configure Oracle Endpoints.

To add a host in UAM, where the Agent is already installed

  1. Go to Manage Hosts > Add Host.

  2. Enter the host name or IP address of the computer on which the Agent is already installed.

  3. Enter the UAM database account Username and Password.

  4. Click Add Host button to add the host.