By default, all those self-service consoles and portals operate on HTTP port 8076.
The DualShield Platform also includes a Single Sign-On (SSO) portal. By default, the SSO portal operates on port 8074.
If you want to make both the SSO portal and the service console operate on port 443, then you will have to install 2 DualShield servers. On one server, you can change the SSO port from 8074 to 443, and on the other server you can change the port 8076 to 443. Typically, customers install the self-service console in DMZ as a DualShield Frontend Server.
Installing a DualShield frontend server is like installing a DualShield agent, it requires Agent Auto Registration to be enabled.
For an authentication agent to be able to connect to the DualShield authentication server, the agent must be registered in the DualShield authentication server.
For security purposes, the agent registration function is disabled by default. You need to enable the Agent Auto Registration function in your DualShield authentication server.
From the management console, navigate to "Authentication | Agents", then click
A new window will now open titled "Auto Registration", ensure the "Enabled" option is selected, then click ;
Tick the "Enabled" option first, then fill in the Starts and Expires date.
You may want to enable the "Check IP" option for extra security. If this option is enabled, then in the "IP Addresses" field you must enter the IP address of the machine where the authentication agent is being installed.
Click on the button, and Auto-Registration will now take place during the installation of the RADIUS server.
Install Frontend Server
Execute "DualShieldSetup64-xxx.yyyy-signed.exe" (where xxx is the version number and yyyy the build number) to start installation:
As of version 6.0.0, the language translation is still in progress. For now, please select "English".
Please keep the installation path as suggested, unless the C drive does not exist or for some other reason.
Select "Front-end Components"
If you want to keep the legacy components, make sure that you select the following
Legacy SSO Server
Legacy Self-Service Server
First, the frontend server must have a different FQDN from the backend server.
Secondly, if you are upgrading an old DualShield 5 frontend server to DualShield 6 by fresh installation, then you want to keep the FQDN the same as it currently is.
Thirdly, it is recommended that you provide a commercial SSL certificate for your DualShield frontend server as it is meant to be accessed by end-users from the Internet.
Keep the rest of the fields as they are suggested, unless you have special reasons to change them.
The frontend server is not as resource-demanding as the backend. The default values should be appropriate in most cases.
Wait for the DualShield server to be fully loaded
DualShield is a set of JAVA server applications. After the installation, upgrade or restart of the DualShield servers, The OS needs to initialise the JAVA virtual machine (JVM) and load the DualShield application into the JVM. This process can be slow and take a long time, depending on the speed and power of the machine.
To wait for the DualShield server to be fully loaded and monitor the its initialisation progress, launch the Windows Task Manager and check the process called DualShield Server which is often a sub-process of Commons Daemon Service Runner, as shown below:
During the initialisation process, the CPU usage of the DualShield Server process will go up and down, and the Memory consumption will continue to increase.
When the CPU usage drops to zero or slightly above zero, and the memory consumption reaches close to 1.8GB for the backend or 550MB for the frontend, that's the indication that DualShield is fully loaded and ready for operation.
Follow the guide below to set up the Service Console on the frontend server
To set up the Deployment Service portal, complete the following steps
Logon Procedure defines how users will be authenticated when they attempt to login to the portal. You can define a logon procedure of 1-step, 2-step and 3-step verification, for instance.
In the Admin Console, select "Logon Procedures"
There is a pre-defined logon procedure named "Self-Service Console".
To change its logon steps, click its context menu, select "Logon Steps"
You can define the logon steps according to your own requirements
Set up the Application
In the Admin Console, select "Applications"
There is a pre-defined application named "Self-Service Console"
Normally, you do not have to make changes to the default setup.
Set up the Realm
Realm is a group of user domains. It defines who is allowed to access the application that's associated with the realm.
In the Admin Console, select "Realm"
There is a pre-define realm named "Self-Service Console"
You must change the domains that are to be included in this realm, e.g. deepnetid.com
To change domains in a realm, click the context menu of the realm
select "Domain"
select the domains to included or deselect the domains to be excluded in the realm
Finally, click Save to save the changes.
Set up the Self-Service Policy
The Self Service Policy settings provide the system administrator with the means to specify which self service modules are to be available to the portal user.
The following guide provides details on the various policy settings that are available for the Self Service Console;
This policy allows the system administrator to configure settings for the Self Service Console, the Password Reset Module, the Emergency Access Module and the Provisioning Service Portal.
From the Home page of the Management Console, left click on the menu item "Administration", select "Policies", then in the new tab "POLICIES", select the category "Self Service", then click the button;.
The Self Service policy settings can now be viewed (or edited) by left clicking on the context menu of the Emergency Code policy, then selecting either "View" or "Edit";
Editing the Self Service Policy Settings:
Once the self service policy has been edited, a new window will open titled "Policy - Edit" (that can be used to edit the policy settings for this policy);
The category for this policy is "Self Service" (this property cannot be edited).
The holder of this policy is "System" (this property cannot be edited).
The name assigned to identify the lockout system policy by the System Administrator.
The System Administrator may use this field to annotate this policy.
This option allows the System Administrator to enable or disable this policy.
In addition to the settings in the main section, the Self-Service policy also includes the following expandable sections;
These sections can be expanded out to provide additional settings related to specific features of the self service console.
Self-Service Console
DualShield Service Console (DSC ) is a web portal that allows users to manage their own accounts and credentials.
Unable to render {include} The included page could not be found.
Emergency Access Service
DualShield Emergency Access Console (DEA) is a web portal that allows users to request emergency codes.
The purpose of the section "Emergency Access Service" is to allow users to request emergency codes.
This option determines if the Emergency Code Module is enabled (or disabled).
If disabled the module will no longer be listed in the self-service consoles' home screen.
This option determines the main delivery channel for sending the Emergency Code to the user;
Display Emergency Code on Screen The Emergency Code is displayed on the screen (within the self-service console, in the Emergency Code section).
Send Emergency Code Message sent to the User.
Password Reset Service
DualShield Reset Password (DRP) is a web portal that allows users to reset their forgotten AD password.
The purpose of the section "Password Reset Service" is to provide the system administrator with policy settings that enable and disable self-service console features that allow the user to reset their password.
This option determines if the Password Reset Module is enabled (or disabled).
If disabled the module will no longer be listed in the self-service consoles' home screen.
This option determines if the unlock account user feature is enabled.
Provisioning Service Module
This option was provided for a legacy obsolete feature that is no longer used in versions 6 onwards.
Unlock Account Service
DualShield Unlock Account Service (DUA) is a web portal that allows users to unlock their own user accounts.
Unable to render {include} The included page could not be found.
Deployment Service
DualShield Deployment Service (DDS) is a web portal that allows users to download some types of tokens (such as MobileID) and activate some types of tokens (such as DeviceID etc).
The purpose of the section "Deployment Service" is to provide the system administrator with policy settings that allow the administrator to specify the URL of the deployment service
This setting is used to specify the URL of the deployment service.