Omada Identity Installation Tool
The Omada Identity Installation Tool creates a reusable configuration file that you can use to install some or all of the Omada Identity components. You can either run the Omada Identity Installation Tool to create a configuration file and to install Omada Identity, or you can use the scripts related to the Omada Identity Installation Tool to run the installation manually.
You can use the Omada Identity Installation Tool on one-, two- and three-server environments. The PowerShell script uses this configuration, and you can also reuse it for future troubleshooting.
By default, the Omada Identity Installation Tool only installs core feature packages. Additional packages must be installed manually by a system administrator from the ES web portal.
You can install optional packages under Setup > Administration > Configuration management > Installed packages.
The Omada Identity Installation Tool uses PowerShell module SQL Server to perform database tasks. If the SQL Server module is not installed on the server, Omada Identity Installation Tool uses NuGet to download and install this module.
If the server is not connected to the internet, the SQL Server module must be installed before the Omada Identity Installation Tool installation.
Components
The Omada Identity Installation Tool contains two components:
- A user interface where you can configure the installation settings.
- A PowerShell script that runs the installation process.
You can use the PowerShell script without using the Omada Identity Installation Tool.
Requirements
The following rights and software components are required for installation:
-
Administrative access rights on the servers on which the software is installed
-
Microsoft SQL Server (versions 2016, 2017, 2019, or 2022)
-
PowerShell version 5.1 or newer
-
IIS version 7.5 or newer
-
SSIS and PSRemoting
If you install Omada Identity components on a machine that already contains installed components but does not have Microsoft SQL, you must install SSIS as a prerequisite.
You must also enable PSRemoting on all involved machines, as the Omada Identity Installation Tool uses this setting to communicate between servers.
-
Powershell module SQL Server
If the servers on which Omada Identity is installed are not connected to the internet, the Powershell module SQL Server has to be installed on them. To verify if the SQL Server is installed, use the following PowerShell command:
Get-InstalledModule SQLServer -ListAvailable
To be able to run the SQL Server PowerShell module on an offline machine, first install the SQLServer module on the online server, and then copy it to the folder C:\Program Files\WindowsPowerShell\Modules on the offline machine.
You can install the SQL Server module with the following PowerShell command:
Install-Module SQLServer -Force -AllowClobber
If the SQLServer module is not installed, the Omada Identity Installation Tool tries to download and install it. Without an internet connection, the installation fails.
If you are installing in a multi-server environment, configure Windows Firewall to allow the communication of the Distributed Transaction Coordinator on all involved machines.
Using SSL
You can configure the Omada Identity Portal to use SSL. You must provide a certificate thumbprint in the Omada Identity Installation Tool configuration tool. Additionally, OPS can also use SSL. See Omada Identity - Advanced Configuration Guide for more information about SSL.
SQL server instances
You can use SQL server instances that do not have the default naming. However, it is not possible to use SSIS instances that do not have the default naming.
PowerShell scripts
The Omada Identity Installation Tool uses PowerShell scripts to perform the installation. To allow the Omada Identity Installation Tool to run the required scripts, you might be required to change the execution policy on your server(s):
-
Open PowerShell.
-
To see the current execution policy settings, run the command:
Get-ExecutionPolicy-List
-
To set the execution policy, run the command:
Set-ExecutionPolicy Bypass
-
Restart the server.
-
Repeat step 1-4 for any every server used in your setup.
Once you have successfully installed the Omada Identity, you can switch the execution policy back to its original state.
For more information about PowerShell Execution Policy, see the Microsoft help document.
Making changes to security settings
The Omada Identity Installation Tool makes some changes to the security setting during the installation process. This allows you to, for example, use Kerberos as the authentication method.
Any changes to the delegation of the SSIS host must be done before using the Omada Identity Installation Tool in a three-host deployment.
If a user in whose context the installation takes place is not a member of the group Domain Administrators, you must make the following changes manually.
-
Before the configuration of the credentials Delegation is possible, make sure that the following Service Accounts - sPNs - are registered:
-
For the Enterprise Server portal, in the Attribute Editor tab of the Omada Identity service check if the IIS Service Account is set as an sPN.
-
-
For the Reporting Service, go to the Attribute Editor tab of the SSRS service and check if the SSRS Service Account is set as an sPN.
If both SSRS and IIS services are on the same host, you must take care when assigning the sPNs. You should either set both services to use the same sPN and service account or set each service to use its own sPN (which means that they need their own DNS records, as both services use the "http" prefix for their sPNs).
-
For the SQL Service, in the Attribute Editor tab of the SQL server check if the SQL Service Account is set as an sPN.
If the required sPNs are not configured, you can do it using the Setspn
command in the Domain Controller.
-
Enable Delegation for each of the services:
-
For the Enterprise Server portal, in the Delegation tab of the Omada Identity service (svc_ois), use constrained delegation by selecting Trust this user for delegation to specified services only, then Use Kerberos only and add delegation to the SSRS service (svc_ssrs) and to the SQL Service.
-
-
For the Reporting Service, in the Delegation tab of the SSRS service (svc_ssrs), use constrained delegation by selecting Trust this user for delegation to specified services only, then Use Kerberos only and add delegation to the SQL server (svc_sql).
-
For the SQL Server Integration Services, in the Delegation tab of the SSIS server computer account, use general unconstrained delegation by selecting Trust this computer for delegation to any service (Kerberos only).
noteThis is a Microsoft restriction, related to the requirements of WMI remote execution. If your company's security policy does not allow this setting, you may eliminate the need of enabling it by not using WMI for ODW imports.
ImportantThe SSIS host should be restarted after setting the delegation.
Please bear in mind that, for security reasons, this type of unconstrained delegation is NOT recommended in other configurations than the SSIS configuration.
-
Add access rights for the Windows Registry. Do this by modifying the local security policy on the SSIS server.
-
Open the Local Security Policy gpedit.msc editor.
-
Browse to Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignments.
-
Find and open Back up files and directories, then add the service user and click OK.
-
Find and open Restore files and directories, then add the service user and click OK.
-
When you use Windows Integrated Authentication with Kerberos on Windows 2016 or newer, you may need to change the ASP.NET authentication function to use the AppPool credentials.
If Kerberos is not working properly, there might be a need for the installer to check sPNs for duplicates. Another typical error is HTTP 400 - bad request, which is caused by large Kerberos tickets that exceed the size limit in the request header.