Symphony Administration Guide
Total Page:16
File Type:pdf, Size:1020Kb
Symphony Administration Guide Enterprise & Business Tiers 31 August 2018 1 Copyright © 2014–2018 Symphony. All Rights Reserved. Symphony and the Symphony logo are registered trademarks in the U.S. and other countries. I ADMINISTRATION GUIDE – ENTERPRISE & BUSINESS TIERS 31 AUGUST 2018 Table of Contents Introducing Symphony.......................................................................................................... 9 Preparing your installation - what you need before starting .................................................... 9 Things you need to know ...................................................................................................... 9 FQDNs and names used in this guide......................................................................................................... 9 Locating your admin credentials and pod configuration details ................................................................. 9 Things you should have ........................................................................................................ 9 Equipment and platform compatibility ...................................................................................................... 9 Identifying and accessing your Symphony service ................................................................. 10 Access to Symphony Cloud Services ........................................................................................................ 10 Emails from Symphony ........................................................................................................................... 10 Getting Started – Logging in to the Admin Portal .................................................................. 11 Understanding accounts ..................................................................................................... 11 Log in to the Admin Portal .................................................................................................. 11 Take a quick tour ............................................................................................................... 12 Usage Statistics .................................................................................................................. 14 Large Room Optimizations .................................................................................................. 14 AC Portal Two-Factor Authentication ................................................................................... 15 Create another admin account ............................................................................................ 17 Creating end user accounts ................................................................................................. 17 Notification of Account creation ............................................................................................................. 19 Set up password with email ................................................................................................ 20 First time user login — Pre-populating the user’s IM contacts and filters ................................ 21 Reviewing your new accounts ............................................................................................. 21 Account Audit Trail............................................................................................................. 21 Filtering Interface for Audit Trail ............................................................................................................. 22 Compliance Officers’ Audit Trail .......................................................................................... 23 Conversations .................................................................................................................... 23 Changing your password ..................................................................................................... 24 Logging out of the Admin Portal .......................................................................................... 24 Key Management Infrastructure (Assisted Installation) ......................................................... 24 The Symphony Private Pod Architecture .............................................................................. 25 Selecting your Deployment Option ...................................................................................... 26 Option 1: Software SM and Key Manager Operating in the cloud ............................................................ 26 Option 2: Software SM and on-premises Key Manager ............................................................................ 27 2 Copyright © 2014–2018 Symphony. All Rights Reserved. Symphony and the Symphony logo are registered trademarks in the U.S. and other countries. I ADMINISTRATION GUIDE – ENTERPRISE & BUSINESS TIERS 31 AUGUST 2018 Option 3: HSM and on-premises Key Manager ........................................................................................ 28 Load Balancers ........................................................................................................................................ 29 Installing the Key Manager ................................................................................................. 29 Install the host server for your Key Manager and Software SM ............................................................... 29 Download the KeyManager RPM file ....................................................................................................... 31 Installing the Java Cryptography Extension (JCE) ..................................................................................... 31 Running the RPM Installation .................................................................................................................. 31 Configuring Certificates .......................................................................................................................... 32 Bootstrapping the Software SM and HSM Keys ....................................................................................... 32 Software SM JSON file............................................................................................................................. 32 Safenet LUNA hardware HSM – Partition Requirements and Size ............................................................ 33 Safenet LUNA hardware HSM – Partition Policies .................................................................................... 33 Safenet LUNA hardware HSM – JSON File ................................................................................................ 35 Bootstrapping your Keys ......................................................................................................................... 36 Migrating keys from a SoftSM to an HSM ................................................................................................ 36 Tomcat and KeyManager Configuration .................................................................................................. 38 Starting and Stopping the Tomcat service ............................................................................................... 39 Luna SA 7000 firmware versions ............................................................................................................. 40 Migrating keys from a SoftSM to an HSM ................................................................................................ 41 Updating your Key Manager.................................................................................................................... 43 Managing your pod ............................................................................................................ 44 The Symphony Pod ............................................................................................................. 44 Roles ................................................................................................................................. 44 Super Administrator and Administrator Roles ......................................................................................... 44 Compliance Roles.................................................................................................................................... 48 SCO can grant entitlements to COs ......................................................................................................... 48 Searching and filtering ........................................................................................................ 49 Create a user and generate a password manually ................................................................. 50 Editing a user .......................................................................................................................................... 50 Changing the Username .......................................................................................................................... 51 Deactivating an account .......................................................................................................................... 52 Promoting an end user to admin ............................................................................................................. 52 Changing a user’s password .................................................................................................................... 52 Creating Service Accounts ..................................................................................................