Symphony Administration Guide

Symphony Administration Guide

Symphony Administration Guide Enterprise & Business Tiers 31 August 2018 1 Copyright © 2014–2018 Symphony. All Rights Reserved. Symphony and the Symphony logo are registered trademarks in the U.S. and other countries. I ADMINISTRATION GUIDE – ENTERPRISE & BUSINESS TIERS 31 AUGUST 2018 Table of Contents Introducing Symphony.......................................................................................................... 9 Preparing your installation - what you need before starting .................................................... 9 Things you need to know ...................................................................................................... 9 FQDNs and names used in this guide......................................................................................................... 9 Locating your admin credentials and pod configuration details ................................................................. 9 Things you should have ........................................................................................................ 9 Equipment and platform compatibility ...................................................................................................... 9 Identifying and accessing your Symphony service ................................................................. 10 Access to Symphony Cloud Services ........................................................................................................ 10 Emails from Symphony ........................................................................................................................... 10 Getting Started – Logging in to the Admin Portal .................................................................. 11 Understanding accounts ..................................................................................................... 11 Log in to the Admin Portal .................................................................................................. 11 Take a quick tour ............................................................................................................... 12 Usage Statistics .................................................................................................................. 14 Large Room Optimizations .................................................................................................. 14 AC Portal Two-Factor Authentication ................................................................................... 15 Create another admin account ............................................................................................ 17 Creating end user accounts ................................................................................................. 17 Notification of Account creation ............................................................................................................. 19 Set up password with email ................................................................................................ 20 First time user login — Pre-populating the user’s IM contacts and filters ................................ 21 Reviewing your new accounts ............................................................................................. 21 Account Audit Trail............................................................................................................. 21 Filtering Interface for Audit Trail ............................................................................................................. 22 Compliance Officers’ Audit Trail .......................................................................................... 23 Conversations .................................................................................................................... 23 Changing your password ..................................................................................................... 24 Logging out of the Admin Portal .......................................................................................... 24 Key Management Infrastructure (Assisted Installation) ......................................................... 24 The Symphony Private Pod Architecture .............................................................................. 25 Selecting your Deployment Option ...................................................................................... 26 Option 1: Software SM and Key Manager Operating in the cloud ............................................................ 26 Option 2: Software SM and on-premises Key Manager ............................................................................ 27 2 Copyright © 2014–2018 Symphony. All Rights Reserved. Symphony and the Symphony logo are registered trademarks in the U.S. and other countries. I ADMINISTRATION GUIDE – ENTERPRISE & BUSINESS TIERS 31 AUGUST 2018 Option 3: HSM and on-premises Key Manager ........................................................................................ 28 Load Balancers ........................................................................................................................................ 29 Installing the Key Manager ................................................................................................. 29 Install the host server for your Key Manager and Software SM ............................................................... 29 Download the KeyManager RPM file ....................................................................................................... 31 Installing the Java Cryptography Extension (JCE) ..................................................................................... 31 Running the RPM Installation .................................................................................................................. 31 Configuring Certificates .......................................................................................................................... 32 Bootstrapping the Software SM and HSM Keys ....................................................................................... 32 Software SM JSON file............................................................................................................................. 32 Safenet LUNA hardware HSM – Partition Requirements and Size ............................................................ 33 Safenet LUNA hardware HSM – Partition Policies .................................................................................... 33 Safenet LUNA hardware HSM – JSON File ................................................................................................ 35 Bootstrapping your Keys ......................................................................................................................... 36 Migrating keys from a SoftSM to an HSM ................................................................................................ 36 Tomcat and KeyManager Configuration .................................................................................................. 38 Starting and Stopping the Tomcat service ............................................................................................... 39 Luna SA 7000 firmware versions ............................................................................................................. 40 Migrating keys from a SoftSM to an HSM ................................................................................................ 41 Updating your Key Manager.................................................................................................................... 43 Managing your pod ............................................................................................................ 44 The Symphony Pod ............................................................................................................. 44 Roles ................................................................................................................................. 44 Super Administrator and Administrator Roles ......................................................................................... 44 Compliance Roles.................................................................................................................................... 48 SCO can grant entitlements to COs ......................................................................................................... 48 Searching and filtering ........................................................................................................ 49 Create a user and generate a password manually ................................................................. 50 Editing a user .......................................................................................................................................... 50 Changing the Username .......................................................................................................................... 51 Deactivating an account .......................................................................................................................... 52 Promoting an end user to admin ............................................................................................................. 52 Changing a user’s password .................................................................................................................... 52 Creating Service Accounts ..................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    186 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us