UMC InstallationManual
UMC InstallationManual
05/2019
A5E47537951-AA
Guidelines
This manual contains notes of varying importance that should be read with care; i.e.:
Important:
Highlights key information on handling the product, the product itself or to a particular part of the documentation.
Note: Provides supplementary information regarding handling the product, the product itself or a specific part of
the documentation.
Trademarks
The remaining trademarks in this publication may be trademarks whose use by third parties for their own purposes
could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
Security information
Siemens provides products and solutions with industrial security functions that support the secure operation of
plants, systems, machines and networks. In order to protect plants, systems, machines and networks against
cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions only form one element of such a concept.
Customer is responsible to prevent unauthorized access to its plants, systems, machines and networks. Systems,
machines and components should only be connected to the enterprise network or the internet if and to the extent
necessary and with appropriate security measures (e.g. use of firewalls and network segmentation) in place.
Additionally, Siemens’ guidance on appropriate security measures should be taken into account. For more
information about industrial security, please visit http://www.siemens.com/industrialsecurity.
Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly
recommends to apply product updates as soon as available and to always use the latest product versions. Use of
product versions that are no longer supported, and failure to apply latest updates may increase customer’s
exposure to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed under http://www.
siemens.com/industrialsecurity.
8 Troubleshooting.................................................................................................................... 71
9 Appendix ............................................................................................................................... 74
9.1 Importing a Windows Local User on an Agent................................................................ 74
9.2 UMC Processes .............................................................................................................. 75
9.3 Event Logging ................................................................................................................. 75
9.3.1 Event Logging Security Notes................................................................................. 77
9.4 Additional Provisioning Configuration ............................................................................. 78
Important:
UM domains are different entities with respect to Windows domains that are defined at
operating system level.
Custom attributes can be associated with UM users. Example of custom attributes are common user
properties such as phone number, department, and so on.
To apply Secure Application Data Support (SADS), access to encrypted application data can be
granted to authorized users to allow them to decrypt it using specific Subject Keys.
UM User Types
UM User Passwords
Users created within UMC have also an associated password. Empty passwords are not allowed.
Users imported from Windows authenticate against Windows and do not have a UMC password.
Imported Windows local users authenticate only locally against Windows on the machine where they
are present. They can be used only for configuration purposes, for instance to be associated with a
Windows service running on the machine.
Offline Users
When you create a UMC user you can flag the user as offline. UMC provisioning service checks if the
offline user exists in Active Directory:
• if the user is present, user data are synchronized and the user becomes online,
• otherwise the user remains offline.
Important:
Users created as offline are enabled by design: they can therefore perform the actions
allowed by their function rights.
The user name of offline users must follow the AD pattern <domainName>\<ADuserName>. They do
not have a UMC password, as they cannot authenticate until they become online. The User Security
Identifier (SID, see Microsoft Documentation on Security Identifiers for more details) property is set to a
default value (S-1-0-0) that is synchronized with the actual AD value by the UMC provisioning service.
Users are also flagged offline if they are deleted from AD. In this case users are permanently deleted
from UMC database after an amount of time that can be configured (default is12 hours). See the
additional provisioning configuration in the User Management Component Installation Manual for more
details.
User Limits
Description Maximum
To apply Secure Application Data Support (SADS), access to encrypted application data can be
granted to authorized groups to allow them to decrypt it using specific Subject Keys.
UM Group Types
Offline Groups
When creating a UMC group, you can flag the group as offline. UMC provisioning service checks if the
offline group exists in Active Directory:
• if the group is present, group data are synchronized, the AD users members of the groups are
imported into UMC and the group becomes online,
• otherwise the group remains offline.
The group name of offline users must follow the AD pattern <ADdomainName>\<ADgroupName>.
Group Limits
Description Maximum
• UM ring server: the owner of the UM configuration, which is responsible for managing the
domain, and provides full implementation of authentication and user management features. The
priority ring server is the one which is configured first, running the umconf utility. If more than
one ring server is available, if you unjoin the priority ring server, the system dynamically elects a
new priority ring server.
• UM server: provides full implementation of authentication features, the UM server is in
degraded mode if it is not connected to any UM ring server.
• UM agent: works as a client of the UM server/UM ring server to which it is attached, which can
be used to run an application developed using the UMC API. See the User Management
Component API SDK Developer Manual for more details. In order to import Windows Local
Users, see Importing a Windows Local User on an Agent in the UMC Installation Manual.
Important:
Engineering operations are not allowed on the UM Agent except for encryption
enablement.
The main differences between the three aforementioned machine roles are listed in the table below.
The ring server to which the other ring servers send the request to write on the UMC database (the
candidate for writing) is called master ring server. Both the priority and secondary ring server can be
master.
If the priority server is master, writing is enabled and the machine can write on the UMC database.
In case of failure, the secondary ring server becomes a master ring server with no writing enabled
(safe mode on). If the safe mode is switched off using the appropriate umx command, the secondary
ring server becomes a master with writing enabled. Consider that some operations on the UMC system
configuration are not allowed in this case, e. g. modifying the whitelist (see UMCONF User Manual for
more details).
A machine role orthogonal to the previous ones is UMC station client. A UMC station client is a
machine where UMC station client software has been installed and that has been registered to be a
trusted machine. A UMC station client provides a claim in which certified logon station information are
included. These details can be used to associate authorization rights with a machine, which must not
be a ring server,server or agent, using the client product.
UMC installation includes UMC station client installation, thus, UM ring servers, UM servers and UM
agents need only to register to become UMC station clients, whereas a machine that is not part of the
UMC domain has to install the UMC station client software first and then has to register to become a
UMC station client.
CAUTION:
If you want to manage Active Directory users, the UM ring server and the UM server
machines have to be joined to the AD Windows domain.
The table below provides the functionality mapping against the machine roles. For each functionality:
Change password
Potential Master
Propagate UM configuration
Log Forwarding
Import AD Users/Group
• standalone scenario: one ring server where UMC and all its Web components are installed
and configured. A quick configuration guide is available for this scenario.
• redundant scenario:
– 2 UM ring server machines, one ring server is configured first and is called priority ring
server, the secondary one is added to the ring using the join command;
– up to 4 UM servers
• distributed scenario:
– 1 or 2 UM ring server machines, one ring server is configured first and is called priority ring
server, the secondary one is added to the ring using the join command;
– up to 4 UM servers
– up to 25 UM agents.
Each UMC Web component can be installed and configured on any UM ring server and/or on any UM
server. If you install the UMC Web UI on a UM server, you cannot import AD users via UMC Web UI.
UMC allows you to prepare configuration data (users, groups and so on) in a standalone engineering
station, export this data in a UMC configuration package which can then be imported into a production
target system. The two commands involved are the umx export and import package commands. If you
want to overwrite the configuration of the target production system with that of the source engineering
machine the update command can be used instead of the import command. For more information on
these command and how they impact the target machine, see the UMX User Manual.
If the target system is not configured, you can import a package using the umconf import package
command. For more information see the UMCONF User Manual.
The following roles are automatically created by the system while configuring UMC:
• Administrator: built-in "root" role, can perform any operation. The user that has this role is a
root user that can perform any operation. This role cannot be associated with any group. It can
be associated with a user if the user performing the association has in turn the Administrator
role. The Administrator role cannot be deleted. Only users having the Administrator role can
modify other users having this role.
• UMC Admin: can manage users, groups and all the other UMC entities.
• UMC Viewer: can access the user management configuration without making modifications.
General Recommendations
• For security reasons, we suggest that you set the browser cookie policy management so that
cookies are not maintained after the browser is closed. In this way you can disable the
possibility that a user reopens a browser and is logged in without providing the credentials
again.
• The browser used to display the UMC Web UI must allow the pop-up display.
• While using the UMC Web UI do not select the option Prevent this page from creating
additional dialogs. The selection of this option causes Web UI malfunctions.
• Disable the Autocomplete option in your browser settings.
• Disable the password saving option in your browser settings.
Identity Provider
• Internet Explorer 8
• Internet Explorer 9
• Internet Explorer 10
• Internet Explorer 11
• Chrome 32.0.1700.107 m or higher
• Firefox 31.0 or higher
• Microsoft Edge 25.10586.0.0 or higher
UMC Web UI
The Web UI is based on HTML5. For this reason it is supported only on:
• Internet Explorer 11
• Chrome 32.0.1700.107 m or higher
• Firefox 31.0 or higher
• Microsoft Edge 25.10586.0.0 or higher
Important:
• 1280x800
• 1920x1200
• General Recommendations
• Supported Operating Systems
• Microsoft Visual C++ Packages
• Identity Provider Prerequisites
• IIS Configuration
• If you wish to use HTTPS instead of HTTP you must configure IIS for HTTPS
General Recommendations
• Operating Systems: The operating system must be updated to the latest security patches in
order to improve system reliability and security,
The Windows Security Patch KB2532445 must be installed on the following OS:
– Windows Server 2008 R2 SP1(Professional, Enterprise, Datacenter Edition)
– Windows 7 SP1 (x86, x64)
• Computer Naming Conventions: The computer name of the machines on which you will install
UMC must only contain alphanumeric characters and not exceed 15 characters. See host name
limitations in Microsoft Support Documentation for more information.
Note: If the configuration of Windows is such that the temp files are deleted when the
system is restarted, the installation will fail if the system is restarted by the setup. Should
this occur you must launch the setup again.
The following table lists the UMC components which can run on 32 or 64 bit machines.
UMCONF
UMX
Identity Provider
Web UI
Remote Authentication
API SDK
In order to install UMC, the following redistributable packages have to be installed on Windows
server 2008 R2, Windows 7, Windows 8.1, Windows server 2012 R2, Windows 10:
Important:
• For 32-bit operating system versions only the 32-bit redistributable packages have
to be installed, whereas for 64-bit operating system versions all the redistributable
packages have to be installed.
• In the BUNDLE and SIWA installers the redistributable packages are automatically
installed.
• IIS extension: Application Request Routing 3.0 and its prerequisites have been downloaded and
installed (For iis 8 and above: https://www.microsoft.com/en-us/download/details.aspx?id=
47332).
CAUTION:
UMC Web services use cookies to guarantee the correct functioning. We do not
display any warning related to cookie usage, as our application must not be used as
an open Web service, available, for instance, on the Internet.
In order to harden your system it is recommended you install the minimum set of IIS features possible,
see UMC Security Concept for more information on system hardening.
Verify the following features and roles are installed for Windows Server 2016.
– Performance (1 of 2)
- Static Content Compression
– Security (2 of 9 )
- Request Filtering
- Windows Authentication
7. Verify the following Roles are selected under Management Tools (3 of 7):
– IIS Management Console
8. Click Next.
9. Verify the following Features are selected:
– .Net Framework 3.5 Features (1 of 3)
- .Net Framework 3.5 (includes .net 2.0 and 3.0)
– Windows PowerShell (3 of 5)
- Windows PowerShell 5.1
- Windows PowerShell 2.0 Engine
- Windows PowerShell ISE
Windows 10
Verify the following features and roles are installed for Windows 10.
1. Type "Turn Windows Features on and off" in the Search Windows search box.
2. Click Turn Windows Features on and off in the result pane, a windows is displayed.
3. Verify the following are installed under Internet Information Services:
– Web Management Tools:
- IIS Management Console
- IIS Management Scripts and Tools
- IIS Services
- Static Content
- Performance Features
- Static Content Compression
- Security
- Request Filtering
- Windows Authentication
Prerequisites
A valid SSL certificate has been acquired from a Certification Authority or a self-signed SSL certificate
has been created.
Procedure
5. Insert the parameters as displayed in the previous image and click OK. The SSL certificate
parameter has to be the acquired certificate name.
6. Click OK and then Close.
Depending on your scenario you can use one of the following workflows:
• For a simple standalone UMC installation on 64bit machine with HTTPS you can follow the
Quick Configuration - Standalone UMC Scenario,
• For distributed and redundant scenarios or additional configurations, for example if you wish to
install UMC on a 32 bit machine follow How to Configure a UMC Scenario.
HTTP Configuration
CAUTION:
If IIS is not configured to work with https protocol, you can configure UMC both manually and via script,
but secure protocol is not enabled. In this scenario:
• If UMC Web UI does not work, verify that the value of the registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\User Management\WebUI\Settings\secure is
set to 0.
• Smart card authentication does not work.
Prerequisites
• (only required to manage Active Directory users) the Windows user specified at step 2
(managing Active directory users) must have:
– Active Directory access rights;
– Write access on the UMC program data subfolder \CONF( for example C:\ProgramData\
Siemens\UserManagement\CONF) or alternatively belong to the Windows group UM
Service Account;
Procedure
1. Right-click UMConf, which can be found in the subdirectory in Bin or Wow\bin, for example; C:
\Program Files\Siemens\UserManagement\Wow\Bin, and select Run As Administrator.
2. Following the guided configuration in UMConf Interactive mode:
– Create a User Management Domain, by specifying a name using only alphanumeric
characters.
– Create a User Management User with administrator role, by specifying the username
using only alphanumeric characters, and a password which complies with your
organization's password policy.
– Associate a Windows user who is either a member of UM Service Accounts group or
who has administrative rights to the UMCService, by inserting .\ username and the
corresponding password.
– (optional) To manage Active Directory users, specify a Windows user as described in
prerequisites, by inserting domain\username and password.
Result
Additional Configurations
• Configure Firefox for Integrated Windows Authentication, this procedure is not required for other
browsers.
• Perform Additional Identity Provider Configuration.
• If SADS (Secure Application Data Support) is required, it must be enabled via the UMX utility, by
running the command: umx -AP -setakp, for more information see the UMX User Manual.
• If dSSO (desktop single sign on) is required, it must be enabled via the UMCONF utility , for
more information see the UMCONF User Manual.
Prerequisites
• If you want to manage Active Directory users, the UM ring server and the UM server machines
have to be joined to the AD Windows domain.
• Check that the connectivity to TCP/4002 is enabled on all machines (or disable firewall on um.
Ris.exe, the UM process responsible for UM machines communications).
• The firewall configuration on UMC Servers and Ring Servers must be configured to allow
inbound access on either the port which is used for HTTP (by default 80) or, the port that is used
for HTTPS (by default 443).
Workflow
Additional Operations
• The following optional step can be performed on one of the previous machines:
Associate an administrative Role with a user, so that this user can run the umx.exe command
or can log in to the Web UI to manage UM users and groups.
• On the machines where dSSO (desktop single sign on) is required, it must be enabled via the
UMCONF utility , for more information see the UMCONF User Manual.
Once UMC has been installed the configuration must be performed via UMConf. The steps are
described using UMConf in interactive mode. UMConf.exe is distributed with UMC and installed in the
subdirectory \BIN(64bit) or Wow\Bin (32bit). If you need to import an existing configuration import
command must be executed via a UMConf.exe, for more information on UMconf see the UMCONF
User Manual.
Prerequisites
Procedure
1. Right-click UMConf, which can be found in the sub-directory Wow\bin, for example; C:\
Program Files\Siemens\UserManagement\Wow\Bin, and select Run As Administrator.
2. Following the guided configuration in UMConf Interactive mode:
– Create a User Management Domain, by specifying a name using only alphanumeric
characters.
– Create a User Management User with administrator role, by specifying the username
using only alphanumeric characters, and a password which complies with your
organization's password policy see UMC Security Concepts for more information;
– Associate a Windows user who is either a member of UM Service Accounts group or
who has administrative rights to the UMCService, by inserting .\ username and the
corresponding password.
– (optional) To manage Active Directory users, specify a Windows user as described in
prerequisites, by inserting domain\username and password.
Note:
• If SADS (secure application data support) is required see the UMX User Manual.
• the user which is assigned to the UMCService must only be modified via UMConf.
Additional Operations
Prerequisites
Procedure
1. Join the server using the umconf.exe program. See UMCONF User Manual for more details.
2. If you have configured the AD provisioning on the priority ring server, you have to configure it
also in the secondary ring server.
Additional Operations
Once UMC has been installed if required you can configure the web components as described below.
Prerequisites
Configuration Types
• via script: 64bit and HTTPS only. The script configures the web components automatically.
• manually: The manual method can be used for HTTP or HTTPS. You can also use the method
in order to structure your own custom configuration script.
CAUTION:
If you perform any modification to the IIS configuration after launching the configuration
script IdP_WebUI_configurator.bat or you have configured UMC without using this
script, you have to reset the Web components configuration and, only afterwards,
configure the system again .
To configure all the Web components on the same UM ring server/UM server, UMC provides the script
IdP_WebUI_configurator.bat which allows you to configure them to work with the HTTPS protocol
and to configure the integrated Windows authentication (except the Firefox configuration that has to be
performed manually).
Note:
• If the user which is used to run the script is a Windows local user, the FQDN
cannot be retrieved, this results in the registry key of the IDP being configured with
only the machine name and not the domain name.
• If you have configured a site in IIS with a name which is not Default Web Site, you
must open a command prompt as administrator from the installation folder of the .
bat file. and specify the name of the site as first parameter: for example, C:\
Program Files\Siemens\UserManagement\BIN>IdP_WebUI_configurator.bat "your
web site name".
• If you want to specify a specific "reverseProxy" value, different from the one
retrieved automatically in the script and you want to use it in the Identity Provider
configuration, you can set it as second parameter when launching the
IdP_WebUI_configurator.bat script: for example, C:\Program Files\Siemens\
UserManagement\BIN>IdP_WebUI_configurator.bat "your web site name" "your
reverse proxy address".
• By default the Identity Provider node.exe process is listening on port 8443. If you
want to modify this default value you can set the desired port value as third
parameter when launching the IdP_WebUI_configurator.bat script: for example,
C:\Program Files\Siemens\UserManagement\BIN>IdP_WebUI_configurator.bat
"your web site name" "your reverse proxy address" "port number".
• If you want to specify a certain parameter keeping the default values of the
previous parameters it is necessary to pass an empty string for the parameters that
you don't want to customize. For example, to specify only a certain port number
without modifying the IIS site name and the reverse proxy address, you have to
call the IdP_WebUI_configurator.bat script in this way: C:\Program Files\
Siemens\UserManagement\BIN>IdP_WebUI_configurator.bat "" "" "port number".
The empty double quotes specify an empty value for the parameters that will be
passed to the script.
General Recommendations
The Web components can be configured in any UM ring server and/or in any UM server. In order to
guarantee IdP high availability and reliability, we suggest that you install and configure it on more than
one machine and configure the IdP high availability/reliability.
Prerequisites
• IIS has been previously configured to work with the HTTPS protocol.
• The operating system must be 64 bit
• The machine is configured as a UMC ring server or server.
Workflow
1. On all the servers on which you want to configure the Web components, right-click
IdP_WebUI_configurator.bat, which for example can be found in C:\Program Files\
SIEMENS\UserManagement\BIN, if the default installation folder is selected, and select Run
as Administrator.
2. Configure Firefox for Integrated Windows Authentication (optional).
3. Configure smart card authentication (optional).
4. Perform Additional Identity Provider Configuration (optional).
General Recommendations
The Web components can be configured in any UM ring server and/or in any UM server. In order to
guarantee IdP high availability and reliability, we suggest that you install and configure it on more than
one machine and configure the IdP high availability/reliability.
Prerequisites
If required IIS has been previously configured to work with the HTTPS protocol.
Workflow
Prerequisites
Procedure
4. Insert the parameters as displayed in the previous image and click OK.
5. In the tree on the left select the Default Web Site node.
6. Right click on the node and select Add Application: the following dialog box opens.
7. Insert the parameters as displayed in the previous image and click OK. The path varies
depending on where UMC is installed, for example C:\Program Files\Siemens\
UserManagement\web\ipsimatic-logon.
8. On the applications pool page select the newly created application pool, and click Manage
Application > Advanced Settings.
9. Set to 0 the field Regular Time Interval (minutes) and click OK.
Important:
UMC contains two IIS 64 bit Native Modules: um.ra.dll and um.slvm64.dll
Prerequisites
Procedure
13. Insert the parameters as displayed in the previous image and click OK.
14. In the tree on the left go to the Default Web Site node.
15. Right click on the node and select Add Application: the following dialog opens.
16. Insert the parameters as displayed in the previous image and click OK. The path of the
application is, for example C:\Program Files\Siemens\UserManagement\WEB\Umc.
17. To verify that the application works properly, in the tree on the left go to the UMC node.
18. Right click on the node and select Manage Application > Browse. The Web UI application
opens displaying the login page.
Prerequisites
Procedure
4. On the top right corner click on Configure Native Modules: the following dialog box opens.
6. Insert the parameters as displayed in the previous image and click OK.
7. Click on Register again: the following dialog box opens.
You must manually configure the following URL rewrite rules in IIS.
Procedure
1. You must manually configure the following URL rewrite rules in IIS.
2. Go to IIS Manager.
3. In the Connections pane, select your server and then the top level site.
4. In the Site pane, double-click URL rewrite.
5. In the Actions pane, click View Server Variables.
6. Click Add... and specify [http cookie].
7. Go to the Server pane, double-click Application Request Routing Cache.
8. In the Actions pane, click Server Proxy Settings .
9. On the Application Request Routing page, select Enable proxy.
10. In the Actions pane, click Apply.
11. In the Server pane, double-click URL Rewrite.
12. In the Actions pane on the right-hand side, click Add rules.
13. In the Add Rules dialog box, select Blank Rule and click OK.
14. In the Edit inbound rule pop-up, specify the following:
– Name of the rule: UMC SSO Static
– Pattern to use for matching the URL string: Matches the Pattern.
– Using: Regular Expressions.
– Pattern: (.*)
– Specify the action type: Rewrite
– Action properties Rewrite URL: The url to rewrite, either http or https, the FQDN or
machine name, the port of reverse proxy, and /umc-sso for example: http://mymachine-0:
8443/umc-sso{C:2}
15. Click Add in the conditions area and specify the values in the image below.
In order for the WebUi to function correctly you must whitelist the URL of the Service Layer.
Note: The computer name, which is case sensitive, must be the same as that which is
specified in the registry key.
Procedure
1. Whitelist the URL of the relying party using the umconf.exe program. Using either the
computername/UMC/slwapi/service or computername/UMC/slwapi/service and
computername.userdnsdomain/UMC/slwapi/service. See UMCONF User Manual for more
details.
"%bin%\umconf.exe" -c -w -d "http://%COMPUTERNAME%/UMC/slwapi/
service"
or
"%bin%\umconf.exe" -c -w -d "http://%COMPUTERNAME%/UMC/slwapi/
service"
"%bin%\umconf.exe" -c -w -d "http://%COMPUTERNAME%.%USERDNSDOMAIN%/
UMC/slwapi/service"
You must set the values of UMCDllFolderPath and reverseProxy in the Identity Provider local
configuration file in order for the identity provider to work.
See Local Configuration File for more information on the configuration file.
Note: In order for modifications made to the Local configuration file to take effect you
must restart the UMC Service.
The following procedures allows you to configure Integrated Windows Authentication of the Identity
Provider (IdP) so that you can login on the Web UI using the current Windows session (see the User
Management Component Web User Interface Manual). You have to:
If you want to use Firefox, you must also perform some manual browser configurations.
Prerequisites
5. Right click on the IPSimatic-Logon node and select Add Application to add the
WinAuthSite application, the path is for instance C:\Program Files\Siemens\
UserManagement\web\ipsimatic-logon\WinAuthSite. Then click OK.
6. In the tree on the left select the WinAuthSite node and set the following authentication
settings.
The following procedure allows you to configure Firefox to work with the Integrated Windows
Authentication of the Identity Provider (IdP) so that you can login on the Web UI using the current
Windows session (see the User Management Component Web User Interface Manual). The string
<domain> can be:
• equal to the computer name, if the machine on which the IdP is installed does not belong to an
Active Directory domain (example: myMachine);
• equal to a FQDN (Fully Qualified Domain Name) such as <computerName>.<domainName>.
<extension>, if the machine on which the IdP is installed belongs to an Active Directory domain
(example: myMachine.siemens.com).
Prerequisites
The configurations of IIS for the Integrated Windows Authentication have been performed.
Procedure
1. Navigate to the URL about:config in Firefox. Click the I'll be careful, I promise! button.
2. In the Search dialog box, search for the preference network.negotiate-auth.allow-non-fqdn.
3. Double click on the property to set the value to true and close the window.
The following configurations can be specified either locally, or centrally using the set configuration
functionality in UMConf, see the UMConf User Manual for more information on managing the
centralized configuration.
If the IdP has been configured via script these configurations are optional, however if it has been
configured manually you must specify some values in the local configuration file.
• local configuration file: contains a set of data relative to the IdP instance, which must either be
set by running the web configuration .bat or manually, this file can also be used to specify, any
machine specific central configuration overrides.
• default configuration file: contains the default configuration for the IdP, which is installed by UMC
and cannot be modified, these configurations are used when the configuration is not specified in
either the local or central configuration file.
• central configuration file: contains the set of configurations which are to be applied to multiple
servers and should be used to set any variations to the default file. Most of the settings present
can be overridden by the local configuration file, if necessary.
Any local or central configuration modification is automatically loaded by the Identity Provider with a
delay of less than 1 minute.
Diagram Notes
• Note 1 Some values are only present in the Local Configuration file.
• Note 2 Some Central Configurations values cannot be overidden by the Local Configuration
File.
The local configuration file allows you to specify the settings which must only be applied to that specific
machine. The file can be found in the subfolder WEB\umc-sso\config and is called configuration.json,
for example: C:\Program Files\Siemens\UserManagement\WEB\umc-sso\config\configuration.json.
You can specify any of the attributes that are present in the default file in the local file. You can also set
override to true to use the configuration specified locally instead of the central configuration.
Note:
• The values of clusters, enableWhitelist, reverseproxy and reverseproxyPort
cannot be overridden by the local configuration if specified in the central
configuration.
• To manually configure the IdP you must set the value of the fields:
UMCDllFolderPath and reverseProxy.
• In order for modifications made to the local configuration file to take effect you
must restart the UMC Service.
{
"private": {
"UMCDllFolderPath": "C:/Program Files/Siemens/UserManagement/bin",
"useHttps": false,
"httpsServerKey": "",
"httpsServerCert": "",
"configurationInterval": 60000
},
"reverseProxy": "https://IDPTEST",
"reverseProxyPort": "",
"override" : false
}
UMCDllFolderPath The path of the user management installation, for This value is
example "C:/Program Files/Siemens/ propagated by the bat
UserManagement/bin" file and must only be
modified in the case of
manual IdP
configuration.
useHttps Specifies whether the HTTPS or HTTP protocol is to Set to false by default
be used. and is for future use
only.
httpsServerKey The public key of the https server. For future use only.
httpsServerCert The public cert of the https server. For future use only.
configurationInterval Specifies the poling interval on the central Default 60000ms and
configuration and whitelisting. Internal use only. must not be modified.
{
"private": {
"UMCDllFolderPath": "C:/Program Files/Siemens/UserManagement/bin",
"useHttps": false,
"httpsServerKey": "",
"httpsServerCert": "",
"configurationInterval": 5000
},
"reverseProxy": "https://mymachine",
"reverseProxyPort": "",
"languages": {
"de-DE": {
"id": "de-DE",
"name": "Deutsch"
},
"en-US": {
"id": "en-US",
"name": "English US"
}
},
"authenticationOptions": {
"autoLogin": "",
"disableCredentialsLogin": false,
"enableFlexAuth": true,
"enableIWA": false,
"enablePKI": true
},
"override": true
}
The default file contains the default configurations which are used if the configurations are not
specified in the central or local files. A copy of this file can created via the UMConf getdefaultconfig
command, see UMConf User Manual for more information.
Default file
{
"configdata": {
"authenticationOptions": {
"authenticationLevelCredentialsLogin": "strong",
"authenticationLevelWindowsLogin": "strong",
"autoLogin": "",
"disableCredentialsLogin": false,
"enable2FactorAuth": false,
"enableFlexAuth": false,
"enableIWA": true,
"enablePKI": false
},
"clusters": 1,
"cookieFlags": {
"httpOnly": true,
"secure": true
},
"cookiePath": "/",
"disclaimerContent": {
"de-DE": "Sie sind in eine geschützte Umgebung eingetreten. Um die
Umgebung zu verlassen, müssen Sie sich abmelden. Das Schließen des Browsers
ist nicht ausreichend, um zu gewährleisten, dass Sie die Umgebung verlassen
haben.\n<br/><br/>\n<b>Sicherheitsinformationen</b>\n<br/>\nUm Anlagen,
Systeme, Computer und Netzwerke vor Internetbedrohungen zu schützen, ist es
nötig, ein holistisches Konzept für die industrielle Sicherheit auf dem
neuesten Stand zu implementieren und kontinuierlich aufrechtzuerhalten.
Produkte und Lösungen von Siemens stellen nur ein Element eines solchen
Konzepts dar. Weitere Informationen über die industrielle Sicherheit finden
Sie unter http://www.siemens.com/industrialsecurity.",
"en-US": "You have entered a protected environment. To exit, you must
log out: closing the browser is not sufficient to guarantee that you have
exited the environment.\n<br/><br/>\n<b>Security information</b>\n<br/>\nIn
order to protect plants, systems, machines and networks against cyber
threats, it is necessary to implement – and continuously maintain – a
holistic, state-of-the-art industrial security concept. Siemens products and
solutions only form one element of such a concept. For more information
about industrial security, please visit http://www.siemens.com/
industrialsecurity.",
"es-ES": "Ha entrado en un entorno protegido. Para salir es necesario
cerrar sesión, no es suficiente cerrar el explorador para garantizar que se
ha salido del entorno.\n<br/><br/>\n<b>Información de Seguridad</b>\n<br/>\
nPara proteger plantas, sistemas, máquinas y redes contra ciberamenazas, es
necesario implementar -y mantener constantemente- un concepto de seguridad
industrial holística de última generación. Los productos y soluciones
Siemens constituyen solamente un elemento de dicho concepto. Para obtener
más información acerca de la seguridad industrial, visite: http://www.
siemens.com/industrialsecurity.",
"fr-FR": "Vous êtes dans un environnement protégé. Pour sortir, vous
devez vous déconnecter: la fermeture de l’explorateur n’est pas suffisante
pour garantir votre sortie de cet environnement.\n<br/><br/>\n<b>
Informations sur la sécurité</b>\n<br/>\nPour protéger des plants, des
systèmes, des machines et des réseaux contre des menaces cyber, il est
nécessaire d’implémenter (et maintenir de manière permanente) une
optimisation globale du concept de sécurité industrielle. Les produits et
solutions Siemens représentent seulement un élément de ce concept. Pour de
"label": "$default$",
"version": 0
}
reverseProxy The address of the reverse If this value is set on the central
proxy. configuration the local value is
ignored even if the override is set to
true.
reverseProxyPort The port of the reverse 443 by default. If this value is set on
proxy. the central configuration, the local
value is ignored even if override is set
to true.
idpUI The address of the IDP UI. Set to a default value " /ipsimatic-
logon/idpauthsite"
maxCachedSessionsPerUser The number of sessions Set to default value 100. value range
which are logged in the from 10-1000.
cache for each users.
When the number of
sessions cached exceed
the limit the oldest entry is
removed.
clusters Defines how many node 1 min and the max value should
process must be launched. reflect the total number of processor
cores.
Authentication options
The central configuration file contains the configurations that can be applied to multiple machines, any
settings which are set in the central file are used by all the machines in the scenario, unless override is
set to true in the local file.
You can use a UMConf command to retrieve the current central configuration and set a central
configuration. The values which can be set in the central configuration are detailed in the description of
the fields of the default configuration file.
A centralized configuration is set via UMConf or when certain configuration are performed via Web UI,
for example configuring a disclaimer or authentication options.
The following json is an example of central configuration with some configurations which can be set
centrally.
{
"conf": [
{
"configdata": {
"sessionAge": 600000,
"reverseProxy": "https://IDPTEST3",
"reverseProxyPort": "",
"ssoService": "/umc-sso",
"idpUI": "/umc-idp/idpauthsite",
"cookiePath": "/",
"clusters": 1,
"cookieFlags": {
"httpOnly": true,
"secure": true
},
"authenticationOptions":{
"enableIWA":true,
"enablePKI":false,
"enableFlexAuth":true,
"enable2FactorAuth":false,
"disableCredentialsLogin":false,
"autoLogin":""
}
},
"label": "$default$",
"version": 2
}
]
}
Server side
The Smart Card Authentication can only be configured on machines where the Identity Provider has
been configured. IIS authentication via certificate must be correctly configured in order for it to function.
Important:
Client side
The following steps are needed to configure client side Smart Card authentication:
This procedure is not needed if you have used the IdP_WebUI_configurator.bat script to configure
UMC.
Procedure
5. To verify that the smart card authentication application is correctly configured, open a browser
instance.
6. Insert a smart card in the smart card reader.
7. Open the page at the following address: https://<address>/ipsimatic-logon/pkiauthsite/info.
aspx; a json file opens displaying smart card information.
In case the json file is not correctly displayed, we suggest that you enable on IIS the detailed error
responses and carefully verify smart card authentication infrastructure configuration.
The smart card authentication mechanism is based on a matching between the user data stored on the
smart card and the data stored in UMC.
Procedure
1. To configure the data matching, go to the UMC Web UI account policy page with the proper
access rights.
2. Define the field to be retrieved from the smart card to identify the user in UMC.
3. Select either of the following authentication options:
– simple authentication (no alias): in this case the selected field, CN (Common Name),
Subject, Alternate Subject, is compared with the UMC user name; if they correspond the
user is authenticated.
– alias authentication: in this case you have to define an alias for a user in the user detail
dialog; the value stored in the field is compared with the UMC alias, if they correspond the
user is authenticated.
For more information see the account policy documentation in the User Management Component Web
User Interface Manual.
Alternative Operations
• You can also define an alias using the dedicated UMX command. See UMX User Manual for
more details.
• For AD users the alias can be set in the importing phase, for more information see Additional
Provisioning Configuration.
Example
Alias = john.brown@mycompany.com
For instance, the following two cases can occur depending on the account policy selection:
• Authenticate using CN: if value stored in the CN in the smart card is John_Brown (UMC user
name value), the user is authenticated; otherwise authentication fails;
• Alias Authentication using CN: if value stored in the CN in the smart card is john.
brown@mycompany.com (UMC alias value), the user is authenticated; otherwise authentication
fails.
Depending on the configurations you have made on the UMC Web components, you have to perform
one of the following alternative procedures:
Prerequisites
A UMC Web component is installed and configured on your machine and IIS is not configured for
HTTPS.
The following configuration steps must be performed to enable two factor authentication by TOTP
(time-based one-time password). It can be used to increase the security level of an authentication
method that would otherwise be standard or weak.
UMC two factor authentication consists in an initial authentication method: Windows or Password
authentication, and token (TOTP), which is encrypted using the user's secret key, in order to elevate
the user's security level to strong.
Two Factor Authentication allows the user to log in with limited access after it has been enabled, so
that the user can generate the initial Secret Key.
Note: Two factor authentication by TOTP cannot be enabled for the built-in Administrator
user from the Web UI. It can only be enabled via UMX commands.
Workflow
The two factor authentication by TOTP can be enabled from the WEB UI or UMX and UMConf.
Note: The two factor authentication cannot be enabled for the built-in Administrator user
from the Web UI, it can only be Enabled via UMX commands. In the case of the built-in
Administrator you must generate the first secret via the umx resettotp the command.
Workflow
1. From the Users page, select a row and click Details in the upper left-hand corner of the grid.
2. Select the Account Policies tab.
3. Select the Enable 2FA checkbox.
4. Click Save.
Two factor authentication by TOTP allows you to increase the security level of a login which has been
performed using a method that would otherwise be weak or medium.
When 2FA is enabled the user is prompted to provide a token after logging in the second time, the first
time the user logs in they are granted access in order to retrieve the secret key.
Workflow
Access the Web UI, then from the menu on the upper right-hand corner of UMC Home page, select
User Profile or click User Profile link button on the welcome page. The User Profile page is
displayed.
Prerequisites
• SADS has been enabled in Account Policies via Web (see How to Manage Account Policies in
the UMC Web UI User Manual) or UMX.
• The Two Factor Authentication has been enabled as an authentication method via Web (see
Configuring Authentications Options in the UMC Web UI User Manual) or UMConf centralized
configuration management.
• The Two Factor authentication has enabled for the user in their account policies via Web (see
Editing User Account Policies in the UMC Web UI User Manual) or Encryption has been
enabled for the user from UMX.
Procedure
CAUTION:
No checks are currently performed at setup level on the UMC station client installation.
Over-installation of the UMC station client causes serious system malfunction. In
particular you must not install the UMC station client on a machine where you have
already installed full UMC.
UMC Station Client can be configured in either of the two following ways:
Prerequisites
1. Execute the browser as Administrator and connect to the UMC Web UI at the following
address: http://<myServer>/umc or https://<myServer>/umc depending on the configuration.
2. Login with a UMC user with the built-in role Administrator.
3. Click on the Register button.
Result
The system registers the machine as a UMC station client machine that provides a claim in which
certified logon station details are included.
UMC has been tested with Network Load Balancing service included in Microsoft Windows Server. For
more information about Microsoft Network Load Balancing concepts and installation procedures, see
documentation at Microsoft TechNet
(http://technet.microsoft.com).
UMC specific information on NLB configuration can be found in the following sections:
• NLB in Unicast mode, which ensures that it operates properly with all routers;
• Two network adapters for each cluster host, which is the minimum number of adapters to permit
communication among cluster hosts when NLB is operating in Unicast mode.
– confidentiality, a set of rules that limits access to information, is granted thanks to third party
software that manage redundancy, such as NLB;
– availability, the reliable access to the system by authorized people, is granted thanks to
third party software that manage redundancy, such as NLB.
• If you want to have the Integrated Windows Authentication mechanism working properly without
asking user credentials, you have to use Kerberos in order to authenticate against IIS. Kerberos
requires a specific configuration in an NLB scenario. Please refer to Microsoft Technical
documentation for more details (see for instance http://blogs.msdn.com/b/vivekkum/archive/
2008/06/15/step-by-step-kerberos-in-nlb-with-shared-content.aspx).
• If you configure a Reverse Proxy in order to use multiple web servers you must increase the
value of the query string length on all the web servers, via IIS Manager to the values specified in
The value of the health state is contained in the field status of the HTTP response header:
The health state information is derived from the one provided by the Health Check Service described in
UMC Release Notes.
Example URL
https://<host_name>/umc-sso/GetHealthState
CAUTION:
The sample code is provided for illustrative purposes only. It has not been thoroughly
tested under all conditions. Therefore, we cannot guarantee or imply its reliability,
serviceability, or function.
In the example two machines VM-UMC-N1 and VM-UMC-N2 are configured in NLB and their status is
checked via the PowerShell function CheckNodeHS. According to the status, the node is stopped or
started.
CheckNodeHS
Function CheckNodeHS([string]$nodeToCheck)
{
$url="https://"+$nodeToCheck+"/umc.idp/GetHealthState"
$r = [System.Net.WebRequest]::Create($url)
Script
#MAIN
cls
Import-Module NetworkLoadBalancingClusters
$node1="VM-UMC-N1"
$node2="VM-UMC-N2"
$nodeStatus = Get-NlbClusterNode -hostname "VM-UMC-N1"
$status1 = $nodeStatus[0].State.ToString()
$status2 = $nodeStatus[1].State.ToString()
if ($status1 -match "converged" -and $status2 -match "converged")
{
Write-Host "NLB status is good"
}
else
{
Write-Host "NLB status is NOT good"
Write-Host "Node 1: status is" $status1
Write-Host "Node 2: status is" $status2
}
CheckNodeHS($node1)
CheckNodeHS($node2)
A prior version of UMC is installed and configured on all the machines in the scenario you need to
upgrade. If a previous version of UMC is only installed and not configured, you simply have to install
and configure UMC as if it were the first installation.
Prerequisites
Workflow
Note: If you use Web UI, you must clear the browser cache on all the machines which
access the web UI.
• To check the machine role you can use the umconf Show Status command. See the UMCONF
User Manual for more details.
• During the upgrade procedure, no UMC commands can be executed except those which are
part of the procedure.
This section contains a list of notes which only apply when upgrading from specific versions of UMC.
• Upgrading from 1.0: If you have installed and configured UMC 1.0, you have first to upgrade to
UMC 1.1 (see UMC 1.1 Release Notes) and then upgrade the system.
• Upgrading from 1.1: If you have installed UMC 1.1 in a HTTP scenario, you have to convert the
scenario from HTTP to HTTPS after upgrading.
• Upgrading from versions prior to 1.6: Mixed version scenarios may encounter issues if a user
name which is longer than 30 characters is used. We strongly suggest that you align the
installations to the most recent UMC version.
• Upgrading from versions prior to 1.9.1: As of 1.9.1 the value of the global account policy
Password Expiration cannot exceed 1827 days. If the value was set in excess of 1827, you
must re-set the value after upgrading.
• Upgrading from versions prior to 2.0: As the IdP underwent substantial changes, once you have
upgraded your installation you must redo any settings which were performed on the webconfig,
see Migrating IdP Configurations.
• Upgrading from versions prior to 2.0 on UM servers and the secondary ring server the Web
Component configuration script cannot update the whitelisting. UM Servers and the secondary
rings server must be added to whitelisting using UMConf on the primary ring server.
• Upgrading from versions prior to 2.0 verify the prerequisites are met: Application Request
Routing and its prerequisites have been downloaded and installed (For iis 8 and above: https://
www.microsoft.com/en-us/download/details.aspx?id=47332).
The following notes are relative to long term mixed version scenarios, which is a scenario where the
version of UMC installed is not the same on all the machines in the scenario:
• As of UMC 1.9 we support long-term mixed distributed scenarios. If you have a scenario with a
version which is prior to 1.9, you must upgrade all the UMC installations to at least UMC 1.9.
• Long term mixed versions are not supported on ring severs, therefore the version of UMC
installed on ring servers must be aligned as quickly as possible.
When migrating from versions prior to UMC 2.0, as the IdP underwent substantial changes, once you
have upgraded your installation you must redo any settings which were performed on the webconfig.
Where the following configurations correspond to configurations which are present in the new IdP.
General Recommendations
• During the upgrading procedure only the priority ring server is available; thus, for a minimum
amount of time, you do not have system redundancy support.
• During the upgrading procedure, session loss may occur.
• The Primary Ring Server and Secondary Ring Server do not support long term mixed version,
and therefore the installations must be aligned as soon as possible.
Procedure
1. If NLB is configured, remove the secondary ring server from the NLB cluster.
2. If UMC Web components were configured on the machine, run the
Remove_IdP_WebUI_configuration.bat.
3. Close all the running applications.
4. Launch the installer and select to upgrade the system. In case the installation asks you to
reboot the system, perform the system reboot. When the system reboots the installer
automatically starts.
5. Run the command umconf -U to upgrade the system. Refer to the UMCONF User Manual for
more details
6. If UMC Web components were configured on the machine:
– Run the IdP_WebUI_configurator.bat or manually configure the IdP.
– Manually perform Identity Provider web.config customization on the .json configuration
file,
Note: If you use Web UI clear the browser cache on all the machines which access the
web UI.
General Recommendations
• During the upgrading procedure only the secondary ring server is available; thus, for a minimum
amount of time, you do not have system redundancy support and UMC database modifications
are not possible.
• During the upgrading procedure, session loss may occur.
• The Primary Ring Server and Secondary Ring Server do not support long term mixed versions,
and therefore the installations must be aligned as soon as possible.
Procedure
4. Run the command umconf -U to upgrade the system. Refer to the UMCONF User Manual for
more details.
5. If UMC 1.1 is installed in a standalone scenario in HTTP and you want to enable HTTPS
upgrading to UMC 1.4, then you have to perform this additional procedure.
6. If UMC Web components were configured on the machine:
– Run the IdP_WebUI_configurator.bat or manually configure the IdP.
– Manually perform Identity Provider web.config customizations on the .json configuration
file,
If you use Web UI clear the browser cache on all the machines which access the web UI.
General Recommendations
Procedure
1. If UMC Web components were configured on the machine, stop the application pools of the
UMC applications in IIS Manager and run the Remove_IdP_WebUI_configuration.bat.
2. Close all the running applications.
3. Launch the installer and select to upgrade the system. In case the installation prompts you to
reboot the system, perform the system reboot. When the system reboots, the installer
automatically starts.
4. Run the command umconf -U to upgrade the system. Refer to the UMCONF User Manual for
more details.
5. If UMC Web components were configured on the machine:
– Run the IdP_WebUI_configurator.bat or manually configure the IdP.
– Manually perform Identity Provider web.config customizations on the .json configuration
file,
6. If the UM server was connected to NLB cluster, reconnect the machine to the cluster.
Procedure
2. Launch the installer and select to upgrade the system. In case the installation prompts you to
reboot the system, perform the system reboot. When the system reboots the installer
automatically starts.
3. Run the command umconf -U to upgrade the system. Refer to the UMCONF User Manual for
more details.
Procedure
Result
Workflow
Prerequisites
Procedure
4. Insert the parameters as displayed in the previous image and click OK.
5. In the tree on the left select the Default Web Site node.
6. Right click on the node and select Add Application: the following dialog box opens.
7. Insert the parameters as displayed in the previous image and click OK. The path varies
depending on where UMC is installed, for example C:\Program Files\Siemens\
UserManagement\web\ipsimatic-logon.
8. On the applications pool page select the newly created application pool, and click Manage
Application > Advanced Settings.
9. Set to 0 the field Regular Time Interval (minutes) and click OK.
Important:
UMC contains two IIS 64 bit Native Modules: um.ra.dll and um.slvm64.dll
Prerequisites
Procedure
10. Insert the parameters as displayed in the previous image and click OK.
11. In the tree on the left go to the Default Web Site node.
12. Right click on the node and select Add Application: the following dialog opens.
13. Insert the parameters as displayed in the previous image and click OK. The path of the
application is, for example C:\Program Files\Siemens\UserManagement\WEB\Umc.
14. To verify that the application works properly, in the tree on the left go to the UMC node.
15. Right click on the node and select Manage Application > Browse. The Web UI application
opens displaying the login page.
Prerequisites
Procedure
6. Insert the parameters as displayed in the previous image and click OK.
7. Click on Register again: the following dialog box opens.
13. Click Modules under the ra application, if ra is not present see note.
14. On the top right corner click on Configure Native Modules.
15. Select the ra module checkbox then click OK.
You must manually configure the following URL rewrite rules in IIS.
Procedure
1. You must manually configure the following URL rewrite rules in IIS.
2. Go to IIS Manager.
3. In the Connections pane, select your server and then the top level site.
4. In the Site pane, double-click URL rewrite.
5. In the Actions pane, click View Server Variables.
6. Click Add... and specify [http cookie].
7. Go to the Server pane, double-click Application Request Routing Cache.
8. In the Actions pane, click Server Proxy Settings .
9. On the Application Request Routing page, select Enable proxy.
10. In the Actions pane, click Apply.
11. In the Server pane, double-click URL Rewrite.
12. In the Actions pane on the right-hand side, click Add rules.
13. In the Add Rules dialog box, select Blank Rule and click OK.
14. In the Edit inbound rule pop-up, specify the following:
– Name of the rule: UMC SSO Static
– Pattern to use for matching the URL string: Matches the Pattern.
– Using: Regular Expressions.
– Pattern: (.*)
– Specify the action type: Rewrite
– Action properties Rewrite URL: The url to rewrite, either http or https, the FQDN or
machine name, the port of reverse proxy, and /umc-sso for example: http://mymachine-0:
8443/umc-sso{C:2}
15. Click Add in the conditions area and specify the values in the image below.
Following the procedure described above repeat from step 8 adding two rules with their relative
conditions:
mymachine-0:8443/umc-sso{C:2}
For the WebUI to function correctly you must whitelist the URL of the Service Layer.
The computer name, which is case sensitive, must be the same as that which is specified in the
registry key.
Note: When upgrading from versions prior to 2.0 you must add the Service Layer of the
secondary ring server and any UM servers to whitelisting on the Primary Ring Server.
Procedure
1. Whitelist the URL of the relying party using the umconf.exe program. Using either the
computername/UMC/slwapi/service or computername/UMC/slwapi/service and
computername.userdnsdomain/UMC/slwapi/service. See UMCONF User Manual for more
details.
"%bin%\umconf.exe" -c -w -d "http://%COMPUTERNAME%/UMC/slwapi/
service"
or
"%bin%\umconf.exe" -c -w -d "http://%COMPUTERNAME%/UMC/slwapi/
service"
"%bin%\umconf.exe" -c -w -d "http://%COMPUTERNAME%.%USERDNSDOMAIN%/
UMC/slwapi/service"
You must set the values of UMCDllFolderPath and reverseProxy in the Identity Provider local
configuration file in order for the identity provider to work.
See Local Configuration File for more information on the configuration file.
Note: In order for modifications made to the Local configuration file to take effect you
must restart the UMC Service.
CAUTION:
If UMC is also configured, the database files are not removed by the uninstallation
procedure. This procedure has to be performed on all the machines, UM ring servers, UM
servers and agents. We suggest that you perform the procedure on the UM agents first.
Procedure
1. If the machine is a 64 bit ring server where the Web Components have been configured,
launch the script REMOVE_IdP_WebUI_configurator.bat. The batch file can be found in C:\
Program Files\SIEMENS\UserManagement\BIN, if the default installation folder is selected.
Note that the script works on a 64 bit machine only.
2. Delete the database files, the registry entries and so on by executing the umconf -D -f
command, installed in the subdirectory \BIN (for example C:\Program Files\Siemens\
UserManagement\BIN). Please refer to the UMCONF User Manual for more details.
3. Open Program and Features from the Control Panel.
4. Select the UMC entry and right click.
5. Select Uninstall.
6. The uninstall setup is launched: proceed with the uninstallation steps.
Procedure
General
Cannot Authenticate with unexpected Give access to the user that is launching the command
problem. umtracer gpclib shows a tentative to the CONF directory of UMC (auth. users, for
to use pipes to open a connection to local example).
machine.
IdP shows a compilation error and raises IIS_IUSRS has no access to windows TEMP folder.
an error while trying to access a temp
folder (windows temp or temporary asp.net
files)
Web UI: cannot enter a UMC web umc_pool application pool was configured to run in 32
application with error "Cannot connect to bit mode. Set the flag "Enable 32 bit" to FALSE in
server" umc_pool configuration.
UMC Web UI shows the following error IIS features missing: Basic authentication, Windows
Error on Login: An error occurred during authentication, asp.net 4.5 was not installed.
communication with the server.
Identity Provider Login pages shows error IIS features missing: Basic authentication, Windows
related to unknown Keys or security error authentication, asp.net 4.5 was not installed.
related to webconfig. Relaunch Idp_webui_, and so on.
UMCONF error 4 while joining. The list of UMC rings is already full - check on ring
master with umconf -t and unjoin the secondary ring.
Windows Integrated Authentication. IdP The AD (kerberos) is misconfigured. See the link below
page ask for credential even if the user is to prevent issues in our test domain controller: https://
correctly logged in the AD (the client is blogs.msdn.microsoft.com/chiranth/2014/04/17/setting-
joined to the same AD than the web up-kerberos-authentication-for-a-website-in-iis/
server).
SMART CARD: Error 403.7 forbidden Enable CRL (Client Revocation List), refer to your IT
when trying to open info.aspx page and / department for details.
or trying to authenticate.
The server error "Maximum request length A request exceeding the maximum IIS configuration
exceeded" is raised. limits has been sent to the server. You can modify IIS
configuration if needed.
UMC operations hangs and return a Check is the umc processes are all active.
generic or wrong error message.
Operations that requires changes on UM Please check if the UM primary master is correctly
configuration fails with error running and reacheable. If the problem occurs also on
SL_NOTAMASTER. the primary ring server, please restart um.ring.exe
service.
Some operation fails sporadically with um.racrmtsrv.log file contains UMC DB files access
generic error. error. Please check the root cause of filesystem error
(antivirus, backup, etc.).
Provisioning
You cannot configure the Verify that the ring server machine is joined NA
provisioning. to the Windows domain.
In the UMC Web UI you Verify that the ring server machine is joined NA
display undefined in the to the Windows domain, that you have
domain drop down list to configured the UMC Provisioning service
import users/groups. UPService.exe and that the Windows user
associated to the service has Active
Directory access rights.
The import buttons do not Verify that you have configured the UMC See the Basic Post
appear in the UMC Web UI. Provisioning service UPService.exe and Setup Instructions of
check that the value of the registry key the Release Notes, the
HKEY_LOCAL_MACHINE\SOFTWARE\ UMCONF User Manual
Siemens\User Management\WebUI\Settings\ and UMX User Manual
domains_support is set to yes. for the commands.
You perform the import of Verify that the Group scope is Universal. See the UMCONF
an AD group and the User Manual.
members are not imported.
The search to import AD You may have to modify the Active Directory See the Functional
users/groups returns 0 and administration limit MaxPageSize. Consider Limitations of the
you presume that your that the AD default is 1000, if your search Release Notes.
search criteria will return returns more that 1000 results you have to
many data. modify this value to a value higher then the
number of search results.
The import of an AD group You may have to modify the Active Directory See the Functional
having a high number of administration limit MaxValRange. Limitations of the
associated -users is not Release Notes.
successful.
Starting from UMC 1.8 it's possible to use a local endpoint to check umc health status (https://
localhost:16/healthcheck). Please check HealthState documentation for more information.
6. Click Enter.
Example
Event Logged
Authentication
Successful login
Unsuccessful Login
Event Logged
Change Password
Ticket Validation
Session Management
Session Creation
Session Deletion
Configuration
User Create/Delete/Modify
(only from
WEBUI)
Role Create/Delete/Modify
(only from
WEBUI)
Group Create/Delete/Modify
(only from
WEBUI)
Unlock User
(only from
WEBUI)
Two Factor
Authentication
SADS
Identity Provider
Configuration
• In a redundant scenario, log files can potentially be generated from different servers.
Mechanisms to manage reconciliation of data produced by different servers are available.
• Internal APIs allows one to write UMC events and to search UMC events related to a given
date.
• A UMC Web UI page (with limited reading capabilities) has been created to display event data
and to search them according to an input date. The old value and the new value of UMC data
related to the event are displayed.
• A UMX command to list event log records is provided.
The following security strategies have been implemented to grant system integrity for each server
machine:
• Automatic cleanup of archive folder, to remove old archives before filling up the hard drive.
• Protection against excessive log activity, to avoid that archive size could increase too fast.
The archive folder contains a list of archive files, each of which has a maximum size equal to 1GB
(~500000 records). Every time this limit is reached, a new archive file is created and the files older
than 30 days will be deleted. This implies that archive files will be deleted only when log activity is
really present and needs space disk.
Excessive log activity can be generated by an attempt to fill up server hard drive and make the system
unavailable.
To manage this attack, archive files cannot store more than 100000 records by day (but log forwarding
keeps on working).
When this limit is reached, an event log with action ELG CLOSE is written and any subsequent event
logs will no longer be archived.
In the case the excess of log activity is generated on a disconnected server, event log ELG CLOSE is
written and subsequent (local) event logs will no longer be archived.
The editing of this file is optional. The following rules apply in computing the list of the domains from
which users and/or groups can be imported:
• if the property domains is not empty, this list is considered for import, otherwise
• the field query_for_domains defines the AD input query to compute the domain list.
• copy the file in each machine where the provisioning is configured and
• manually restart the UPService.
{
"add_alias_to": "",
"domains": [{
"name": "domain1"
}],
"purge_time": "720",
"query_for_domains": "(objectcategory=crossref)",
"query_for_groups": "",
"query_for_user": "",
"query_for_users": "",
"recycle_time": "1440",
"update_mode":"noupdate",
"polling_umc":"10",
"polling_ad":
"300"
}
Important:
• If polling_umc and polling_ad are missing, by default the polling values are:
– polling_umc 60 sec
– polling_ad 600 sec
JSON description
add_alias_to string The name of the AD field that has to be used as alias.
domains string It is an array of domains where each domain object contains the
name. Formatted as follows: [{"name":"domain1"},{"name":"domain2"}]
}, note that the domain suffix must not be used. By default the array is
empty.
purge_time string If a user is deleted from AD, it is flag as offline. Offline users are
permanently deleted from UMC database, after a number of minutes
indicated in this field. The default is 24 hours (720 minutes). The
following constraint must be valid: purge_time<recycle_time.
query_for_domains string AD query, see Microsoft documentation for more details. The query "
(objectcategory=crossref)" is the default one. If the query in the file
contains an error, the default query is executed.
recycle_time string Number of minutes before provisioning server restart. The default is
24 hours (1440 minutes). The following constraint must be valid:
purge_time<recycle_time.
update_mode string