Cookies are used to collect information about you. Nexus uses this information to give you a better experience of the website (functional) and to count the pages you visit (statistics).
Click OK to give Nexus your consent to use cookies. Read more about Nexus' cookie policy.
If a license file has not yet been uploaded, you get a message asking you to do so:
ClickChoose file.
Browse for the Identity Manager Admin license file in <delivery folder>\Server\3-licences\. ClickOpento view the license details.
ClickSave.
Upload configuration file
If you have a ready, customer-specific configuration file in.zipformat, you can now upload it.
In Identity Manager Admin, go to theConfiguration Filetab.
ClickUpload configurationand thenSelect file.
Browse for the provided configuration.zipfile and then clickOpen. The configuration is read and checked for syntax. The contents of the configuration are displayed in the popup.
Start the import by clickingUpload. When the upload is completed, close the window withClose.
The configuration file has now been uploaded.
Create users for administration
To create users with administrative rights, follow the instruction below. Several people can be registered as administrators. It is of course important that passwords are kept secret. When you create users for administration it is necessary to allow the created administrators to see theConfiguration Filetab. Otherwise it is not possible for them to upload any configuration.
For each user:
Go toHome>User Administration. If you have uploaded a configuration, all the users defined in that configuration are now displayed.
Click+New. Enter aUser Name,Password, andFull user name.
ClickSave + Edit. A view is displayed, that shows the available roles on the left.
SelectAdministratoron the left. Click the right arrow button to add theAdministratorrole to the new user.
Select thePermissionstab and then theGeneraltab.
CheckConfiguration File. This is necessary to allow the created administrators to upload configurations.
ClickSave, and close the form.
The new users will now appear in theUser Administrationpanel.
If only one person or a few persons have administrator rights, then absence, a forgotten password or lost login credentials can lead to administrators being locked out. To avoid this, the login name and credential of an emergency administrator can be stored in a secure place to only be accessed through emergency procedures.
The procedures for managing this emergency login should be defined in the IT security policy of your organization. The double verification principle should be applied, so that no single person can log in themselves with the emergency login.
Edit system properties
Before you can delete the bootstrap administrator, you must do this update in 'SYSTEM_PROPERTIES' section inside docker-compose.yml.
To encrypt the fields in the generated system.properties file inside the docker container, the scramble feature may be used. See Scramble sensitive data in Identity Manager files for more information.
This will not scramble the sensitive data inside docker-compose.yml. There is no mechanism yet to encrypt the data in that file. As a workaround, the sensitive fields may be inserted in docker-compose.yml already scrambled.
Delete bootstrap administrator account
WARNING: Please make sure you have created another administrative user!
Go toHome>User Administration.
Select the bootstrap administrator,admin.
ClickDeleteand confirm the deletion withYes. The bootstrap administrator is now deleted, and only the administrators you have created can log in to Identity Manager Admin. When the configuration has also been uploaded to theIdentity Manager Operator, the same is also valid there.
The customization of the application is now complete and Identity Manager is ready for operation.
Settings for client authentication
If you use client authentication to log in to Identity Manager or Smart ID Self-Service, such as browser-based smart card or soft token login, do the following to avoid failure of CA connector calls during card production with Identity Manager and CardSDK:
Opendocker-compose.ymlfor editing.
Specify https ports without client authentication for CA connector calls and JPKIEncoder downloads by CardSDK. Add the following lines inside the 'SYSTEM_PROPERTIES' section (use the correct ports):