- Introduction
- Requirements
- Pre-installation check list
- Installation procedure
- Step 1 - Unpack the ZIP file
- Step 2 - Configure the connection parameters
- Step 3 - Install the license key
- Step 4 - Install the Microsoft Windows Service to start/stop the application server - optional
- Step 5 - Start the dashboard and test connection
- Step 6 - Configure user authentication
- Step 7 - First login and become admin - ≥ 2.1 only
- Step 8 - Configure roles
- Step 9 - Generate snapshot data for display
- Step 10 - Configure data authorization
- Additional information
Summary: This section describes how to install and configure the Security Dashboard 2.x in ZIP file format (i.e. no web application server required).
Introduction
What is the ZIP file format?
From release 2.0 onwards, CAST will deliver a ZIP file for each CAST Dashboard, alongside the traditional WAR file that has always been delivered. The ZIP file is a new method of deploying the CAST Dashboards based on Spring Boot and does not require a web application server (the application server is embedded in the ZIP itself). The aim of the ZIP file releases is to simplify and speed up the deployment of the CAST Dashboards. The deployment and configuration of the Spring Boot based dashboards differs slightly to the steps required for traditional WAR files (see Deploy CAST Security Dashboard using WAR file).
How many Security Dashboards do I need?
CAST highly recommends that you install one Security Dashboard and consolidate all your CAST Dashboard Services schemas into this.
Requirements
Please see Standalone dashboard - installation requirements, specifically the requirements for the Engineering Dashboard, which are identical.
Pre-installation check list
Before beginning the installation process, please ensure that you have carried out all of the following tasks and that the following requirements have been met:
Ensure you have read all Release Notes accompanying CAST products for any last-minute information. | |
Decide where the Security Dashboard will be installed and run from. | |
Ensure that your user login on the target machine has sufficient user privileges to install applications. | |
Make sure you have the required .ZIP file ready for deployment. |
Installation procedure
The installation process is divided into various steps:
Step 1 | Unpack the ZIP file |
---|---|
Step 2 | Configure the connection parameters |
Step 3 | Install the license key |
Step 4 | Install the Microsoft Windows Service to start/stop the application server - optional |
Step 5 | Start the dashboard and test connection |
Step 6 | Configure user authentication |
Step 7 | First login and become admin - ≥ 2.1 only |
Step 8 | Configure roles |
Step 9 | Generate snapshot data for display |
Step 10 | Configure data authorization |
Step 1 - Unpack the ZIP file
Unpack the ZIP file on the server. You can run the dashboard directly from wherever you unpack the ZIP file, however, you may want to move the unpacked files to a more appropriate location.
Step 2 - Configure the connection parameters
Step 3 - Install the license key
As explained in Dashboard Service license key configuration, when you want to access a Dashboard schema using the CAST RestAPI (i.e. via the Security Dashboard, or via the CAST Report Generator), a special license key is required. This license key grants specific access to one or multiple Dashboard schemas for the web application in which it is installed (i.e. the Engineering Dashboard or the CAST RestAPI).
You must therefore install the license key and, if you are using a restricted license key, define data access authorization. These two steps are explained in Dashboard Service license key configuration in the sections How do I install a license key? and How to authorize users when using a RESTRICTED license key.
Step 4 - Install the Microsoft Windows Service to start/stop the application server - optional
Step 5 - Start the dashboard and test connection
To start the dashboard:
- either start the Windows Service if you are using Microsoft Windows and have chosen to install the Windows Service
- or run the following file:
Microsoft Windows <unpacked_zip>\startup.bat Linux <unpacked_zip>\startup.sh Note that you may need to run "chmod +x startup.sh" to grant execution permission to the script before running it. You may also need to run this file with elevated permissions (e.g. sudo) using the following syntax "./startup.sh"
By default the dashboard is configured to run on port 8080 (this can be changed, see Modify the user access port for 2.x JAR or ZIP deployments). Use the following URL - where <server_name> is equal to the host name of the current server to access the dashboard. If you are testing on the server itself, you can use http://localhost:8080:
http://<server_name>:8080
You should see the login page as follows - this indicates that the initial setup was successful:
Step 6 - Configure user authentication
This step involves configuring how your users will authenticate with the CAST Security Dashboard. Most organizations opt for LDAP/Active Directory integration so that users can use their corporate username/password to access the resources they need. The Security Dashboard also has a built in username/password authentication mechanism which is enabled "out of the box". See User authentication.
Step 7 - First login and become admin - ≥ 2.1 only
By default, the CAST Dashboard requires that at least one user is granted the ADMIN role following the first login after the User authentication configuration. This ensures that one user can access all data and cofiguration settings. See First login and become admin. This step is not required when using Dashboards 1.x and can be skipped.
Step 8 - Configure roles
This step involves configuring roles for users and groups that are accessing the CAST Security Dashboard. See User roles.
Step 9 - Generate snapshot data for display
Before your users can "consume" data via the CAST Security Dashboard, you need to generate snapshot data.
Step 10 - Configure data authorization
An Authorization defines permission to access and "consume the data" in a specific Application or group of Applications via the CAST Security Dashboard. If permission is not granted, or a "restriction" is used, then any information related to this Application will be not accessible: application properties such as name, technologies or grades and measures, etc. Therefore, an Authorization must be defined before a user/group of users can access a specific application. See Data authorization.
Additional information
Advanced configuration specific to the CAST Engineering/Security Dashboard (the two are identical in terms of configuration):
Additional advanced configuration options: