Answer File wizard

An answer file is an XML-based file that contains configuration information for your installation of CyberArk Trust Protection Foundation - Self-Hosted. It includes the enabled modules, database connection information, and security keys used for the configuration. Using an answer file during installation makes it easy to use the same installation settings across multiple servers in your CyberArk Trust Protection Foundation - Self-Hosted cluster. An answer file is also helpful for upgrading your system, if you use a non-traditional upgrade method. For more information about answer files, see Creating and using answer files.

The answer file can be generated in two different ways. If you have installed CyberArk Trust Protection Foundation - Self-Hosted, you're probably aware of the ability to create an answer file when you install Trust Protection Foundation using the GUI.

You can also generate an answer file from the CyberArk Configuration Console once you have installed CyberArk Trust Protection Foundation - Self-Hosted on a server. This topic discusses how to create an answer file using the Answer File Wizard in the configuration console.

To generate an answer file using CyberArk Configuration Console

  1. Log in to the CyberArk Trust Protection Foundation - Self-Hosted Windows server and launch CyberArk Configuration Console.
  2. [Optional] If you want to Disable validation of the provided values, check the box.

    Generally, you will want to validate the values as you enter them into the answer file wizard. However, if you are configuring for a server in a different zone (say a production server that you can't access due to the network configuration), you will want to disable validation so the system doesn't provide an error when you enter connection information that can't be verified.

  3. From the root CyberArk Configuration node in CyberArk Configuration Console, click Run Answer File Wizard in the Actions panel on the right.

  4. Click Next.

  5. [Optional] If you already have an answer file as a template, on the Answer File tab click the Browse button to locate the answer file. If the answer file is encrypted with a password, enter the password, then click Next.

  6. On the Component Selection tab, use the tree to select which components and features you want to enable for the installation.

    IMPORTANT  The installation will not work properly unless you select at least one product (Certificate Manager - Self-Hosted, Code Sign Manager - Self-Hosted, or SSH Manager for Machines). If you are trying to install a UI-only server (WebConsole) you need to select one top-level product, in addition to the UI components in the Common Components list. However, in that case, you can deselect the child components of the top-level product. For example, this is a valid configuration:

    Select the components you want to install, then click Next.

  7. On the Hardware Encryption tab, determine if you want to use hardware encryption.

    CyberArk Trust Protection Foundation can encrypt data using one or more keys stored in an HSM. For code signing, CyberArk Trust Protection Foundation can use private keys stored on an HSM to sign code. To enable hardware encryption, check the box, and fill out the requested information.

    NOTE  In the table above, if you chose to disable validation, the Default Key field is a text field, and there is no Create button.

    TIP  If you are installing to an existing database, if hardware encryption is enabled, you will need to enter the PIN to continue, even though no other information appears on the screen.

    NOTE  You must select either one or both encryption types (hardware and/or software encryption).

    IMPORTANT  The keys used to encrypt Trust Protection Foundation are critical to the system's functionality. Without the encryption keys, you cannot access the database or stored secrets.

  8. On the Software Encryption tab, determine if you want to use software encryption.

    CyberArk Trust Protection Foundation - Self-Hosted can encrypt data using a software encryption key.

    If you are connecting to a new database, you can either provide a key, or have one generated for you.

    If you are connecting to an existing database, you must use the software key used to encrypt that database.

    If you are connecting to an existing database (and you chose to validate the answer file) with software encryption enabled, before you can move to the next tab, the system will verify that the software key matches the existing database's software encryption key.

    TIP  If you are installing with an existing database, if software encryption has not been configured for that database, the options on this screen will be disabled.

    NOTE  You must select either one or both encryption types (hardware and/or software encryption).

    IMPORTANT  The keys used to encrypt Trust Protection Foundation are critical to the system's functionality. Without the encryption keys you cannot access the database or stored secrets. Consequently, if you use a software encryption key, it is highly recommended that you back up the key to a secure location. In the event of a system failure, you can restore the key so Trust Protection Foundation can access your system data.

  9. On the Database Settings tab, choose either the Settings tab or the Expert tab, and fill out the connection information for your database. If you enter different data into both tabs, the tab you are on when you click Next will determine which settings are applied.

    Before you configure a new database connection, you must have previously created the Trust Protection Foundation database and configured both database service accounts.

    For information about the types of database service accounts and permissions they need, see Setting up your Microsoft SQL database server.

    If you are connecting to an existing database and you chose to validate the answer file, before you can move to the next tab, the system will verify that the database connection information is correct.

  10. On the Administrative Account tab, enter information for the local master admin account for CyberArk Trust Protection Foundation.

    You need to create a local master admin account for Trust Protection Foundation. You will use this account to log in to Trust Protection Foundation and to perform maintenance and upgrade tasks in the system. The local master admin account has all permissions to every object in Trust Protection Foundation.

    Enter the user name and password. Password requirements are show on the screen. The password will be validated locally to verify it meets complexity requirements.

    Verify the password, then click Next.

  11. On the Message Bus tab, select whether or not you want to use a TLS-encrypted connection for the Message Bus (the MQTT broker used to communicate between servers in the cluster). The default is to use TLS.

    We recommend using the IANA registered ports for MQTT: port 8883 for TLS, or port 1883 for unencrypted.

    If you plan to use an external MQTT broker, click Central MQTT broker, then provide the URL to the service, and authentication information.

    For more details on Message Bus and its configuration, see Working with Message Bus.

    If you don't know what to enter here, you can likely accept the default values.

    Continue to the next tab by clicking Next.

  12. On the Algorithms tab, you see the default algorithms available for global use with CyberArk Trust Protection Foundation - Self-Hosted. Click Modify... to edit the list. The table on the left is the list of algorithms supported by CyberArk Trust Protection Foundation - Self-Hosted that haven't been added to the approved list. The table on the right is a list of algorithms you want to be available globally for your organization. (You can further restrict algorithm use by policy, if you want settings to not apply globally.) To enable an algorithm, move it from the left table to the right table using the arrows.

    For details on configuring the default algorithms, see About default algorithm configuration. For a comprehensive list of supported algorithms, see Algorithm types supported by CyberArk Trust Protection Foundation - Self-Hosted.

    NOTE  If you are using an answer file that already includes supported algorithms, this tab won't let you adjust what is listed in the answer file. You can modify the supported algorithms after you finish the upgrade by going to CyberArk Configuration Console, and clicking Configure Allowed Algorithms. For detailed steps, see Configuring allowed algorithms.

  13. On the Event Logging tab, determine if you want this server to process log events.

    At least two Trust Protection Foundation servers needs to have event logging enabled. If event logging is configured on two different servers, you can leave this check box cleared.

    CyberArk recommends you define a retention period to control growth of the database. Trust Protection Foundation will periodically automatically delete logs older than the specified number of days.

    Click Next.

  14. On the Environment tab enter the required information.

    Enter your organization name, and select the deployment type for the server, then click Next.

    Your organization name and deployment type are used in Trust Protection Foundation reports, and may be used in the future in other ways to enhance your product experience.

  15. On the Customer Experience tab, review the information on how data is collected.

    NOTE  Participation in the Customer Experience Improvement Project is required for all customers, enabling CyberArk to gather license utilization and product usage telemetry. This does not include any personally-identifiable data. Read more about our data collection policy in the CyberArk Data Privacy Policy for Trust Protection Foundation.

    Click Next.

  16. On the Save Configuration tab, do the following:

    • Determine the location where the configuration progress and errors will be logged. If there is a problem with the configuration of the Trust Protection Foundation database, this file will show you where the error occurred, which will help CyberArk Customer Support troubleshoot your issue more quickly and efficiently.
    • Specify whether CyberArk Trust Protection Foundation - Self-Hosted services should be started immediately upon completion of configuration.
    • We recommend you save your configuration as an answer file if this configuration is different than an answer file you have previously created. An answer file simplifies the process of upgrading Trust Protection Foundation, reinstalling Trust Protection Foundation, or installing more than one Trust Protection Foundation server, connecting to the same database.

      • If you create an answer file, it is recommended that you encrypt your answer file with a password. An unencrypted answer file is a plain text XML file that contains information like your master admin user name and password, your database connection credentials, your software encryption key, and all other configuration settings.
      • If you are just completing the wizard to create an answer file, select the appropriate option. The wizard will save the answer file and will close when you click the Finish button.
  17. Click Finish.

    CyberArk Trust Protection Foundation - Self-Hosted will save the new configuration as an answer file in the specified location. When the answer file has been saved, click Close.