Info |
---|
This article is valid includes updates for Smart ID 23.10.5 and later. |
To connect Smart ID Identity Manager to Active Directory Certificate Services (ADCS), one component must be set up - the ADCS Connector - and one component must be configured - Identity Manager with a CA Proxy configuration. This article describes how to configure both components.
...
Unzip the installation package for the ADCS connector, for example in C:\Nexus\connector_adcs:
Create a temp folder in the installation folder of the ADCS connector.
Copy the Identity Manager VRO certificate (not the key) into the folder cert.
Open the file Web.config and edit the following part. Make sure to type the absolute path to the
ClientcertFile
.Example: web.config
Code Block language xml <appSettings> <add key="TempDir" value="C:\Nexus\connector_ADCS\temp\" /> <!-- the loglevel entry is obsolete since IDM 21.04.2 --> <add key="ClientcertFile" value="C:\Nexus\connector_ADCS\cert\prime_officer1_adcs.cer" /> <add key="KraDir" value="C:\Nexus\connector_ADCS\cert\" /> <!-- further settings go here --> </appSettings>
Open the file MSCAConnector.dll.log4net.xml and edit it. It uses standard log4net syntax. Make sure you set the absolute path to the log-file, which has to be writable by the connector/IIS.
MSCAConnector.dll.log4net.xml example
Code Block language xml <?xml version="1.0" encoding="utf-8" ?> <log4net debug="false"> <appender name="LogFileAppender" type="log4net.Appender.FileAppender" > <file value="c:\inetpub\ADCSConnector\logs\MSCAConnector.log" /> <appendToFile value="true" /> <layout type="log4net.Layout.PatternLayout"> <conversionPattern value="(%d) %-5p [%t] (%logger) : %m%n" /> </layout> </appender> <root> <level value="DEBUG" /> <appender-ref ref="LogFileAppender" /> </root> </log4net>
...