2.3 Restoring an Administration Console Configuration

The restore script replaces the configuration records in the configuration database with the records in the backup of the configuration store. It should be used to restore configuration data for one of the following types of scenarios:

The restoration steps are dependent upon whether the Administration Console is installed on its own machine or with other Access Manager components:

If the primary Administration Console machine has failed, you have lost both the configuration and the configuration database. To recover from this scenario, you need to do more than restore the configuration. For instructions, see Section 6.6, Moving the Primary Administration Console to New Hardware.

The restore script cannot be used to move the Administration Console to a different platform, even if the new machine is configured to use the same IP address and DNS name. The backup files contains path information that is specific to the operating system. To move the Administration Console from Linux to Windows or Windows to Linux, you need to install a secondary Administration Console on the desired platform, then promote it to being the primary Administration Console. For instructions on this process, see Section 6.7, Converting a Secondary Console into a Primary Console.

2.3.1 Restoring the Configuration on a Standalone Administration Console or with a Traditional SSL VPN Server

  1. Ensure that the .zip file created during the backup process is accessible.

  2. Log in as root.

  3. (Conditional) If you have modified the Tomcat password in the server.xml file on a Linux Administration Console, back up this file. This file is located in the following directory:

    /etc/opt/novell/tomcat5

    The feature to modify this password was removed in Access Manager 3.0 SP3.

  4. Change to the utility directory.

    Linux: /opt/novell/devman/bin

    Windows Server 2003: \Program Files\Novell\bin

    Windows Server 2008: \Program Files (x86)\Novell\bin

  5. Run the following command:

    Linux: ./amrestore.sh

    Windows: amrestore.bat

  6. Enter and re-enter the Access Manager administration password.

  7. (Windows) Enter the path to where the backup file is stored.

  8. Enter the name of the backup file. Do not include the .zip extension.

  9. Enter the private key encryption password, then press Enter.

  10. Re-enter the private key encryption password, then press Enter.

  11. (Conditional) If you modified the Tomcat password on the Linux machine:

    1. Restore the backup you made of the server.xml file to the Tomcat directory.

      /etc/opt/novell/tomcat5

    2. Restart Tomcat with the following command:

      /etc/init.d/novell-tomcat5 restart

  12. (Windows) Reboot the machine.

  13. (Conditional) If you have a secondary Administration Console installed, reboot the machines.

  14. (Conditional) If any devices report certificate errors, you need to re-push the certificates.

    1. Click Auditing > Troubleshooting > Certificates.

    2. Select the store that is reporting errors, then click Re-push certificates.

      You can select multiple stores at the same time.

    3. (Optional) To verify that the re-push of the certificates was successful, click Security > Command Status.

If you are restoring only the Administration Console, other components should still function properly after the restore.

2.3.2 Restoring the Configuration with an Identity Server on the Same Machine

Select the type of machine the Administration Console is installed on:

Linux

Whenever you run the amrestore.sh script, the Administration Console is restored as a standalone Administration Console. You must perform the steps described in Step 10 to restore your Identity Server into the configuration.

  1. Ensure that the .zip file created during the backup process is accessible.

  2. Log in as root.

  3. Change to the /opt/novell/devman/bin directory.

  4. Run the following command:

    ./amrestore.sh

  5. Enter the Access Manager administration user ID.

  6. Enter the Access Manager administration password.

  7. Enter the name of the backup file. Do not include the .zip extension.

  8. Enter the private key encryption password, then press Enter.

  9. Re-enter the private key encryption password, then press Enter.

  10. For the Identity Server, complete the following steps after the restore has finished:

    1. Remove the Identity Server from the cluster configuration. (See Removing a Server from a Cluster Configuration in the Novell Access Manager 3.1 SP2 Identity Server Guide.)

    2. Delete the Identity Server from the Administration Console. (See Managing an Identity Server in the Novell Access Manager 3.1 SP2 Identity Server Guide.)

    3. Uninstall the Identity Server. (See Uninstalling the Identity Server in the Novell Access Manager 3.1 SP2 Installation Guide.)

      This is required if the Identity Server is installed on the machine. If you installed the Identity Server before running the amrestore.sh script, you need to uninstall the Identity Server.

    4. Install the Identity Server. (See Installing the Novell Identity Server in the Novell Access Manager 3.1 SP2 Installation Guide.

    5. If you have customized login pages, error pages, messages, or configuration files, copy these files to the Identity Server.

    6. Reassign the Identity Server to the cluster configuration that it was removed from. (See Assigning an Identity Server to a Cluster Configuration in the Novell Access Manager 3.1 SP2 Identity Server Guide.)

    7. Update the Identity Server.

  11. (Conditional) If any devices report certificate errors, you need to re-push the certificates.

    1. Click Auditing > Troubleshooting > Certificates.

    2. Select the store that is reporting errors, then click Re-push certificates.

      You can select multiple stores at the same time.

    3. (Optional) To verify that the re-push of the certificates was successful, click Security > Command Status.

Windows

To perform a restore when a Windows Administration Console and an Identity Server are installed on the same machine:

  1. Log in as the administrator user.

  2. Run the Access Manager Restore utility.

    1. From a command line, change to the utility directory:

      Windows Server 2003: \Program Files\Novell\bin directory.

      Windows Server 2008: \Program Files (x86)\Novell\bin directory.

    2. Specify amrestore.bat.

    3. Answer the prompts.

  3. Remove the Identity Server from the cluster configuration. (See Removing a Server from a Cluster Configuration in the Novell Access Manager 3.1 SP2 Identity Server Guide.)

  4. Delete the Identity Server from the Administration Console. (See Managing an Identity Server in the Novell Access Manager 3.1 SP2 Identity Server Guide.)

  5. Install the Identity Server on the Administration Console. (See Installing the Novell Identity Server in the Novell Access Manager 3.1 SP2 Installation Guide.

  6. If you have customized login pages, error pages, messages, or configuration files, copy these files to the Identity Server.

  7. Reassign the Identity Server to the cluster configuration that it was removed from. (See Assigning an Identity Server to a Cluster Configuration in the Novell Access Manager 3.1 SP2 Identity Server Guide.)

  8. Update the Identity Server.

2.3.3 Restoring the Configuration with an ESP-Enabled SSL VPN Server

Whenever you run the amrestore.sh script, the Administration Console is restored as a standalone Administration Console. You must perform the steps described in Step 10 to restore your ESP-enabled SSL VPN server into the configuration.

  1. Ensure that the .zip file created during the backup process is accessible.

  2. Log in as root.

  3. Change to the /opt/novell/devman/bin directory.

  4. Run the following command:

    ./amrestore.sh

  5. Enter the Access Manager administration user ID.

  6. Enter the Access Manager administration password.

  7. Enter the name of the backup file. Do not include the .zip extension.

  8. Enter the private key encryption password, then press Enter.

  9. Re-enter the private key encryption password, then press Enter.

  10. For the SSL VPN Server, complete the following steps after the restore has finished:

    1. Remove the SSL VPN Server from the cluster configuration.

    2. Delete the SSL VPN Server from the Administration Console.

    3. Uninstall the SSL VPN server.

    4. Install the SSL VPN server.

    5. Reassign the SSL VPN server to the cluster configuration that it was removed from.

    6. Update the SSL VPN server.

  11. (Conditional) If any devices report certificate errors, you need to re-push the certificates.

    1. Click Auditing > Troubleshooting > Certificates.

    2. Select the store that is reporting errors, then click Re-push certificates.

      You can select multiple stores at the same time.

    3. (Optional) To verify that the re-push of the certificates was successful, click Security > Command Status.