In the Configuration Dashboard, verify that the Message Broker is installed, configured, and connected.
Any of the following dual core 64-bit processor servers:
Windows Server 2019
Windows Server 2016
The server must be joined to Azure Active Directory
For large tenants, Micro Focus recommends a dedicated server for Agent365
.NET 4.8 (this will be installed if not already present)
Minimum of 200 MB RAM
At the root of the FileReporter_4.0.iso image, double-click FileReporter-Agent365-4.0.x64-xx.exe.
Agree to the license terms and conditions and click Install.
When you are notified that the setup was successful, click Run Setup Utility.
From the wizard page, read the overview of what will be installed and configured and click Next.
Broker Type: Displays the RabbitMQ messaging broker.
Host Address: Specify the IP address or DNS name of the server hosting RabbitMQ.
Port: This is the port that the Management API for RabbitMQ is listening on with TLS support enabled, which by default is 5671.
Use TLS: The RabbitMQ messaging broker in File Reporter requires Transport Layer Security (TLS) as the cryptographic communications security protocol.
API Port: This is the port the Management API for RabbitMQ is listening on with TLS support enabled. The default setting is 15671.
Use TLS: This is a read-only check box indicating that File Reporter only works with TLS communication channels. TLS is always required.
Service Account: Enter the name of the service account, which is by default, srsbroker.
For your reference, your Service Account name is displayed in the Message Broker region of the Configuration Dashboard.
Password: Enter the password that you established when you configured the Message Broker.
Test: Click to test the connection between Agent365 and RabbitMQ.
Complete the fields and click Next.
Database Server: This region includes fields specific to the communication with the Microsoft SQL Server or PostgreSQL database.
Type: From the drop-down menu, specify the database type.
Host Address: Enter the IP address of the server hosting the database that you configured earlier.
For your reference, the IP address is displayed in the Database region of the Configuration Dashboard.
Port: Unless you changed the default port address when you configured the database, leave the setting at 1433.
Database Service Account: This region includes fields for the database service account and password.
Account Name: Unless you changed the default name for the Database Service User, enter srsadmin.
For your reference, the name is displayed in the Database User field in the Database region of the Configuration Dashboard.
Password: Enter the database administrator password.
Database Name: Unless you changed the default name for the database name, enter srsdb.
For your reference, the database name is displayed in the Database region of the Configuration Dashboard.
Test Connection: Click to test the connection between Agent 365 and the database.
Complete the fields and click Next.
To complete the fields in this page, you will need to log in to your tenant in Azure AD.
Tenant: Enter the name of your tenant here.
For your reference, you can view this in the Azure Active Directory admin center interface by selecting Azure Active Directory.
Application ID: Enter the name of the application that you registered and configured previously.
For your reference, you can identify the application ID in the Azure Active Directory admin center by clicking App registrations, clicking the listed registered application, and then copying the Application (client) ID listing into the Application ID field of the File Reporter Agent 365 wizard.
Application Certificate: This region is where you generate the key pair for the application certificate. Once you do so, the fields are filled in automatically.
Generate the application certificate.
Click Generate Key Pair.
When the Certificate Update Notice dialog box appears, click Yes.
The following dialog box appears:
In the Certificate Password field, create a password for the certificate.
Provide the password again in the Verify Password field.
Click Generate.
The application certificate details are now displayed in the remaining fields of the wizard page.
Click Export Public Certificate.
Save the certificate to a preferred location on the server.
In Azure Active Directory admin center, click Certificates & secrets.
Click Upload certificate, click the folder icon in the dialog box to browse to the location where you saved the certificate, click Open and then click Add.
The certificate is now listed in the Certificates region of the Azure Active Directory admin center page.
Return to the File Reporter Agent365 Wizard and click Test Connection.
If you get a failure notice, it most likely means that the tenant has not had enough time to update. If you do, try again until you get a Connection valid indication on the wizard page and a Tenant Info dialog appears with the updated tenant information.
Click OK to close the Tenant Info dialog box.
Click Next to advance in the wizard.
Click Finish.