Skip Headers
Oracle® Enterprise Manager Application Configuration Console Installation Guide
Release 5.3.2

Part Number E14652-02
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

8 Install the Windows Resource Extensions

The Windows Resource Extensions (WRE) is an Application Configuration Console product add-in that enables you to extract Windows configuration data from Windows servers to create assets in Application Configuration Console. To do this, the Application Configuration Console Server connects to a proxy service, which in turn, runs Visual Basic scripts on target machines to extract the data and pass it back through the Core Server to Clients. Figure 8-1 depicts the flow of information in a typical configuration.

Figure 8-1 Flow of Information in Windows Resource Extensions

flow of information in Windows Resource Extensions
  1. From a Client, a user requests an asset load of a Windows asset.

  2. The Core Server connects to the proxy service host, passing the relevant request information.

  3. The proxy service executes the appropriate script on the target machine to extract the data and return it to the Client through the Core Server.

If you have purchased this product, your Application Configuration Console software distribution disc includes a Windows Resource Extensions folder with the following contents:

8.1 Windows Resource Extensions Prerequisites

Before you proceed with the installation, ensure that the respective environments satisfy the stated requirements.

8.1.1 Proxy Service Requirements

General requirements include the following:

  • OpenSSH must be installed on the proxy host. See Section 8.3.1, "Download and Install OpenSSH."

  • The host machine operating system must be Windows 2000, Windows XP, or Windows Server 2003.

  • The credentials used to access the proxy service host and the target machines must be part of the Local Administrators Group on the machine. These credentials must have rights to execute the scripts on the proxy service host and to perform administrative tasks on the target machines.

Additional requirements depend on the Windows asset type.

8.1.1.1 IIS 5.0

The IIS 5.0 scripts use the ADSI provider to access configuration data. This requires that the IIS common files be installed on the proxy service host. If not already present, you can install them by opening Add or Remove Programs in the Control Panel and selecting Internet Information Services (IIS) > Common Files. Note that some of the scripts require that the proxy service be able to communicate with the target machines using UNC path specifications over TCP port 135 (RPC).

8.1.1.2 SQL Server 2000

The SQL Server 2000 scripts use SQL-DMO to access configuration data. This requires that SQL Client Tools be installed on the proxy service host, specifically, the following selections:

  • "Client Connectivity

  • "Development Tools

  • "Header and Libraries

As SQL-DMO uses the Microsoft SQL Server ODBC driver to connect to and communicate with SQL Server instances, the proxy service must be able to communicate with the target machines using ODBC.

8.1.1.3 IIS 6.0 and Windows OS

The scripts for these assets use WMI providers to access configuration data, so the WMI service must be running (it starts automatically by default). The proxy service must be able to communicate with the target machines over TCP port 135 (RPC).

8.1.2 Automation Module Requirements

To install the automation module, you must have already completed the Application Configuration Console Server and Client installations.

8.2 What If There's a Firewall?

If there's a firewall in play, where you install the Application Configuration Console Proxy Service is a matter of resources and network conventions established at your site. Consider the following possibilities:

8.2.1 When the Proxy Service Is Outside the Firewall

Figure 8-2 illustrates the three possibilities identified when the proxy service is outside the firewall.

Figure 8-2 Installing the Proxy Service Outside the Firewall

Possibilities for the proxy service outside the firewall

The proxy service uses WMI, SMB, and third-party COM APIs to extract information from target machines. These Windows technologies must therefore be accessible on the target machines. These technologies in turn use DCOM, which allocates random ports to communicate across the network.

Since the proxy service is outside the firewall, the firewall rules must allow communication between target machines and the machine hosting the proxy service on any TCP port over 1024 and on TCP port 135. The rules will need to allow the Windows file sharing ports as well. When the proxy service is in its own DMZ, the rules must be extended to allow communication between the Core Server and proxy service hosts using SSH over TCP port 22. Implicit in the first two options is that the Core Server uses SSH to communicate with the proxy service over TCP port 22.

8.2.2 When the Proxy Service Is Inside the Firewall

Figure 8-3 illustrates the two possibilities identified when the proxy service is inside the firewall.

Figure 8-3 Installing the Proxy Service Inside the Firewall

Possibilities for the proxy service inside the firewall

The proxy service uses WMI, SMB, and third-party COM APIs to extract information from target machines. These Windows technologies must therefore be accessible on the target machines. Since the proxy service is inside the firewall, the firewall rules must allow communication between the Core Server and proxy service hosts using SSH over TCP port 22.

8.3 Application Configuration Console Proxy Service Setup

The Application Configuration Console Proxy Service consists of the following components:

Note:

OpenSSH must already be installed on the machine hosting the proxy service. Additionally, there can be no Cygwin component on this machine.

8.3.1 Download and Install OpenSSH

Use the following instructions to ensure that your OpenSSH setup conforms to the proxy service requirements:

  1. Paste the following URL into your browser:

    http://sshwindows.sourceforge.net/download/
    
  2. On the page that opens, click Binary Installer Releases.

  3. On the next page, download setupssh381-20040709.zip to the proxy service host.

  4. Log in to the proxy service host as someone with administrative privileges.

  5. Extract the zip file to a temporary directory.

  6. Navigate to the directory where you extracted the zip file and run setup.exe. Proceed with the installation.

  7. At Choose Components, select Server and Start Menu Shortcuts. Continue with the installation.

  8. At Choose Install Location, enter the following as the Destination Folder:

    C:\Program Files\OpenSSH
    

    Continue with the installation.

  9. A warning about editing the passwd file appears; this is addressed later in the chapter. Click OK.

  10. When the installation completes, click Finish.

8.3.2 Load Windows Resource Extensions Scripts

The scripts that ship with WRE must be installed in a fixed location so the resource specifications installed with the WRE Automation Module will work out-of-the-box.

To load the WRE scripts on the proxy service host:

  1. Log in as someone with administrative privileges.

  2. Create the directory mValentScripts under the OpenSSH installation directory, as follows:

    C:\Program Files\OpenSSH\mValentScripts
    
  3. Load the Application Configuration Console software distribution disc and navigate to the Windows Resource Extensions folder.

  4. Extract the windowsre_wmi_scripts.zip file to the directory you created in Step 2.

Note:

If for some reason your organization does not permit use of OpenSSH and you have to use some other means of secure network connectivity, the mValentScripts directory containing the scripts must be at root for WRE to work out of the box. So, for example, if you log in remotely, type cd /mValentScripts, and successfully change to that directory, you are properly configured. If you have questions or concerns, contact Support.

8.3.3 Create the passwd File

You need a passwd file on the proxy host machine to be able to log in to and use SSH. The passwd file is the equivalent of the /etc/passwd file on UNIX-based systems. Application Configuration Console supplies a script to automatically create passwd and group files of all users and groups. The script gives you the option to create these files for either local or domain (or both) user accounts.

  • Local means only users with accounts on the proxy service host will be able to log in to SSH.

  • Domain means users in the domain will be able to log in to SSH, but local users will not be able to.

  • Both means that domain and local users will be able to log in to SSH. In case of duplicates, the domain user takes precedence; that is, the password associated with the domain user is required to log in.

To run the script:

  1. Log in as someone with administrative privileges.

  2. In Windows Explorer, navigate to the following directory:

    C:\Program Files\OpenSSH\mValentScripts
    
  3. Double-click the following file:

    mkpasswd.vbs
    

    The script presents the option to create domain only (-D), local only (-L), or both domain and local (-D, -L) user accounts.

  4. Enter the option appropriate to your network environment and click OK.

  5. The script announces successful creation of the files. Click OK to terminate the script and restart the OpenSSH service.

8.4 Installing the Automation Module

To install the automation module:

  1. Start the Application Configuration Console Server, then start the Client and log in as a member of the Administrators group.

  2. Copy the WindowsRE.jar file from the software distribution disc to a location in the file system.

  3. In the Client, click the Admin menu in the menu bar.

  4. Click Install Extension to open the dialog of the same name.

  5. Select automation as the extension type.

  6. Click Browse to locate the WindowsRE.jar file in the file system.

  7. Click OK to install the automation module.

This creates the Windows Resource Extensions resource specifications under the System > Resource Specifications folder in the Navigator View. These resource specifications have counterpart scripts on the proxy service host that they call to extract configuration and other data from target machines. The scripts are located at the following location:

C:\Program Files\OpenSSH\mValentScripts

Note:

If you install an automation module after redeploying a secondary server, you have to port the AM installation to the secondary server. See Section D.5, "Redeployment and Automation Modules," for details.