The WAPT Console is installed along side the WAPT Agent.
Thus you first need to install the WAPT Agent on you management machine, please refer to WAPT Agent documentation
On Windows and macOS it is installed by default with WAPT Agent (but not configured by default), on Linux it is installed through an extra package.
Managing WAPT is done mainly via the WAPT Console installed on the Administrator’s workstation.
It is recommended that the Administrator’s computer be joined to the Organization’s Active Directory.
The host name of the Administrator’s workstation MUST NOT be longer than 15 characters.
This is a limit of sAMAccountName attribute in Active Directory.
The Administrator’s computer will become critical for WAPT administration and WAPT package testing.
If DNS records are properly configured, you should be able to access the WAPT web interface by visiting https://srvwapt.mydomain.lan. This web page is now protected by a password, please use the admin account set during server installation.
The WAPT Console is supported on Windows, Linux and macOS.
Some features, like WinPE pre-boot environement creation for WADS Windows deployment is not available on Linux and macOS.
The Linux and macOS console support light and dark mode.
Warning
The WAPT Console MUST NOT be installed on the WAPT Server.
The WAPT Console MUST be installed on the admin workstation from which you manage your network.
Download and install the WAPT Agent (note: the hash string may change, to get the latest, point your browser on the url https://wapt.tranquil.it/wapt/releases/wapt-2.6/).
Choose the version depending on your processor architecture (intel or m1):
ForExampleinWAPT2.6.0.17226
# for mac m1
curl-otis-waptagent-2.5.4.15342-6215c9da-macos-all-arm64.pkghttps://wapt.tranquil.it/wapt/releases/wapt-2.6/tis-waptagent-2.6.0.17226-71f4e2e0-macos-all-arm64.pkg
# for mac intel
curl-otis-waptagent-2.5.4.15342-6215c9da-macos-all-x86_64.pkghttps://wapt.tranquil.it/wapt/releases/wapt-2.6/tis-waptagent-2.6.0.17226-71f4e2e0-macos-all-x86_64.pkg
sudoinstaller-target/-pkgtis-waptagent*.pkg
You can get find the WAPT Console launcher in the WAPT folder in the Applications folder.
Click on Get Server https Certificate. You must have a green check for URL to the main repository and WAPT Server URL. Also check the WAPT Server SSL certificate is correct before continue.
With WAPT, Discovery and Enterprise versions have different licences.
To activate the licence, use the licence.lic file provided by our sales department.
If you are launching the WAPT Console for the first time, a wizard will ask you if you have a WAPT Enterprise licence.
Or in the WAPT Console, click on the ? tab.
Then choose Licences.
Window listing no activated WAPT licence in the WAPT Console¶
Finally, select your licence.lic and click Open.
Window showing an activated licence in the WAPT Console¶
Note
If you encounter any difficulties installing the license, please refer to this page.
It lists common errors and their solutions throughout the document.
A message may appear indicating that no personal certificate is defined in the WAPT Console.
WAPT personal certificate not found in the WAPT Console¶
Select Yes.
Window for the basic configuration of the WAPT Console¶
Attention
A common user error is to be tempted to create a new certificate at this step when one already exists.
If you have previously defined and deployed a certificate on your fleet of computers, then you MUST select the currently defined certificate.
You MUST NOT create a new certificate.
If this is your first time using WAPT, click on New private key and certicate and see create your certificate.
1.4. Generating the Administrator’s certificate for signing WAPT packages¶
In the example, the name of the private key is wapt-private.pem.
In the example, the name of the public certificate signed with the private key is wapt-private.crt.
The wapt-private.pem file is fundamental for security.
It MUST be stored in a safe place and correctly protected.
The wapt-private.pem file MUST NOT be stored on the WAPT Server.
The wapt-private.pem file is the private key, it is located by default in the C:\private folder of the Administrator workstation and is password protected.
This private key will be used along with the certificate to sign packages before uploading them onto the WAPT repository.
The wapt-private.crt file is the public certificate that is used along with the private key.
It is by default created in the C:\private folder of the Administrator, copied and deployed in C:\ProgramFiles(x86)\wapt\ssl on Windows desktops or in /opt/wapt/ssl on Linux and macOS devices.
This certificate is used to validate the signature of WAPT packages before they are installed.
Attention
If the public certificate used on the WAPT Console is not derived from the private key used for generating the WAPT Agents, the WAPT Console will not see the WAPT Agents and you will not be able to perform any action on any WAPT Agent.
Child certificates of private keys are also functional.
With WAPT Enterprise, you can create a Master key with a Certificate Authority flag that can both sign WAPT packages and sign new certificates to be used with WAPT.
In order to create new signed certificates for delegated users, please refer to creating a new certificate.
Creating a self-signed certificate for the WAPT Enterprise version¶
Certificate informations
Value
Description
Required
Enterprise
Target key directory
Defines the folder where the private key and the public certificate will be stored.
Key filename
Defines the name of the .pem private key.
Private key password
Defines the password for unlocking the key.
Confirm password
Confirms the password for unlocking the key.
Certificate name
Defines the name of the .crt certificate.
Tag as code signing
Defines whether the certificate/ key pair will be allowed to sign software packages.
Tag as CA certificate
Defines whether the certificate can be used to sign other certificates (main or intermediate Certificate Authority).
Common Name (CN)
Defines the Common Name to register in the certificate.
City
Defines the name of the certificate holder’s city to register in the certificate.
Country (2 chars. E.g: FR)
Defines the name of the certificate holder’s country (FR, EN, ES, DE …) to register in the certificate.
Service
Defines the name of certificate holder’s service or organizational department to register in the certificate.
Organization
Defines the name of the certificate holder’s Organization to register in the certificate.
E-mail address
Defines the email address of the certificate holder to register in the certificate.
Authority Signing Key
Defines the key (.pem) of the CA.
Authority Signing Certificate
Defines the certicate (.crt) of the CA.
Export PKCS12
Forces the creation of the *.p12 certicate in the Targets keys directory
(recommended)
Additional details are stored in the private key.
This information will help with identifying the origin of the certificate and the origin of the WAPT package.
The password complexity MUST comply with your Organization’s security requirements (visit the ANSSI website for recommendations on passwords).
Danger
The wapt-private.pem file MUST NOT be stored on the WAPT Server.
Click on OK to go on to the next step.
If everything has gone well the following message will appear.
Dialog box informing the certificate has been generated successfully¶
Click on OK.
Dialog box requesting confirmation of the copy of the certificate in the ssl folder in the WAPT Console¶
Click on Yes to copy the newly generated certificate in the folder C:\ProgramFiles(x86)\wapt\ssl on Windows or /opt/wapt/ssl on Linux or macOS.
This certificate will be picked up during the compilation of the WAPT Agent and deployed on the client computers.
Once the WAPT Console has been installed on the Administrator computer, we have all files required to build the WAPT Agent installer.
Before building the WAPT Agent, please verify that your certificates are ready.
If you wish to deploy other public certificates on your Organization’s computers that are equipped with WAPT, you will have to copy them in a common folder then select it when generating the WAPT agent.
The former method for building the WAPT agent did not prevent copying the private key of any Administrator in C:\ProgramFiles(x86)\wapt.
It means that, by error, a private key could be deployed on every computer, becoming a serious security breach.
Before 2.3.0 version, this folder was used when building the WAPT Agent and the private keys would then be deployed on all the computers.
Now, the new method is far more secure.
It uses a waptsetup that is signed by Tranquil IT, the configuration being written into a json file that is attached to the signed waptsetup file.
Alternatively, we can also create a WAPT configuration package that will be called when deploying the WAPT Agent.
This method is called certificate stuffing.
On top of avoiding errors, like deploying a private certificate by error, the method has the advantage of no longer requiring to custom build a WAPT Agent.
This method finally avoids Antivirus incorrectly flagging the waptsetup file as a false positive.
When the WAPT Agent will be silently installed, it will take the default configuration: it will build the WAPT Agent’s wapt-get.ini configuration file and extract certificates into wapt/ssl.
To secure this installation (for example with GPOs), waptsetup.exe and its integrated json configuration have the name and hash of the configuration name on the WAPT Server.
When the installer will apply the json configuration, it checks beforehand with this hash that the json data has not been altered.
In the WAPT Console, go to Tools ‣ Build WAPT Agent.
Before building the WAPT Agent, you need to choose how it will identify itself with the WAPT Server.
1.6.2. Choosing the mode to uniquely identify the WAPT Agents¶
In WAPT you can choose the unique identification mode of the WAPT Agents.
When a WAPT Agent registers the WAPT Server MUST know if it is a new host or if it is a host that has already been registered.
For this, the WAPT Server looks at the UUID in the inventory.
WAPT offers 3 modes to help you distinguish between hosts, it is up to you to choose the mode that best suits you.
Attention
After choosing a mode of operation, it is difficult to change it, think carefully!
This mode of operation makes it possible to identify the hosts in the WAPT Console in a physical manner.
If you replace a computer and give the new computer the same name as the previous one, you will have two computers that will appear in the WAPT Console since you will have physically two different computers.
Note
Some vendors do inadequate work and assign the same BIOS UUIDs to entire batches of computers.
In this case, WAPT will only see one computer!!!
This mode of operation is similar to that in Active Directory.
The hosts are identified by their FQDN.
Note
This mode does not work if several hosts in your fleet share the same name.
We all know this should never happen.
This mode of operation allows PCs to be identified by their WAPT installation.
Each installation of WAPT generates a unique random number.
If you uninstall the WAPT Agent and then reinstall the WAPT Agent on the host, you will see a new device appear in the WAPT Console.
Defines whether Kerberos authentication of the WAPT Agents is to be used with the WAPT Server.
Danger
The checkbox Use kerberos for the initial registration may be checked ONLY IF you have followed the documentation on Configuring the kerberos authentication.
If you click on Show advenced settings, you can configure more parameters for WAPT Agent.
Setting more parameters for WAPT Agent configuration¶
It is possible to configure the WAPT Agent for standard and advanced options via a GUI.
Very similar to creating a configuration package, we strongly recommand you to see the section beforehand.
The initial configuration aims to configure important parameters in the WAPT Agent, whether it be Windows, Linux or macOS.
The method is very useful for installing a WAPT Agent on Linux or macOS.
In the WAPT Console, go to Tools -> Edit initial configurations.
Defines whether Kerberos authentication of the WAPT Agents is to be used with the WAPT Server.
Enable automatic install of packages based on AD Groups
Enables the installation of profile packages.
This feature can degrade the performance of WAPT.
Maturities
List of package maturities than can be viewed and installed by WAPT Agent. Default value is PROD.
Only DEV, PREPROD and PROD values are used by Tranquil IT, however any value can be used to suit your internal processes.
Authentification type
Sets how the self service authentication works.
Possible values are: system, waptserver-ldap or waptagent-ldap.
Packages Audit Period
Defines the frequency at which audits are triggered.