The short name of the WAPT Server MUST not be longer than 15 characters (the limit is due to sAMAccountName restriction in Active Directory).
The name of the WAPT Server MUST be a FQDN, that is to say it has both the WAPT Server name and the DNS suffix.
Modify the /etc/hostname file and write the FQDN of the WAPT Server.
# /etc/hostname of the WAPT Server
srvwapt.mydomain.lan
Configure the /etc/hosts file, be sure to put both the FQDN and the short name of the WAPT Server.
# /etc/hosts of the waptserver127.0.0.1localhostlocalhost.localdomainlocalhost4localhost4.localdomain4
::1localhostlocalhost.localdomainlocalhost6localhost6.localdomain6
10.0.0.10srvwapt.mydomain.lansrvwapt
Hint
On the line defining the DNS server IP address, be sure to have the IP of the WAPT Server (not 127.0.0.1), then the FQDN, then the short name.
Do not change the line with localhost.
2.2.1.3. Configuring the IP address of the WAPT Server¶
Define a static IP address using the nmcli command or nmtui for a semi-graphical interface
(Click here for more information about the nmtui command).
The name of the file can be different, like enp0s17, ifcfg-eth0 for example.
Check that the host clock is on time and that SELinux and the firewall are enabled.
date
sestatus
systemctlstatusfirewalld
Check whether the machine is properly synchronized with NTP server.
If it is not synchronized please refer to the OS documentation to configure timedatectl.
timedatectlstatus
Update the distribution and set up the EPEL repository.
The hostname of the WAPT Server MUST be properly configured.
To check, use the command echo $(hostname) which MUST return the DNS address that will be used by WAPT Agents on client computers.
The DNS resolver MUST be correctly configured.
The WAPT Server MUST be able to contact a Domain Controller in write mode for Kerberos authentication mode.
The post-configuration script rewrites the nginx configuration.
A backup file is created when running the postconf in the same directory.
This post-configuration script MUST be run as root.
Run the script.
/opt/wapt/waptserver/scripts/postconf.sh
Click on Yes to run the postconf script.
Doyouwanttolaunchpostconfigurationtool?
<yes><no>
Choose a password (if not defined) for the SuperAdmin account of the WAPT Server (minimum length is 10 characters).
Upgrade WAPT 2.X to 2.6, verify the verify_cert option.
Note
If you are upgrading from WAPT 2.X to 2.5, verify the current configuration of the WAPT Agents and more specifically the verify_cert option.
If in your current configuration verify_cert is set to True or a set to a file path (certificate pinning), then choose option #1 below.
If in your current configuration verify_cert is set to False, then choose option #2 below.
If you want to use WAPT for OS Deployment, select Yes.
If you have chosen Yes to activate os deployment, the post-configuration will ask whether to use a secure authentication to deploy OS images.
It will ask a user / password when you will deploy OS images using WADS.
If you have chosen No, Nginx will not enable WADS API endpoints for WAPT Agents.
Doyouwanttoactivateosdeployment?
<Yes><No>
Secure authentication for WADS requires the user to be authenticated on the machine where the OS deployment will take place.
Added in version 2.5: The access to the WAPT web interface is now password protected.
Finally, the postconf show somes informations about the WAPT Server SSL certificate and the URL to download WaptSetup and install on the WAPT Administrator’s computer.
Specifies a configuration file path (default: /opt/wapt/conf/waptserver.ini).
-s or --force-https
Configures Nginx so that port 80 is permanently redirected to 443
-q or --quiet
Runs the post-configuration in quiet mode.
-n or --nginx
Runs nginx configuration if the post-configuration is set in quiet mode.
--dhparam-key-size=NUMBER
Defines the size for dhparam key (default: 2048).
-p or --admin-password
Defines the admininistrator password for the WAPT Server if the post-configuration is set in quiet mode.
--server-names=SERVER_NAMES
Defines the WAPT Server name and ip for certificate CN and SubjectAltNames.
The separator is a comma (default: fqdn and IP address).
--cspn-toe
Defines settings for CSPN TOE mode (default: False). This enable more strict security default values, and disable all the features that are not included in the TOE of the CSPN certification
CSPN (First Level Security Certification by ANSSI) mode does not include WAPTWUA, WADS, Secondary Repos or Peercache. These features are not part of the Target Of Evaluation (TOE).
Attention
For post-configuration to work properly:
The hostname of the WAPT Server MUST be properly configured.
To check, use the command echo $(hostname) which MUST return the DNS address that will be used by WAPT Agents on client computers.
The DNS resolver MUST be correctly configured.
The WAPT Server MUST be able to contact a Domain Controller in write mode.
The post-configuration script rewrites the nginx configuration.
A backup file is created when running the postconf in the same directory.
This post-configuration script MUST be run as root.
In CSPN mode, the WAPT Server installation activates more security features and is less tolerant with misconfigurations.
In this mode:
Administrator password length is 20 characters and password complexity is enforced.
Administrator and user certificate password length is 20 characters and password complexity is enforced.
Kerberos registration and authentication are mandatory.
Client-Side Certificate Authentication is mandatory.
The SSL certificate verification is mandatory.
Various backward compatibility settings are disabled.
Functionalities excluded from the CSPN TOE (namely secondary repositories, peercache, WADS and WAPT WUA) are disabled.
Waptconsole login on server is restricted to kerb and *admin methods (admin mode can be disabled after initial setup).
Session cookies maximum lifetime is 12 hours.
Default lifetime for certificates signed by WAPT is 3 years.
Choose a password (if not defined) for the SuperAdmin account of the WAPT Server.
The minimum length is 20 characters with at least 1 upper case characters, 1 lower case characters and 1 punctuation mark.
If the credentials are correct, the keytab is generated in /etc/nginx/http-krb5.keytab.
The correct ACL are set.
Else, you must read the documentation.
Configures Nginx so that port 80 is permanently redirected to 443.
--cspn-toe
Defines the settings for CSPN TOE mode (default: False).
--server-names=SERVER_NAMES
Defines the server name and ip for certificate CN and altdnsnames.
Separator is a comma (default: None).
Warning
In CSPN mode, WADS and WUA will not appear in the WAPT console.
However, the Peer Cache and Secondary Repositories features can be enabled, though they should not be activated because it is not assessed in the CSPN target.
Enabling Peer Cache in the WAPT console :
By edit a new agent configuration :
Go to Tools ‣ Edit agent dynamic configurations.
Check the option Use Peer Cache.
By use a WAPT configuration package :
Create a package in WAPT Packages → Make package template from setup file → Host agent dynamic configuration.
Check the option Use Peer Cache.
Enabling Secondary Repositories in the WAPT console :
For the agent :
By edit a new agent configuration :
Go to Tools ‣ Edit agent dynamic configurations.
Check Use repository rules.
By use a WAPT configuration package :
Create a package in WAPT Packages → Make package template from setup file → Host agent dynamic configuration.
Check the option Use repository rules.
For Configuring an agent as a secondary repository :
By edit a new agent configuration :
Go to Tools ‣ Edit agent dynamic configurations.
Go to the Repo-sync tab and check Synchronize packages and system updates on the agent.
By use a WAPT configuration package :
Create a package in WAPT Packages → Make package template from setup file → Host agent dynamic configuration.
Go to the Repo-sync tab and check Synchronize packages and system updates on the agent