Pexip Secure Scheduler for Web installation

Pexip provides the Scheduler for Web appliance via an OVA template suitable for deployment on VMware vCenter. The OVA template is provided "as-is" and provides a reference installation which is suitable for integrating with an existing Pexip Infinity deployment.

No changes should be made to any Scheduler for Web system (other than as described within this documentation for installing and maintaining your deployment) unless directed to do so by Pexip support. This includes (but is not limited to) any changes to the operating system or the installation of any third-party code/applications. If you encounter any issues, please contact your Pexip authorized support representative.

Installing Scheduler for Web involves the following steps:

  • Downloading and deploying the Scheduler for Web OVA template
  • Setting the password for SSH/console access
  • Completing the installation wizard

Hardware requirements

The server hosting the Scheduler for Web appliance requires a minimum:

  • 2 vCPU
  • 4 GB RAM
  • 40 GB SSD storage

Large-scale deployments may require more resources.

DNS Security Extensions (DNSSEC)

If your organization requires DNSSEC, we recommend setting up an external DNS server in front of the Scheduler for Web service to manage DNS requests in accordance with your organization’s security policy.

Scheduler for Web software disk image for Microsoft Azure

You can also deploy Scheduler for Web in Microsoft Azure. Pexip publishes a Scheduler for Web virtual hard disk (VHD) to Azure which can be used to create an appropriate Azure image in your Azure subscription.

Downloading and deploying the Scheduler for Web OVA template on VMware

Download the latest version of Scheduler for Web from https://dl.pexip.com/scheduling-core/ to the PC running the vSphere web client.

To deploy the OVA template:

  1. Using the vSphere web client, go to Hosts and clusters, and open the host or cluster where you want to deploy the OVA template.
  2. Go to Actions and select Deploy OVF Template... (this option accepts OVA files).
  3. During the OVA deployment, we recommend that you use the default options. Also make sure to assign the correct VMware network/port group for the network interface of the virtual machine.
  4. After the OVA template has been deployed, power on the newly-created virtual machine.

Setting the password for SSH/console access

After the virtual machine has powered on, open a console for the virtual machine.

Before you can start the install wizard, you must change the password. To do this:

  1. Log in as user pexip with password PEXIP (these are case sensitive).
  2. You are prompted to set a new password. To do this you must enter the new password twice. The password must:

    • have a minimum of 8 characters
    • satisfy at least 3 out of the following 4 conditions:

      • one lower case character
      • one upper case character
      • one special character
      • one digit.
  3. After setting the new password, the install wizard starts and you log in again with the new password.

Completing the installation wizard

The installation wizard is divided into several steps, which are explained below.

Note that all IP addresses in this guide are examples only — actual IP addressing is deployment specific.

The following table shows, for each step, the prompt text that is shown, an explanation of the step and some example input where appropriate. If you subsequently rerun the installation wizard, the default values for the questions use the answers from the previous run (if they are still valid).

Step / Wizard prompt text Example value Description
1 Network / NIC Configuration
    If the wizard is being rerun you are first asked "Do you want to reconfigure the network?". If you answer "no" you are taken to step 3.
  1.1 Enter the hostname for the virtual machine secure-scheduler

The hostname of Scheduler for Web.

Default: courts-core

  1.2 Enter the IP address and network mask for the virtual machine in CIDR format 10.0.0.10/24 You must enter the IP address and netmask in CIDR notation.
  1.3 Enter the gateway address for this interface 10.0.0.1 The IP address of the VM's default gateway.
  1.4 Enter one or more DNS servers to use 8.8.8.8, 8.8.4.4

A comma-separated list of DNS server IP addresses. The DNS servers must be able to resolve the addresses of the LDAP server and the Management Node.

Default: 8.8.8.8, 8.8.4.4 or as detected from DHCP

  1.5 Do you want to restrict SSH access to a specific IP range? yes

For added security you can restrict SSH access to this VM to a specific range of IP addresses.

Values: yes/no

Default: no

  1.6 Enter an IP range in CIDR notation 10.0.0.0/8 If you answered Yes to the previous question you are asked to enter the IP address range of the management workstations.
2 NTP servers
  2.1 Enter one or more NTP servers to use (comma separated)

As assigned by DHCP, otherwise two of the following:

  • 0.pexip.pool.ntp.org
  • 1.pexip.pool.ntp.org
  • 2.pexip.pool.ntp.org
  • 3.pexip.pool.ntp.org

We recommend that at least three NTP servers are used to ensure proper NTP time synchronization.

Default: 0.pexip.pool.ntp.org,1.pexip.pool.ntp.org,2.pexip.pool.ntp.org

3 Logging configuration
  3.1 Enter the maximum age of application log files in days. Enter 0 to disable automatic log cleanup. 14

The duration in days that an application log file is retained.

Enter 0 to disable automatic log cleanup.

Default: 0

  3.2 Do you want to configure remote logging? yes

Enter yes to add and configure a remote log server, or no to continue on to the next step.

Default: no

  3.2.1 Enter the remote logging address (IP or FQDN) 192.0.2.0 Enter the remote logging IP address or FQDN.
  3.2.2 Enter the remote logging protocol (UDP, TCP, TLS) TCP

Values: UDP/TCP/TLS

The IP transport protocol used to communicate with the remote log server.

  3.2.3 Enter the remote logging port 443 The port on the remote log server.
  3.2.4 Add another remote logging server? yes Enter yes to configure another remote log server, or no to continue on to the next step.
4 Web Portal Configuration
  4.1 Enter the FQDN that the web portal will be accessed at portal.example.com The IP address or FQDN of the Scheduler for Web portal.
  4.2

Which industry terminology do you want to use for the scheduling portal interface?

1. Generic web scheduling

2. Justice

1

The terminology and vocabulary that appears in the text of the scheduling portal user interface.

Values: 1/2

Default: 1

1. Generic web scheduling uses generic scheduling terms such as "meeting".

2. Justice uses legal and judicial terms such as "hearing".

  4.3 Do you want to configure the session timeout for the web portal? If configured, users will be logged out after the specified time regardless of activity. Otherwise, users will be logged out after 8 hours of inactivity. yes

Values: yes/no

Select yes if you want to change the portal session timeout to a duration different than 8 hours (480 minutes).

  4.4 Enter the session timeout in minutes. 720 Default: 480
  4.5 Username admin The username for the Scheduler for Web user account created.
  4.6 Email address admin@example.com The email address associated with the username entered in step 4.5.
  4.7 Enter the password for that username admin123 The password associated with the username entered in step 4.5.

When all of the installation wizard steps have been completed, Scheduler for Web will automatically reboot.

After Scheduler for Web has started up again it is ready for use — users can now sign in to the Scheduler for Web portal (via the virtual machine's address as specified in step 3.1).

Scheduler for Web post-installation steps

When you have completed the installation of both Pexip Infinity and Scheduler for Web, proceed to the post installation steps below.

Check for OS patches

We recommend that you keep the appliance's Operating System patched against the latest security bugs. You should check for patches immediately after initial installation, and then periodically. For full instructions, see Patching the operating system for the latest security bugs.

Install a system license

Install a system license that permits basic operation of the platform. See Licenses for more information.

Replacing the default SSL certificate on the Scheduler for Web VM

During the installation process a self-signed certificate is created on the Scheduler for Web VM — this must be replaced by a certificate signed by a CA that is trusted by Pexip Infinity.

Configuring a policy profile in Pexip Infinity

Policy profiles specify how Pexip Infinity uses external policy and/or local policy to control its call policy and routing decisions. You only need to create one policy profile for Scheduler for Web. All the Pexip Infinity System locations used for Scheduler for Web must use this policy profile.

Note that running local policy alongside the profile for Scheduler for Web is not recommended. If you need to do this, please contact your Pexip authorized support representative.

To configure policy profile:

  1. Go to Call control > Policy profiles.
  2. Select Add Policy profile and then configure that profile. The options are:

    Option Description
    Name The name used to refer to this policy profile in the Pexip Infinity Administrator interface.
    Description An optional description of the policy profile.
    External policy server
    URL

    The URL of the Scheduler for Web virtual machine set up during the installation wizard.

    You can only configure one address URL per policy server.

    Username

    Password

    The same username and password that were set up during the installation wizard.
    Service configuration policy
    Enable external service configuration lookup Ensure this option is selected.
    Participant policy
    Enable external participant lookup Ensure this option is selected.
  3. Select Save.
  4. Go to Platform > Locations.
  5. Select each appropriate location in turn and assign the newly created Policy profile for Scheduler for Web.

Authentication

User authentication for the Scheduler for Web portal can be local or via OIDC. Go to Global settings > Authentication in the portal to configure this.

Choose between Local or OIDC authentication. OIDC enables single sign-on (SSO) for users of the Scheduler for Web portal. Authentication for the portal is separate to authentication for the Pexip Infinity Administrator interface.

Complete the fields in the portal with the relevant details from your Identity Provider.

If you are required to change the client secret in your Identity Provider configuration at any point, you can update the OIDC client secret field in the portal in Global settings > Authentication > Edit Authentication > OIDC client secret.

Configuring a test call alias

You need to set up one or more aliases for test calls.

Pexip Infinity

A test_call alias is created on Pexip Infinity by default, but you can add additional test call aliases if required. See Configuring the Test Call Service for more information.

Scheduler for Web

Add the test call aliases configured on Pexip Infinity to the set of passthrough aliases in the Scheduler for Web portal in Global settings > General > Passthrough aliases.