Upgrading Remedy SSO in the high-availability mode using the Remedy installer wizard
Where you are in the Upgrade process
|1||Preparing to upgrade TrueSight Operations Management solution|
|2||Upgrade Remedy Single Sign-On (You are here)|
|3||Upgrade TrueSight Presentation Server|
|4||Upgrade TrueSight Infrastructure Management|
|5||Upgrade App Visibility Manager|
|6||Upgrade Real End User Experience Monitoring Software Edition|
|7||Upgrade TrueSight IT Data Analytics|
Remedy Single Sign-On high-availability (HA) environment is implemented as a redundant system with session failover. In this model, if a node fails, the single sign-on load is transitioned to the remaining servers with minimal interruption.
Remedy SSO upgrade process
The following table describes in detail the Remedy SSO upgrade process.
|Upgrade||What occurs during the upgrade|
|Remedy SSO application|
|HA environment with Remedy SSO|
Plan for system downtime before upgrading Remedy SSO
If you are using SAML authentication in your Remedy SSO environment, before you upgrade, decide whether you want to plan for the system downtime or not. Based on your plan, choose between these two options:
- If you plan for the system downtime, do the following:
- If you do not want to plan for the system downtime, do the following:
To upgrade Remedy SSO in a HA environment
The Remedy SSO Admin UI requires sticky session/Session Persistence in an HA environment. Usually, this is accomplished by enabling sticky session/Session Persistence on the load balancer. Different load balancers have different configurations to enable a sticky session/Session Persistence. Refer to the specific load balancer documentation or ask the vendor for details about the configuration.
Note that when sticky session/Session Persistence is not enabled for the Remedy SSO Admin UI, the admin user behind the firewall can use a specific Remedy SSO server hostname to access admin UI instead of using the load balancer URL.
You need to perform the following tasks to upgrade Remedy SSO using the wizard-based Remedy installer in the high-availability mode:
- Ensure that Remedy SSO is upgraded successfully on the primary node as outlined in upgrading .
Unzip the Remedy SSO files on the additional node.
Upgrade Remedy SSO on the additional node.
- Complete the rest of the upgrade steps.
- (Optional) Re-configure SAML authentication.
To reconfigure the SAML authentication settings
For each realm that is configured for SAML authentication, perform the following steps:
- Edit the realm to enter PEM encoded IdP signing certificate data in the IdP Signing Certificate field or import the IdP metadata again. Ensure that the other SAML configuration is same as before except the IdP Signing Certificate field data.
- Save the details.
When you configure the SAML authentication parameters for the Presentation Server, you must set the User ID Transformation field to RemoveEmailDomain and enable the Force Authentication check box.
If you had modified the web.xml file during the upgrade, ensure that you reapply the changes after the upgrade.