Upgrading Remedy SSO in the high-availability mode using the Remedy installer wizard


Failed to execute the [excerpt-include] macro.

Remedy Single Sign-On high-availability (HA) environment is implemented as a redundant system with session failover. In this model, if a node fails, the single sign-on load is transitioned to the remaining servers with minimal interruption.

Remedy SSO upgrade process

The following table describes in detail the Remedy SSO upgrade process.

Upgrade

What occurs during the upgrade

Remedy SSO application

  • Remedy SSO server binaries (<Tomcat>\webapps\rsso\) and database schema are upgraded.
  • Configuration files are unchanged or updated.

HA environment with Remedy SSO

  • After you upgrade the first node, the underlying database is upgraded as well.
  • Until you upgrade all of the cluster server nodes, those nodes would continue to work as the earlier version with the underlying database updated to the current version.


Plan for system downtime before upgrading Remedy SSO

If you are using SAML authentication in your Remedy SSO environment, before you upgrade, decide whether you want to plan for the system downtime or not. Based on your plan, choose between these two options: 


To upgrade Remedy SSO in a HA environment

Note

The Remedy SSO Admin UI requires sticky session/Session Persistence in an HA environment. Usually, this is accomplished by enabling sticky session/Session Persistence on the load balancer. Different load balancers have different configurations to enable a sticky session/Session Persistence. Refer to the specific load balancer documentation or ask the vendor for details about the configuration.

Note that when sticky session/Session Persistence is not enabled for the Remedy SSO Admin UI, the admin user behind the firewall can use a specific Remedy SSO server hostname to access admin UI instead of using the load balancer URL.

You need to perform the following tasks to upgrade Remedy SSO using the wizard-based Remedy installer in the high-availability mode:

  1. Ensure that Remedy SSO is upgraded successfully on the primary node as outlined in upgrading Remedy SSO.
  2. Unzip the Remedy SSO files on the additional node.
  3. Upgrade Remedy SSO on the additional node.
  4. Complete the rest of the upgrade steps.
  5. (Optional) Re-configure SAML authentication.

To reconfigure the SAML authentication settings

For each realm that is configured for SAML authentication, perform the following steps:

  1. Edit the realm to enter PEM encoded IdP signing certificate data in the IdP Signing Certificate field or import the IdP metadata again. Ensure that the other SAML configuration is same as before except the IdP Signing Certificate field data.
  2. Save the details.

Failed to execute the [excerpt-include] macro.

Postupgrade tasks

If you had modified the web.xml file during the upgrade, ensure that you reapply the changes after the upgrade.

Failed to execute the [excerpt-include] macro.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*