Skip to main content

Data storage

For Axidian Access, you must create and configure the following databases:

  • For the Core Server component.
  • For the Log Server component.
  • If you plan to use the Axidian Key mobile application, you need a separate database for the Key Server component.

Also, you must create a service user that can perform requests for reading and writing information.

Axidian Access supports Microsoft SQL and PostgreSQL databases.

On the server with Microsoft SQL Server installed, create two databases: one for Core Server, the other one for Log Server. Also, create a service account.

Create a database

To create a database, perform the following actions:

  1. Open SQL Server Management Studio and connect to the server.

  2. Right-click the Databases node.

  3. In the window that opens, select New Database.

  4. Enter the name of the new database and click OK.

Create a service account

Axidian Access supports service accounts with Windows authentication mode and with SQL Server authentication mode.

Important

When creating a service account, disable mandatory password change at next login and password expiration. Otherwise, when the password expires, Axidian Access components will not be able to access the database, which will cause failures.

Create a service account with SQL Server authentication mode

To create a service account with SQL Server authentication mode, perform the following actions:

  1. Expand the Security node.

  2. Right-click the Logins node.

  3. In the window that appears, select New Login.

  4. In the Login - New window, perform the following actions:

    1. Enter the user name.
    2. Select the SQL Server authentication check box.
    3. Clear the Enforce password Policy check box.
    4. In the left menu, select User Mapping.
    5. Select the previously created databases.
    6. For each database, select the db_owner role and click OK.
  5. Enable mixed authentication:

    1. Right-click the SQL Server instance node and select Properties.
    2. On the Security page in the Server authentication section, select SQL Server and Windows Authentication mode.
  6. Verify that the service account has the following setting enabled:

    1. Right-click the created account and select Properties.
    2. On the Status page in the Login section, select Enabled.
  7. Open Sql Server Configuration Manager and enable the TCP/IP protocol:

    1. On the Native client SQL tab, select Client protocols.
    2. Right-click TCP/IP, select Properties and set the value to Yes to enable the TCP/IP protocol.
    3. Enable TCP/IP in all Native client SQL Client Configuration tabs.

Create a service account with Windows authentication mode

To create a service account with SQL Server authentication mode, perform the following actions:

  1. Create a domain account.

  2. Open SQL Server Management Studio and connect to the server.

  3. Expand the Security node.

  4. Right-click the Logins node.

  5. In the window that appears, select New Login.

  6. In the Login - New window, perform the following actions:

    1. Find the previously created user.

    2. In the left menu, select User Mapping.

    3. Select the previously created databases.

    4. For each database, select the db_owner role and click OK.

  7. In a text editor, open the configuration file of the component for which you are creating the database:

    1. The file for Core Server is located in C:\inetpub\wwwroot\am\core\Web.config.
    2. The file for Log Server component is located in C:\inetpub\wwwroot\ls\targetConfigs\sampleDb.config.
  8. In the connectionString tag, specify the value Integrated Security=SSPI.

    Example for Core Server
    <mssqlDbContexts>
    <mssqlDbContext connectionString="Data Source=SERVER\SQLEXPRESS;Initial Catalog=am8;Integrated Security=SSPI" id="mssql" />
    </mssqlDbContexts>
    Example for Log Server
    <Settings>
    <ConnectionString>Data Source=SERVER\SQLEXPRESS;Initial Catalog=Log81;Integrated Security=SSPI</ConnectionString>
    </Settings>
  9. Save the configuration file.

Next, configure the application pools in Internet Information Services.

  1. Start IIS Manager.
  2. Click Application Pools and select:
    • Axidian.Core for Core Server.
    • Axidian.LS for Log Server.
  3. In the Actions section, select Advanced Settings.
  4. In the Advanced Settings window, find the Identity parameter and click the button on the right.
  5. In the Application Pool Identity window, select Custom account and click Set.
  6. Specify the service account with the domain and click OK.
  7. In the Actions section, restart the application pool for which the setting is configured, and open the application start page in IIS.
  8. Select the customizable Axidian server component in IIS.
    Information

    If the setting is configured for both Core and Log Server, perform these steps for each component.

  9. In the Management section, select Configuration Editor and open system.webServer/security/authentication/windowsAuthentication.
  10. For the useAppPoolCredentials parameter, set the value to True and in the Actions block, click Apply.
  11. Restart IIS.