Skip to main content

User Console

Axidian User Console (User Console) is a web application that runs on IIS. In User Console, the user can manage their authenticators.

How to open User Console
  • In the browser: http(s)://server dns/am/uc
  • In IIS: <machine name>\sites\Default Web Site\am\uc

Install User Console

System requirements

  1. To install User Console, start Axidian.UserConsole-version number.x64.ru-ru.msi located at Axidian version number\Axidian User Console\version number.

  2. When the installation is complete, you will be prompted to generate a new IDP certificate. This is an optional setting.

    info

    The certificate is required for authentication in User Console using Identity Provider. This certificate is not intended for establishing the SSL connection.

    If this certificate was generated earlier, disable the option.

    If this option is enabled, a new self-signed certificate is generated and installed in the Local MachinePersonal certificate store. The certificate is used to encrypt data transmitted between the authentication server and the client application.

HTTPS binding in IIS Manager

User Console is a web application that runs on the AIS database. During the installation process, SSL is required for User Console in the settings, which requires to enable HTTPS connection.

  1. In IIS Services Manager, in the left menu, navigate to Axidian AccesssitesDefault Web Site.
  2. In the Actions section of the right menu, click Bindings.
  3. Click Add and set the following parameters in the window that appears:
    • In the Type field, select https.
    • In the Port field, specify 443.
    • In the SSL Certificate field, select the Core Server certificate.
  4. Click OK to save the link.

If you do not plan to use the HTTPS protocol, disable the SSL requirement in the IIS settings for User Console.

Also, in C:\inetpub\wwwroot\am\uc\Web.config, change the value of the requireSSL parameter to false as follows:

<httpCookies httpOnlyCookies="true" requireSSL="false" />

Confirgure authentication

You can set different authentication methods to log in to User Console.

Authentication using Windows Authentication

By default, User Console is configured to use SAML authentication. If necessary, you can configure transparent Windows authentication as follows:

  1. Run the editor with administrator rights.
  2. Open the C:\inetpub\wwwroot\am\uc\Web.config configuration file.
  3. To specify the URL for connecting to Core Server, for the Url parameter in the amAuthServer tag set the value, such as http(s)://full_dns_name of the server/am/core/.
<amAuthServer Url="https://amserv.axidian-id.local/am/core/"/>
Note

To ignore server certificate errors, in the am\uc\Config\ApplicationSettings.config file, change the isIgnoreCertErrors parameter to true.

  1. Start IIS Manager, select Default Web Siteam and open the uc application.
  2. Open Authentication and enable the following methods:
    • ASP.NET
    • Windows Authentication
  3. Disable all other methods.
  4. Open C:\inetpub\wwwroot\am\uc\Web.config\Web.config for editing.
  5. For the amAuthentication tag, in the mode parameter, specify Windows. Optionally, you can add the enableLogout="true parameter to configure the ability to log out of the User Console.
Note

Leave the loginUrl parameter unchanged. When using Windows authentication, this parameter is not taken into account.

<amAuthentication mode="Windows" loginUrl="" identityProviderCertificateThumbprint="" serviceProviderCertificateThumbprint="" enableLogout="true"/>
  1. Save the changes and restart the IIS server.

The User Console will be available at: http(s)://full_dns_name of the server/am/uc/.

Enable brute-force protection

In Axidian Access, you can configure account selection protection for the User Console component.

If this setting is enabled, then when you enter a non-existent username, Axidian Access simulates the login of an existing user: displays authentication methods, asks for a password, and then displays the error Invalid username or authenticator, or the device is locked.

If this setting is disabled, then when a non-existent username is entered, Axidian Access displays the error Internal Server error: User not found.

This setting is disabled by default.

To enable brute-force protection, follow these steps:

  1. Open C:\inetpub\wwwroot\am\core\Web.config.
  2. In the appSettings parameter, in the Bruteforceprotectionapps line, specify the Self Service and Identity Provider values.
    <appSettings>
    ...
    <add key="bruteForceProtectionApps" value="Self Service, Identity Provider" />
    </appSettings>
  3. Save the changes and restart the IIS server.

Set the session lifetime

Information

This setting is optional.

To change the session lifetime in User Console, perform the following steps:

  1. Open C:\inetpub\wwwroot\am\uc\Config\ApplicationSettings.config.
  2. Set the required value for the sessionExpirationTimeInMinutes parameter. The default value is 30 (minutes).
    <amApplicationSettings isIgnoreCertErrors="false" sessionExpirationTimeInMinutes="30"/>
  3. Save the changes.

Display/hide version number in User Console

You can remove User Console headers with the information about the platform and version number, perform the following actions:

  1. Open C:\inetpub\wwwroot\am\uc\Web.config.
  2. Depending on the version of IIS:
    • For IIS 10: Remove comments from the following lines:
      <security>
      <requestFiltering removeServerHeader="true" />
      </security>
    • For IIS 10 and above, perform the following actions:
      • Set Rewrite URL.
      • Add the following lines to the <system.webServer> section:
        <rewrite>
        <outboundRules>
        <rule name="replace server header" patternSyntax="Wildcard" lockItem="false">
        <match serverVariable="RESPONSE_SERVER" pattern="*" />
        <action type="Rewrite" value="MyServer" />
        </rule>
        </outboundRules>
        </rewrite>

Disable localization changes

To prevent a user from changing the language in User Console:

  1. Open C:\inetpub\wwwroot\am\uc\Web.config.
  2. For the IsEnabled parameter of the amCulture tag, set the false value.
    <amCulture isEnabled="false" />
  3. Restart the IIS server.