These steps only apply to ArcGIS Enterprise environments. Users with ArcGIS Online environments do not need to provide connector information or AppID information when using Admin Tools. This is ONLY necessary for installs that DO NOT use Integrated Windows Authentication (IWA).
From the "My Content" tab, select "Add Item” → “An application".
Name the application "Admin Tools”.
Navigate to the "Settings" Tab of the new Admin Tools application.
In the "Application" Section, click the "Registered Info" button.
Data Source URL
In some cases, an application URL is required in the “Data Source” field (shown in the image above). This can be any URL, so add your own, or simply add https://geo-jobe.com into the input box.
The App ID is listed here (shown in image below). Providing this App ID will be necessary for the creation of your build.Next, click the "Update" button.
Add the full URL of where admin tools will be running from (HTTP and/or HTTPS).
Domain Example
Please add the organization’s actual domain that will be running from Admin Tools to this Redirect URI. Ensure that '/' is not included at the end of your domain as this could potentially cause Admin Tools to unsuccessfully connect to the Redirect URI.
Finally, select the "Update" button to save your changes.
Conclusion
You should now have the OAuth App ID and Redirect URIs necessary to start the Admin Tools Installation.
Below, you can expand the dropdown and review the following options to run Admin Tools, Backup My Org or Clean My Org as HTTPS:
Export the certificate from IIS: a. Open the IIS Manager b. Click on the server name in the "Connections" pane (located left-hand side) c. In the middle pane, double-click on "Server Certificates" d. Select the certificate you want to export e. Click "Export" in the "Actions" pane (located on the right-hand side) f. Follow the wizard to export the certificate as a .pfx file (Note: remember the passphrase you specified to protect the cert) g. Export the PFX to your GEO Jobe product’s main folder (Note: if you don’t have an export option you may need to re-import the certificate to IIS with the allow export option)
Open the command prompt and navigate to the Admin Tools 2.0, BackupMyOrg, or CleanMyOrg directory and insert:
index pfx <INSERT PASSPHRASE HERE>
(for Admin Tools 2.0)
OR
backupmyorg pfx <INSERT PASSPHRASE HERE>
(for Backup My Org)
OR
cleanmyorg pfx <INSERT PASSPHRASE HERE>
(for Clean My Org)
(Note: This will save the passphrase as an encrypted string in the MongoDB database.)
In the product’s main application directory, locate the config/nodeconfig.json and make the following modifications in the JSON file:
(Note: If you are using an absolute path in your nodeconfig.json, be sure to use double backslashes, such as "C:\\BackupMyOrg\\Certificates\certificate.pem" or "C:\\CleanMyOrg\\Certificates\certificate.pem". Please also ensure that the name of your PFX file is added to the “pfx” property. An example shown above.)
Restart your Admin Tools 2.0, Backup My Org, or Clean My Org server app or service.
To convert an IIS certificate to a .key and .pem format for use in Admin Tools 2.0, Backup My Org or Clean My Org, you can follow these steps:
Export the certificate from IIS: a. Open the IIS Manager b. Click on the server name in the "Connections" pane (located left-hand side) c. In the middle pane, double-click on "Server Certificates" d. Select the certificate you want to export e. Click "Export" in the "Actions" pane (located on the right-hand side) f. Follow the wizard to export the certificate as a .pfx file (remember the password you specified to protect the cert) (Note: if you don’t have an export option you may need to re-import the certificate to IIS with the allow export option)
Convert the .pfx file to a .pem file using OpenSSL: a. Install OpenSSL on your computer if it is not already installed (Windows version can be found at: https://slproweb.com/products/Win32OpenSSL.html b. Copy the .pfx file to the OpenSSL /bin folder c. Open a command prompt or terminal window d. Navigate to the openSSL bin directory e. Run the following command (changing exported cert name as necessary):
This command will prompt you for the password you used to protect the .pfx file. Enter the password and press Enter. The command will create a .pem file in the same directory as the .pfx file.
Extract the private key from the .pem file using OpenSSL: a. Run the following command in the same directory where the .pem file is saved:
This command will extract the private key from the .pem file and save it as a separate .key file in the same directory.
Copy the .pem and .key to the application directory and configure config/nodeconfig.json a. Copy the new .pem and .key file to your application root directory b. Open <application directory>\config\nodeconfig.json c. Modify the settings as follows (changing names as necessary):
Restart the Admin Tools, Backup My Org, Clean My Org server and open the browser using HTTPS location.