.. meta::
:description: Installing the browser-based user interface and web service for Micetro on Windows and further configurations
:keywords: browser, web application, web service, Micetro, Microsoft IIS, Windows
.. _install-webapp-windows:
Installing the Micetro Web Application on Windows
=================================================
.. note::
On Windows, the Micetro Web Application requires Microsoft Internet Information Services (IIS) to be installed. The installer will verify the presence of all required components.
To install the Micetro Web Application, double-click on the Microsoft installer file and follow the instructions on the screen.
.. warning::
If the Micetro Web Application is installed on a different server than Micetro Central, you'll need to configure the :guilabel:`Web app server host` to the hostname of the webserver. This setting can be adjusted in the System Settings on the **Admin** page. Check :menuselection:`System Settings --> Advanced` to make sure that the auto-update feature for the Web Application works correctly.
Setting up SSL for the Web Application
--------------------------------------
To set up a secure sockets layer (SSL) for the Web Application, follow these instructions.
.. note::
Make sure that certificates include a Subject Alternative Name (SAN) so that web browsers mark the site as secure.
Configuring SSL certificate
^^^^^^^^^^^^^^^^^^^^^^^^^^^
1. Open the IIS Manager.
2. Select the :guilabel:`Web Server node` in the left sidebar, under **Start Page**, and double-click :guilabel:`Server Certificates` in the middle pane.
.. image:: ../../images/iis-ssl-step1.png
:width: 90%
3. In the **Actions** pane, select an action to import an existing .pfx SSL certificate or to create a self-signed certificate. If your certificate is in a format other than .pfx, refer to the documentation or tools provided by your certificate authority to convert certificates to .pfx format.
4. Select your website under **Sites** in the left sidebar (usually Default Web Site), and then click :guilabel:`Bindings...` in the **Actions** pane on the right.
.. image:: ../../images/iis-ssl-step2.png
:width: 90%
5. In the **Site Bindings** dialog box, click :guilabel:`Add`, select **https** from the :guilabel:`Type` dropdown, and then select the certificate you added in Step 3 from the :guilabel:`SSL certificate` list. Click :guilabel:`OK`.
.. image:: ../../images/iis-ssl-step3.png
:width: 70%
* The :guilabel:`Host name` and :guilabel:`Require Server Name Indication` fields can be left empty if this the first certificate installed on the server.
Redirecting HTTP traffic to HTTPS
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1. Navigate to **URL Rewrite rules** and locate the grayed out **HTTP --> HTTPS** redirect rule.
2. Make sure it's postitioned at the top of the list, select it, and click :guilabel:`Enable` under **Actions** on the right side.
3. Restart the web server. This automatically redirects all HTTP queries to HTTPS.
Using the IIS Manager
"""""""""""""""""""""
With **Default Web Site** selected in the left sidebar, double-click :guilabel:`URL Rewrite` in the middle pane.
If there's already an **HTTP to HTTPS redirect** rule at the top of the list, no further action is needed.
**To add a new rule**:
1. Select :guilabel:`Add Rules` in the **Actions** pane on the right, then click :guilabel:`OK` to create an empty inbound rule.
2. In the :guilabel:`Name` field, enter **HTTP to HTTPS redirect**.
3. In the :guilabel:`Pattern` field, enter ``(.*)``.
4. Under **Conditions**, select :guilabel:`Add` and enter the required condition:
.. image:: ../../images/iis-ssl-step5.png
:width: 60%
5. In the **Actions** pane at the bottom, select **Redirect** from the :guilabel:`Action type` dropdown, set the redirect URL to ``https://{HTTP_HOST}/{R:1}`` and the redirect type to **Permanent (301)**.
.. image:: ../../images/iis-ssl-step6.png
:width: 70%
6. Select :guilabel:`Apply` in the **Actions** pane on the left, and then click :guilabel:`Back to rules`.
7. Move the new **HTTP to HTTPS redirect** rule to the top of the list using the :guilabel:`Move Up` button in the **Actions** pane on the right.
.. _webapp-fixed-central-windows:
Allowing the Web Application to log into other Micetro Central servers
----------------------------------------------------------------------
By default, the Micetro UI and API only allow connecting to a single Micetro Central server, determined during the first login to Micetro after installation.
To allow users to specify a custom Micetro Central server to connect to:
1. Edit the ``preferences.cfg`` file for the Micetro Web Services located at ``c:\\ProgramData\\Men and Mice\\Web Services\\preferences.cfg`` by adding the following line to define the default Micetro Central server name:
.. code-block::
.. note::
If ``DefaultCentralServer`` is not specified, the web service will use the first-specified Micetro Central server, typically ``localhost``.
2. Add the following XML-tag to lock the web service to use the default Micetro Central server:
.. code-block::
2. Restart the Micetro Web Services Windows service.
A :guilabel:`Server` field will appear on the Micetro login page and the ``serverName`` field in the API Login command will be honored.
.. _webserver-proxy-timeout-windows:
Increase timeout for webserver proxy
------------------------------------
To ensure that the Web Application operates efficiently with larger change request queues that take longer for Central to process, modify the ``/etc/httpd/conf`` file and increase the mmws proxy timeout value:
.. code-block::
ProxyTimeOut 60