Advanced Configuration: This Section Provides Details About Advanced Configuration Techniques For Configuring Blue Prism
Advanced Configuration: This Section Provides Details About Advanced Configuration Techniques For Configuring Blue Prism
Advanced configuration
This section provides details about advanced configuration techniques for configuring Blue Prism:
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
1
o test PDF Combine only
3
DNS resolution
Blue Prism installations communicate with each other using their respective machine names – it is therefore necessary to
ensure that these can be resolved successfully, and that firewall rules allow appropriate communication on the defined
ports.
It may be necessary to set up DNS servers, Windows DNS search suffixes or local Host files to support this.
Enterprise organizations often use formal DNS management utilities, however for tactical or experimental configurations it
may be appropriate to use local host files to manipulate DNS.
1. Open the host file on the local machine using a text editor such as Notepad – administrator level access is required.
C:\Windows\System32\drivers\etc\hosts
2. Enter the IP addresses and host names that are relevant to the deployment.
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
3
o test PDF Combine only
4
Information about obtaining the appropriate installers can be provided to the Blue Prism Support team by your Account
Manager.
Blue Prism uses Java Access Bridge to access a series of specialized techniques for interfacing with applications written
in the Java Programming Language.
For further information about the Java Access Bridge and Blue Prism, see Java Access Bridge (JAB).
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
4
o test PDF Combine only
7
Advanced installation
Select which optional components to install:
Outlook Automation – Installs the DLL required to use the Blue Prism Outlook Email VBO. Requires 952KB on
your hard drive.
Google Sheets Automation – Installs the APIs required to use the Blue Prism Google Sheets VBO. Requires
408KB on your hard drive.
Chrome Browser Extension – Applies the registry setting that instructs Chrome to add the Blue Prism browser
extension, required if interacting with Chrome from Blue Prism. Requires 1KB on your hard drive.
Firefox Browser Extension – Applies the registry setting that instructs Firefox to add the Blue Prism browser
extension. Requires 196KB on your hard drive.
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
7
o test PDF Combine only
9
Configure the database connection
Once Blue Prism is installed, the Blue Prism database connection can be configured.
For SQL native authentication mode, use:
Automate.exe /dbconname "Friendly name" /setdbname "DB Name" /setdbserver "DB Server" /setdbusername "DB
User" /setdbpassword "********"
Configuring a database for an environment to be secured using Single Sign-on for Blue
Prism
The current user must belong to the AD Group specified as the /setadmingroup.
The configuration of additional Blue Prism security roles including associating with Active Directory Security Groups
must be completed via the User Interface.
Do not use this method to create a server for an existing environment as the encryption scheme must match existing
schemes.
Import processes
If there are business objects or processes to be imported the XML files can be imported individually using the
command(s):
AutomateC.exe /import "C:\My Process.xml" /user admin admin
The user credentials supplied here (username "admin" and password "admin") are the sample options for native
authentication; these have not yet been changed but will be changed later. Where Active Directory authentication is
being used, the option "/user admin admin" should be replaced with "/sso"; this assumes that the Active Directory
groups have already been configured.
Publishing processes
9
o test PDF Combine only
11
WCF mode using message encryption with a server binding specified on the server profile
WCF mode using transport encryption with no server binding specified on the server profile
WCF mode using transport encryption with a server binding specified on the server profile
For example:
netsh http add sslcert ipport=10.0.2.15:8199 certhash=bac31cc4094793d275167cf02b31bbac2718f3c7 appid=
{00112233-4455-6677-8899-AABBCCDDEEFF}
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
11
o test PDF Combine only
12
Login Agent
When executing an automated process on a Blue Prism runtime resource, it is necessary for the runtime resource to be
running on a device which is logged in and not locked. This allows the process to operate under the context of that user
and provides access to all of the local applications and network resources it may need.
Blue Prism Login Agent provides a mechanism for automating the log in process for a Windows machine so that a Blue
Prism runtime resource can be started. This includes:
Configuring the Login Agent service with appropriate information to launch a Login Agent runtime resource.
A Login Agent runtime resource being started automatically when a device is powered on (or rebooted) that
connects to the appropriate Blue Prism environment.
The Login Agent runtime resource being instructed to log in manually or via a schedule.
The Login Agent securely retrieving the appropriate credential from the database and using this to authenticate with
Windows.
The diagram below shows the flow of events that occur to take a device from being powered on to being logged in and
able to receive process automation instructions.
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
12
o test PDF Combine only
13
13
o test PDF Combine only
14
Security policies
It is common for security policies to have been configured that apply each time a
device is logged onto the network. Login Agent is used to automatically log
devices, that host runtime resources, onto the network. If security policies that
require human intervention are applied to these devices, this can prevent Login
Agent from working. Therefore, it is necessary for these policies to be disabled
on the devices or policy needs to be applied that allows them to be
programmatically traversed.
For devices on which there are no policies that require human intervention
Login Agent can automatically login without having to enable and
configure the SAS service.
For devices on which there are policies that require human intervention,
the SAS service can be used to programmatically send Ctrl + Alt + Del
and, whilst not a recommended approach, it also provides unsupported
functionality that can attempt to temporarily disable some policies.
The SAS service must run with by a local system or local admin account.
14
o test PDF Combine only
15
Recommended Policy setting
Apply Local Security Policy that Local Group Policy > Administrative
enables a software SAS to be Templates > Windows Components >
submitted on all runtime resources. Windows Logon Options >
Disable or enable software Secure
Configure the Blue Prism automated
Attention Service
process to request the SAS service to
programmatically send the SAS as Value: Enabled for either Services or
part of the Login operation. Services and Ease of Access
applications.
Login Agent install options
15
o test PDF Combine only
16
If you have any feedback about this topic or any other aspect of the help,
please contact us at [email protected].
16
o test PDF Combine only
17
Location of installer Contained within the Installers directory of the install location of Blue Prism.
Supported Blue Prism The version of Blue Prism that the installer was provided with.
versions
Supported Operating Same as the version of Blue Prism that the installer was provided with.
Systems
Prerequisites An appropriate version of Blue Prism must be installed and configured prior to installing
Login Agent.
When installing onto a virtual device, the host virtualization technology must support third-
party credential providers
Distributable files
There are two installers available for each version of Login Agent:
LoginAgent_x86.msi
LoginAgent_x64.msi
Prerequisites
Login Agent should only be installed on a device where Blue Prism has been installed and at least one Blue Prism
connection has been configured.
When installing on virtualized devices, it is necessary for the virtualization host technology to support third-party
credential providers.
Login Agent must be used with the version of the VBO that is provided within the associated Blue Prism release file.
17
o test PDF Combine only
19
Apply the required true/false values as required – the setting names and values are not case sensitive.
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
19
o test PDF Combine only
20
Location of installer Contained within the Installers directory of the install location of Blue Prism.
Supported Blue Prism The version of Blue Prism that the installer was provided with.
versions
Supported Operating Same as the version of Blue Prism that the installer was provided with.
Systems
Prerequisites An appropriate version of Blue Prism must be installed and configured prior to installing
Login Agent.
When installing onto a virtual device, the host virtualization technology must support third-
party credential providers
Distributable files
There are two installers available for each version of Login Agent:
LoginAgent_x86.msi
LoginAgent_x64.msi
Prerequisites
Login Agent should only be installed on a device where Blue Prism has been installed and at least one Blue Prism
connection has been configured.
When installing on virtualized devices, it is necessary for the virtualization host technology to support third-party
credential providers.
Login Agent must be used with the version of the VBO that is provided within the associated Blue Prism release file.
20
o test PDF Combine only
22
Apply the required true/false values as required – the setting names and values are not case sensitive.
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
22
o test PDF Combine only
23
Updating the Blue Prism connection that the Login Agent runtime resource will use
Updating the port number that Login Agent runtime resource will listen on
Configuring the Login Agent runtime resource to apply certificate-based encryption
Adding custom parameters to be included in the start-up process of the Login Agent runtime resource
<argument name="port">
<value>8181</value>
</argument>
<argument name="dbconname">
</argument>
If no connection is specified in the configuration file, the first connection specified in the Blue Prism client connection list on
the local device will be used.
23
o test PDF Combine only
24
<argument name="port">
<value>8181</value>
</argument>
<argument name="dbconname">
</argument>
</argument>
<argument name="sslcert">
<value>[Certificate Thumbprint]</value>
</argument>
For example:
<argument name="dbconname">
</argument>
<argument name="sslcert">
<value>fee449ee0e3965a5246f000e89fde2a065fd89d4</value>
</argument>
Certificate-based encryption is only applied to the traffic received on the listening port. Encryption is applied separately to
the connection that retrieves the credentials that will be used as part of the login process.
Certificate-based encryption should only be applied to Login Agent runtime resources once the certificate has been
applied and tested with a Blue Prism runtime resource
24
o test PDF Combine only
25
<value>[username]</value>
<value>[password]</value>
</argument>
Blue Prism environments configured for Single Sign-on – Start-up parameters will need to include /sso to pass the context
of the currently logged in user.
<argument name="sso" />
Login Agent starts under the logon context of the Login Agent windows service.
When using single sign-on, the Login Agent service will need to be configured to start with a service account that has
appropriate access to Blue Prism.
<value>Password$123</value>
</argument>
25
o test PDF Combine only
26
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
26
o test PDF Combine only
27
Common Issues
Common issues when trying to work with Login Agent include:
When appropriately configured, the Login Agent runtime resource is started whenever the machine is in a pre-logged in
state, and remains active until the device has been logged on and a conventional Blue Prism runtime resource has been
started. The Login Agent runtime resource is automatically shut-down by the start-up of a Blue Prism runtime resource.
LogFileDir – specifies the location where the log file will be generated.
LogLevel – specifies the granularity of logs. 0: Disabled (default); 1: Error messages; 2: Debug messages; 4: Trace
messages. For a combination of levels, the values can be added together. E.g. a value of 7 will provide error
messages, debug messages and trace messages.
Configure the runtime resource to authenticate against the environment when it starts up.
27
o test PDF Combine only
28
See the Advanced Installation section for information on configuring Login Agent runtime resources to authenticate
against Blue Prism.
Re-configure the environment to allow Anonymous Public runtime resources (not recommended)
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
28
o test PDF Combine only
29
Example processes
A number of example Blue Prism processes are provided within the release package:
Change Password – Resets the password for the currently logged on user and overwrites the password associated
with the credential record. Provides support for configuring the complexity of the password that will be generated.
Intended for Login Agent runtime resource? No – process terminates immediately
Intended for Blue Prism runtime resource? Yes
Check Logged In – Checks the current logged in state of the device where the runtime resource is running.
Intended for Login Agent runtime resource? Yes
Intended for Blue Prism runtime resource? Yes
Login – Instructs a Login Agent runtime resource to retrieve a credential (based on a default static naming format)
and execute a login. Supports both local account and network account logins.
Intended for Login Agent runtime resource? Yes
Intended for Blue Prism runtime resource? No
Logout – Instructs a Blue Prism runtime resource to close all programs in the user session and log out of Windows.
An optional delay can be passed in as the parameter 'Delay' which will hold off from logging out for the time
specified. The process will still complete immediately, and the session will logout after the delay has passed.
Intended for Login Agent runtime resource? No
Intended for Blue Prism runtime resource? Yes
Specifying a Delay of 1 second (or greater) can help when troubleshooting.
29
o test PDF Combine only
30
Example actions
A business object, leveraged by the above processes, is provided that provides a set of example actions that can be used
to achieve common authentication actions with the operating system such as Log In, Is Logged In, Log Out, Change
Password, Lock Screen, Unlock Screen.
Information regarding the Login Agent VBO and its actions can be found in the API documentation under Help > API
Documentation.
When overwriting existing versions of the Login Agent VBO, it is necessary to re-verify any processes that use the
provided functionality.
If you have any feedback about this topic or any other aspect of the help, please contact us at
[email protected].
30