Infoprotector

How to install OpenText Advanced Authentication - step by step

What is OpenText Advanced Authentication?

OpenText Advanced Authentication is a multi-factor authentication (MFA) solution that helps increase the security of access to systems, applications, and workstations. It allows an organization to introduce an additional authentication factor and better protect users against unauthorized access.

The solution can be used wherever the following are important:

  • secure login to systems,
  • protection of user accounts,
  • deployment of MFA in a corporate environment,
  • increasing the level of access security.

In practice, it is a platform that can be an important part of a modern identity and security environment.

What does the video show?

In the video, we present the installation process of OpenText Advanced Authentication in a test environment. The demonstration uses an environment based on VirtualBox, but the deployment method itself follows the same logic that we will also encounter in more typical corporate environments, such as VMware or other virtualization platforms.

The material shows that the vendor provides a ready-made system image in the form of an appliance, meaning a preconfigured environment with preinstalled software and the SUSE Enterprise operating system. Thanks to this, the installation does not involve manually building everything from scratch, but rather launching a ready-made solution and going through the basic configuration.

Installing OpenText Advanced Authentication – step by step

  1. Launching the ready-made appliance
    The entire process begins with launching the system image provided by the vendor. In the video, a test environment on VirtualBox is used, but the material clearly indicates that in organizations, deployments of this kind are most often carried out on platforms such as VMware or other popular virtualization solutions.

This is important because it shows the nature of the installation – we are not building the environment manually from scratch, but using a ready-made appliance prepared by the vendor.

  1. Initial system preparation and disk space setup
    After the image is launched, the system goes through the initial preparation stage. The video shows that this includes, among other things, disk space preparation and the initial startup of the environment.

This is a natural part of appliance deployment – the system must prepare the necessary resources before we move on to configuring administrative and network settings.

  1. Starting the actual network configuration
    Once the first stage is complete, the system moves on to the actual configuration. One of the key moments is preparing the network parameters, because these will later enable access to the platform through a web browser.

At this stage, it is important to correctly define the environment in which the system will operate. In practice, this means preparing a configuration that will later allow access to the administrative panel via the hostname or IP address.

  1. Setting the root password and administrative account
    In the next part of the process, the basic administrative accounts are defined. The video shows two important elements:
  • setting the password for the root account,
  • configuring the vadmin user.

This is an important distinction. The root account is responsible for full administrative access to the system, while the vadmin account is used to perform selected administrative tasks without the need to use full root privileges.

  1. The role of the vadmin account
    The video emphasizes that the vadmin account has practical importance in day-to-day system administration. It can be used for, among other things:
  • performing updates,
  • enabling and disabling certain services,
  • carrying out selected administrative tasks without full system access.

This is a good approach from the perspective of security and administrative order, because not every operation has to be performed from the root account.

  1. Setting the hostname
    The next stage is configuring the hostname. This is an important element, because the hostname will later be used to identify the system on the network and may serve as one of the methods of accessing the administrative panel.

The material includes an example hostname used in the test environment. The step itself is simple, but it has significant practical importance for the later organization of the environment.

  1. Saving the settings and final system configuration
    After entering the most important parameters, the system begins saving the settings and moves on to the final configuration. The video clearly states that this stage may take some time – from a few minutes up to a dozen or so minutes, depending on the performance of the environment.

This is a standard part of the deployment, during which the appliance completes the preparation of all the necessary elements for further work.

  1. Hardware requirements for the installed version
    The material also includes important information about resource requirements. For the installed version 6.5, the vendor recommends:
  • at least 8 CPU cores,
  • at least 12 GB of RAM.

This is a valuable point, because it shows that even if installation in a test environment is possible, it is worth taking the vendor’s actual requirements into account from the very beginning when planning a production environment.

  1. Going to the administrative panel
    Once the installation is complete, the system is ready for further configuration through a web browser. The video shows that the administrative panel can be accessed:
  • via the previously configured hostname,
  • or directly via the IP address.

It is in the administrative panel that the further configuration of the OpenText Advanced Authentication solution continues.

Why is this installation model convenient?

Installation in the form of an appliance significantly simplifies deployment. Instead of preparing the operating system separately, manually installing components, and building the environment from scratch, the administrator receives a ready-made image prepared by the vendor.

The main benefits of this approach are:

  • faster system startup,
  • lower risk of errors during installation,
  • a consistent environment prepared in line with the vendor’s assumptions,
  • an easier start with the solution,
  • more convenient testing and deployment in virtual environments.

This is especially important when an organization wants to move quickly from the testing stage to further configuration and MFA deployment.

What should you pay attention to during installation?

Although the installation itself is not complicated, it is worth remembering a few practical points:

  • prepare the virtual environment well before launching the appliance,
  • verify the vendor’s hardware requirements,
  • correctly configure the network parameters,
  • ensure strong passwords for administrative accounts,
  • remember that after installation is complete, further configuration through the web panel will still be required.

This makes the entire process smoother from the very beginning and helps avoid unnecessary problems.

Summary

The video shows that installing OpenText Advanced Authentication can be a clear and structured process. The administrator launches the appliance provided by the vendor, goes through the basic system configuration, sets the administrative accounts, hostname, and environment parameters, and then completes the deployment at the stage of a ready-to-use administrative panel.

This is a good starting point for organizations that want to deploy MFA and begin working with OpenText Advanced Authentication in practice.

Training 2:
How to add a fingerprint reader as a second factor for Windows login in OpenText Advanced Authentication