Installation and Configuration

Installation

For detailed step-by-step instructions regarding installation, please see the relevant Installation Guide.

See the Migration Guide if installing from version 3.4 to version 4.

     Note: Please see your 1Integrate Release Notes for any pre-requisite software or requirements before proceeding with an installation.

1Integrate Installation guide link
Installation Guide
1Integrate Migration guide link
Migration
Guide

Prerequisites

Before installing 1Integrate it is important to check the Prerequisites. This includes Sizing a Server for 1Integrate or Configuring a Database Server for 1Integrate's repository.

Installing 1Integrate

This contains all the information on Installing 1Integrate, including Configuring System Properties, Deployment, and Upgrading an Installation.

Configuration

This section of the WebHelp largely covers the additional configuration options which can be performed during or after Installation, these fall into the following categories:

Users and Permissions

Configuring Users and Permissions is an important part of setting up your 1Integrate environment. Users will be restricted to certain functionality in the product, depending on the Permissions they have been assigned.

General Security Settings

There are a number of General Security settings to be considered for your installation to ensure it is as secure as required.

These settings include the ability to change Encrypted Data Store Parameter Settings, Hide Stack Trace Reporting and prevent risky Uploads and Zip Bombs.

Securing Web Traffic

Additional measures should be taken for Securing Web Traffic when configuring 1Integrate. Web traffic security can be improved by Configuring HTTPS, Enabling Cross Origin Resource Sharing and Securing 1Integrate using an SSL enabled reverse proxy.

Performance and Additional Configuration

Your 1Integrate installation can be customised to suit your needs and improve performance.

Office 365 Webhook Configuration allows you to fine tune reporting, increased memory can be allocated with the Heap Size Memory Allocation, default Logging Levels can include more detail in the log files, and the time can be adjusted for Repository Transaction Timeouts.

Messages to users can be added to the login screen with the Login Banner Configuration.