- Getting started
- System components and configuration
- BlackBerry AtHoc account requirements
- Installing BlackBerry AtHoc
- Upgrade BlackBerry AtHoc
- Postinstallation or upgrade configuration
- Set antivirus file exclusions for database log and tempDB files
- IIS postinstallation checklist
- Application pool configuration tables
- Table 1: Application pool configuration
- Table 2: Application Pool - Web application associations for the AtHoc website - Enterprise configuration
- Table 3: AtHoc services application pool configuration
- Table 4: Application pools - web application association for AtHoc services web site
- IIS handler mappings
- Verification checklist
- Application pool configuration tables
- (Optional) Enable and enforce the TLS 1.2 protocol
- (Optional) Configure the application server for Windows authentication
- (Optional) Configure client certificates on the application server
- (Optional) Set the SSL client certificate
- (Optional) Install certificates for cloud delivery services
- (Optional) Configure new access card formats for operator auto-login
- (Optional) Enable FIPS on each application server
- (Optional) Archive and MAS export service account requirements
- Configure .NET framework to use a web proxy
- (Optional) Restore the XML files for duplicated devices
- (Optional) Set up error pages for Self Service throttling
- (Optional) Set up error pages for Self Service throttling
- Advanced server configuration
- IIS 8.5 Security Technology Implementation Guide
- Server STIG
- IISW-SV-000103: Enable log file and Event Tracing windows
- IISW-SV-000107: Sufficient web server log records for location of web server events
- IISW-SV-000108: Sufficient web server log records for source of web server events
- IISW-SV-000110: Sufficient web server log records to establish the outcome of web server events
- IISW-SV-000111: Sufficient web server log records to establish identity
- IISW-SV-000112: Web server must use Event Tracing for Windows logging option
- IISW-SV-000120: Samples, examples, and tutuorials must be removed from production server
- IISW-SV-000124: Web server must have MIMEs that invoke OS shell programs disabled
- IISW-SV-000146: Web server must not impede ability to write log record content to an audit log
- IISW-SV-000153: Web server must maintain the confidentiality of controlled information during transmission
- IISW-SV-000154: Web server must maintain the confidentiality of controlled information during transmission
- Application STIG
- IISW-SI-000206: Enable log file and Event Tracing windows
- IISW-SI-000209: Sufficient website log records to establish identity
- IISW-SI-000210: Sufficient website log records to establish identity
- IISW-SI-000211: Website must use Event Tracing for Windows logging option
- IISW-SI-000214: Website must have MIMEs that invoke OS shell programs disabled
- IISW-SI-000228: Non-ASCII characters in URLs must be prohibited
- Server STIG
- Verifying BlackBerry AtHoc is operational
- Appendix A: Troubleshooting
- Appendix B: Organization duplicator object management
- BlackBerry AtHoc Customer Support Portal
- Legal notice
Plan the enterprise hierarchy
Plan your hierarchy before you use the tool. After you save your changes you cannot change the hierarchy.
The Enterprise Migrator tool displays the organizations currently in your
BlackBerry AtHoc
system. By default, new organizations that are created in the system are listed under the System Setup node. These are standalone enterprise organizations. They can be used as either an enterprise organization or moved under an enterprise to become a suborganization.In an
AtHoc
enterprise, there are three levels:- The top level is System Setup. The System Administrator role manages the system by logging into the System Setup organization. User attributes and alert folders can be created here, which all organizations in the system inherit.
- The next level is Enterprise. There can be multiple enterprise organizations associated with System Setup. The enterprise administrator manages the enterprise organization and suborganizations. The administrator can create enterprise-level attributes and folders for the enterprise organization that is inherited by its children.
- The third level is suborganization (or member organization). Each enterprise organization can have a unlimited number of suborganizations. The organization administrator manages the local organization only. The administrator can create organization-level attributes and folders for the local organization. A suborganization has peers, but no children.
Using the migration tool, you will choose one organization that acts as the Enterprise organization, and the rest that are members (suborganization). System Setup is the default and top-level organization. An enterprise organization inherits from System Setup and a suborganization inherits from the enterprise organization.
- Typically, content is managed at the Enterprise level because it provides one place to control the content and send alerts to all users in suborganizations. The suborganization level contains content specific to a subset of the Enterprise, customized for a particular organization.
- The Enterprise Migrator tool migrates existing operators that have an Enterprise Administrator role in a suborganization to Organization Administrator. Other operator permissions remain unchanged.
- When you move an organization into the Enterprise, the connect relationships and user accounts remain unchanged for the organization.
Enterprise hierarchy uses inheritance for user attributes and alert folders. Content created at the system level can be seen by Enterprise and suborganizations, but not edited. Content created at the suborganization level cannot be seen at the Enterprise or system levels.