Skip to content

Commit c82b927

Browse files
documentation update
1 parent 339d5a0 commit c82b927

1 file changed

Lines changed: 59 additions & 1 deletion

File tree

ReadMe.md

Lines changed: 59 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -416,7 +416,65 @@ Congratulations! Your **Group Policy Deployment** is ready for action!
416416

417417
* **InstallAgent Deployment Package 6.xx**
418418
* **N-Able N-central 2020.1 HF5 and Above**
419-
For setup and configuration help, consult the appropriate SolarWinds MSP N-Central Documentation for **Importing a Custom Service.**
419+
For setup and configuration help, consult the appropriate N-Able N-Central Documentation for **Importing a Custom Service.**
420+
421+
## 1b - Setup AMP based PartnerConfiguration update amps
422+
To mange Customer agent install tokens automatically without setting the expiration, deploy the AMP to your N-Central server then:
423+
* Create a security role for the automation account, lease privelege requires:
424+
* Devices -> Network Devices -> Edit Device Settings \[Read Only\]
425+
* Devices -> Network Devices -> Registration Tokens \[Manage\]
426+
* Create an automation account with no MFA and note the Username, Password and JWT
427+
* Create a N-Central task against a server, preferably an internal server with the most direct line of sight to the N-Central server
428+
* Fill out the input parameters for the AMP
429+
430+
| Parameter | Value |
431+
| ----- | ----- |
432+
| Username | username of the automation account |
433+
| Password | password of the automation account |
434+
| N-Central FQDN | address of the N-Central server. eg. `n-central.mymsp.com`
435+
| Expiration Tolerance | Days prior to the token expiration to force a update on the token (positive value)
436+
| JWT | JWT of the automation account |
437+
438+
## 1c - Setup AMP based PartnerConfiguration update amps
439+
Of the two AMP based tools provided, deploy the ones that most suits your unique business/customer/security situation. As needed you can create and deploy your own custom module to override default Install Methods. To install these AMPS consult the appropriate N-Able N-Central Documentation for **Importing a Custom Service.**
440+
441+
### Update PartnerConfig from CP
442+
Before deploying this AMP you will need to:
443+
* Create your own Custom Properties for Customers/Properties
444+
* Create a custom script that re-injects the CustomerID/Token into Customers/Properties (see [NC-API-Documentation](https://github.com/AngryProgrammerInside/NC-API-Documentation/) example)
445+
446+
Once done point the AMP at your applicable domain controller(s) and populate the following fields that will be injected into the PartnerConfig.xml:
447+
| Name | Default | Value |
448+
| -----| ----- | ----- |
449+
| Registration Token| *null* | Custom Property |
450+
| Customer ID | *null* | Custom Property |
451+
| Local Folder | *C:\Windows\SecurityThroughObscurity* | You can set the default to a unique location within the AMP, this is where the History.XML gets saves
452+
| Network Folder | Agent | You can set this the name of your own Network folder, this is the name of the folder under Netlogon |
453+
| SO Agent File Name | WindowsAgentSetup.exe | Name of the current Agent setup executable.|
454+
| SO Agent Version | 2020.1.5.425 | Friendly version number |
455+
| SO Agent File | 2020.1.50425.0 | Internal file version number |
456+
| Branding | *My MSP @ MSP.com * | Informational detail display in Application log |
457+
| AzNableProxuUri | *null* | Uri of your AzNableProxy |
458+
| AzNableAuthCode | *null* | Auth key code for you GET function
459+
460+
Once verified working as intended you can place this on a schedule if required.
461+
462+
### Update PartnerConfig from JWT
463+
This AMP only requires the JWT and will automatically discover the CustomerId and Token through the N-Central API. Create an PowerShell automation account for your account with the following role permissions for **Devices -> Network Devices --> Registration Tokens \[Manage\]**
464+
465+
Once done point the AMP at your applicable domain controller(s) and populate the following fields:
466+
| Name | Default | Value |
467+
| -----| ----- | ----- |
468+
| Local Folder | *C:\Windows\SecurityThroughObscurity* | You can set the default to a unique location within the AMP, this is where the History.XML gets saves
469+
| Network Folder | Agent | You can set this the name of your own Network folder, this is the name of the folder under Netlogon |
470+
| SO Agent File Name | WindowsAgentSetup.exe | Name of the current Agent setup executable.|
471+
| SO Agent Version | 2020.1.5.425 | Friendly version number |
472+
| SO Agent File | 2020.1.50425.0 | Internal file version number |
473+
| Branding | *My MSP @ MSP . com* | Informational detail display in Application log |
474+
| AzNableProxuUri | *null* | Uri of your AzNableProxy |
475+
| AzNableAuthCode | *null* | Auth key code for you GET function
476+
477+
Once verified working as intended you can place this on a schedule.
420478

421479
## 2 - Review Deployment Package Results
422480

0 commit comments

Comments
 (0)