ICC --action Reconfigure reference
Name
Reconfigure an existing instance:
ICC --action Reconfigure
The --help parameter can show more information about the command:
ICC --action Reconfigure --help
Synopsis
Print out a short help for the command:
ICC [-a|--action] Reconfigure [-h|--help]
Change user's password:
ICC [-a|--action] Reconfigure [-n|--name] "<INSTANCE_NAME>" [-c|--change-user-password] [-u|--username] "<USER_NAME>" [-p|--password] "<PASSWORD>" [-f|--configuration-file] "<FILE_PATH>"
Change the instance's signing certificate using a certificate from the server's Windows Certificate store (Local Machine\Personal):
ICC [-a|--action] Reconfigure [-n|--name] "<INSTANCE_NAME>" [-s|--change-signing-certificate] [-t|--thumbprint] "<CERTIFICATE_THUMBPRINT>" [-f|--configuration-file] "<FILE_PATH>"
Change the instance's signing certificate using a certificate from Azure Key Vault:
ICC [-a|--action] Reconfigure [-n|--name] "<INSTANCE_NAME>" [-s|--change-signing-certificate] [--use-azure-key-vault] [--key-vault-mode] "<KEY_VAULT_MODE>" [--azure-tenant-id] "<AZURE_TENANT_ID>" [--application-client-id] "<APPLICATION_CLIENT_ID>" [--application-client-secret] "<APPLICATION_CLIENT_SECRET>" [--azure-key-vault-url] "<AZURE_KEY_VAULT_URL>" [--certificate-name] "<CERTIFICATE_NAME>" [--key-name] "<KEY_NAME>" [--base64-encoded-certificate] "<BASE64_ENCODED_CERTIFICATE>" [-f|--configuration-file] "<FILE_PATH>"
Deploy the Safewhere Admin:
ICC [-a|--action] Reconfigure [-n|--name] "<INSTANCE_NAME>" [-d|--deploy-safewhere-admin] [-f|--configuration-file] "<FILE_PATH>"
Enable the multi subnet failover:
ICC [-a|--action] Reconfigure [-n|--name] "<INSTANCE_NAME>" [-m|--enable-multi-subnet-failover] [-f|--configuration-file] "<FILE_PATH>"
Configure security settings for Identify and Safewhere Admin:
ICC [-a|--action] Reconfigure [-n|--name] "<INSTANCE_NAME>" [--configure-security-settings] "<TRUE_OR_FALSE>" [--identify-security-settings-xml-configuration] "<BASE64_ENCODED_XML_CONFIGURATION>" [--safewhere-admin-security-settings-xml-configuration] "<BASE64_ENCODED_XML_CONFIGURATION>" [-f|--configuration-file] "<FILE_PATH>"
Options
Common options:
-n|--name "<INSTANCE_NAME>"
- Specifies the name of an existing instance that you want to reconfigure.-f|--configuration-file "<FILE_PATH>"
- Specifies the path of the configuration file used for database connection. For more information about the configuration file, see Database connection configuration JSON schema
Change a user's password:
-c|--change-user-password
- Specifies the change user password action.-u|--username "<USER_NAME>"
- Specifies the user name of an existing user who you want to change password.-p|--password "<PASSWORD>"
- Specifies the new password.
Change the instance's signing certificate using a certificate from the server's certificate store (Local Machine\Personal):
-s|--change-signing-certificate
- Specifies the change signing certificate action.-t|--thumbprint "<CERTIFICATE_THUMBPRINT>"
- Specifies the thumbprint of a certificate in the server's certificate store (Local Machine\Personal).
Change the instance's signing certificate using a certificate from Azure Key Vault:
-s|--change-signing-certificate
- Specifies the change signing certificate action.--use-azure-key-vault
- Configure the signing certificate using a certificate from Azure Key Vault--key-vault-mode "<KEY_VAULT_MODE>"
- Specifies the following key vault modes: Certificate, Key.--azure-tenant-id "<AZURE_TENANT_ID>"
- Specifies the Azure Key Vault tenant ID.--application-client-id "<APPLICATION_CLIENT_ID>
- Specifies the application client ID.--application-client-secret "<APPLICATION_CLIENT_SECRET>
- Specifies the application client secret.--azure-key-vault-url "<AZURE_KEY_VAULT_URL>"
- Specifies the Azure Key Vault URL.--certificate-name "<CERTIFICATE_NAME>"
- Specifies the certificate name which will be used as the signing certificate. This parameter is required when the value of the Key Vault mode is Certificate.--key-name "<KEY_NAME>"
- Specifies the key name which will be used as the signing certificate. This parameter is required when the value of the Key Vault mode is Key.--base64-encoded-certificate "<BASE64_ENCODED_CERTIFICATE>"
- Specifies the base64-encoded certificate which will be used as the signing certificate. This parameter is required when the value of the Key Vault mode is Certificate.
Deploy the Safewhere Admin:
-d|--deploy-safewhere-admin
- Specifies the Deploy Safewhere Admin action.
Enable the multi subnet failover option:
-m|--enable-multi-subnet-failover
- Specifies the enable multi subnet failover action.
Note: This reconfigure option is not yet supported for the MariaDB database provider.
Configure security settings for Identify and Safewhere Admin:
--configure-security-settings "<TRUE_OR_FALSE>"
- The value(case-insensitive) is one of the following: True, False."True"
: allow you to customize security settings for XML configuration of Identify and Safewhere Admin. This parameter used in conjunction with--identify-security-settings-xml-configuration
and--safewhere-admin-security-settings-xml-configuration
."False"
: Specifies that you don't want to use security settings for XML configuration of Identify and Safewhere Admin.
--identify-security-settings-xml-configuration "<BASE64_ENCODED_XML_CONFIGURATION>"
- Specifies the value of<system.webServer>
XML block in Base64-encoded format. If you leave it empty, the default value will be used.--safewhere-admin-security-settings-xml-configuration "<BASE64_ENCODED_XML_CONFIGURATION>"
- Specifies the value of<system.webServer>
XML block in Base64-encoded format. If you leave it empty, the default value will be used.
Examples
Change a user's password:
ICC --action Reconfigure --name "identifyinstance" --change-user-password --username "admin" --password "OhCQd0GRD72LjMUw2pIh" --configuration-file "C:\identify-configuration\database_connection.json"
Change the instance's signing certificate using a certificate from the server's Windows Certificate store (Local Machine\Personal)
ICC --action Reconfigure --name "identifyinstance" --change-signing-certificate --thumbprint "3C1FD735A4035E3B78D33444DE5327C393AA282E" --configuration-file "C:\identify-configuration\database_connection.json"
Change the instance's signing certificate using a certificate from Azure Key Vault that uses the Certificate mode for the Key vault mode setting:
ICC --action Reconfigure --name "identifycli" --change-signing-certificate --use-azure-key-vault --key-vault-mode "Certificate" --azure-tenant-id "ea8f8esp-0476-50ca-88fd-l40cx0a1e345" --application-client-id "694c7ezx-2e2a-4d29-925q-0d84agg610a4" --application-client-secret "5I~T1n85a=FLQoTeax?Z=Rp3U[I5sB:." --azure-key-vault-url "https://safewherekeyvault.vault.azure.net/" --certificate-name "IdentifySigningCertificate" --configuration-file "C:\identify-configuration\database_connection.json"
Change the instance's signing certificate using a certificate from Azure Key Vault that uses the Key mode for the Key vault mode setting:
ICC --action Reconfigure --name "identifycli" --change-signing-certificate --use-azure-key-vault --key-vault-mode "Key" --azure-tenant-id "ea8f8esp-0476-50ca-88fd-l40cx0a1e345" --application-client-id "694c7ezx-2e2a-4d29-925q-0d84agg610a4" --application-client-secret "5I~T1n85a=FLQoTeax?Z=Rp3U[I5sB:." --azure-key-vault-url "https://safewherekeyvault.vault.azure.net/" --key-name "IdentifySigningCertificate" --base64-encoded-certificate "<BASE64_ENCODED_CERTIFICATE>" --configuration-file "C:\identify-configuration\database_connection.json"
Deploy a Safewhere Admin site for an existing instance:
ICC --action Reconfigure --name "identifyinstance" --deploy-safewhere-admin --configuration-file "C:\identify-configuration\database_connection.json"
Enable multi subnet failover:
ICC --action Reconfigure --name "identifyinstance" --enable-multi-subnet-failover --configuration-file "C:\identify-configuration\database_connection.json"
Configure security settings for Identify and Safewhere Admin:
ICC --action Reconfigure --configure-security-settings "<TRUE_OR_FALSE>" --name "identifyinstance" --identify-security-settings-xml-configuration "<BASE64_ENCODED_XML_CONFIGURATION>" --safewhere-admin-security-settings-xml-configuration "<BASE64_ENCODED_XML_CONFIGURATION>" --configuration-file "C:\identify-configuration\database_connection.json"
- For the
--identify-security-settings-xml-configuration
parameter, you can use the default value, Base64-encode it and replace<BASE64_ENCODED_XML_CONFIGURATION>
with the encoded value. - For the
--safewhere-admin-security-settings-xml-configuration
parameter, you can use the default value, Base64-encode it and replace<BASE64_ENCODED_XML_CONFIGURATION>
with the encoded value. - Use this tool to do BASE64 encode https://rcfed.com/Utilities/EncodeHash