Standard Operating Procedures
The following are standard operating procedures for working with Xiid’s software stack. Please note that some of the Processes are shortened and abridged. For more complete installation instructions, please view Xiid’s Documentation Website.
Xiid RDP Agents
Adding a new RDP Agent
Process: To add a new RDP Agent, start by an Xiid RDP Agent in the Xiid Global Management Portal. After creating the new agent, download and install the RDP Agent executable on the remote machine. After the installation completes, copy the RDP Agent Code from the Xiid Global Management Portal and pasting it in the command prompt when it asks for the Config Code.
Gotchas: If the Active Directory Agent is not installed and running within your enterprise network, the RDP Agent will not show up in the Global Management Portal or the RDP Agents Tab of the Agent Management Portal (if the Active Directory Agent was installed after the RDP Agent). To fix this issue, restart the RDP Agent service on the remote machine, and the RDP Agent will be populated in both places.
Removing an RDP Agent
Process: To uninistall an Xiid RDP Agent from a machine, you can run the executable either from the Windows Add or Remove Programs menu or
directly from the installation folder, located by default under: C:\Program Files\Xiid.IM RDP Agent\unins000.exe
.
Gotchas: It is also recommended that you delete the RDP Agent object in the Global Management Portal when you uninstall completely from a machine.
Xiid Active Directory Agents
Adding a new AD Agent
Process: To add a new Active Directory Agent, start by creating an Agent object in the Xiid Global Management Portal. After creating the new agent there, download and install the Xiid Active Directory Agent executable on the server you wish to run the Agent on (see System Overview: Agents for more information and best practices), after the installation completes a command prompt will appear and ask for the Agent Config Code. Copy the Agent Code from the Xiid Global Management Portal and paste it in the command prompt. Last, the command prompt will ask for an SA (Super User/Administrator) username and a password for the Administrative account.
Gotchas: Check the Supported Browsers and ensure one is installed in order to access the Agent Management Portal, otherwise UI components in the browser may not properly render.
Uninstalling the AD Agent
Process: To uninstall the Xiid Agent from a machine, you can run the uninstall executable from either the Windows Add or Remove Programs
menu or directly from the installation folder, located by default under C:\Program Files\Xiid.IM Agent\unins000.exe
.
Gotchas: There may be a couple of artifacts left over after install that are recommended to clean up (particularly if you intend to
re-install on the same machine). Delete the Xiid Registry Editor entries under HKEY_LOCAL_MACHINE\SOFTWARE\Xiid Corporation
. Also delete
any leftover files/folders in C:\Program Files\Xiid.IM Agent
and in C:\ProgramData\xiid
.
Xiid Authenticators
Adding a new Authenticator
Process: Open the Xiid Agent Management Portal, click Add Authenticator on the Authenticators tab, fill in the information provided, including the IP Address of the LDAP service (which can be 127.0.0.1 if the Agent is running on the same server) and a set of credentials to query the LDAP Service (See System Overview: Authenticators for best practices).
Gotchas: Creating the Authenticator itself does not fully integrate LDAP communication into your Xiid Software environment. You must also add the Authenticators to your SSO Portal for use.
Removing an Authenticator
Process: Open the Xiid Agent Management Portal and navigate to the Authenticators tab. On the Authenticators page, locate the authenticator you want to remove, click the red X button and then confirm.
Gotchas: Authenticators are tied to SSO Portals. When you remove an Authenticator that is bound to a Portal, the Portal may no longer be able to communicate with the LDAP service and disallow authentication. When removing Authenticators, it is recommended that you first remove the Authenticator configuration from any SSO Portals and replace them with the new authenticator to persist SSO uptime.
Xiid Firewalls
Add a new Firewall
Process: Open the Xiid Agent Management Portal and navigate to the Firewalls tab. Click Add Firewall, select the type of Firewall rule to create, enter the IP address to allow/block, then enter any tags to associate or group the Firewall rule.
Gotchas: None
Remove a Firewall
Process: Open the Xiid Agent Management Portal, navigate to the Firewalls tab, find the firewall rule you would like to delete, and click the red X on the Firewall row.
Gotchas: None
XOTC Authenticator
Add XOTC Authentication
Process: Open the Xiid Agent Management Portal, navigate to the XOTC tab, and click the Add XOTC button.
Gotchas: XOTC Authenticators must be added to an SSO Portal in order to actually enforce the authentication mechanism.
Remove XOTC Authentication
Process: Open the Xiid Agent Management Portal, navigate to the XOTC tab, find the XOTC Authenticator row you would like to delete, and then click the red X next to it. It is recommended that you also first remove the XOTC Authenticator from any SSO Portals (see Gotchas below).
Gotchas: XOTC objects in the Agent Management Portal essentially store all of the information regarding registered XOTC Mobile Applications, so if you delete an XOTC object in the XOTC tab, it will also wipe all registered XOTC Mobile Application Security Profiles from all users associated with the XOTC object.
SSO Portals
Add a new SSO Portal
Process: Open the Xiid Agent Management Portal, navigate to the SSO Portals tab, and click Add SSO Portal button. Select any authenticators, firewalls, translators, and secondary authentication mechanisms you would like for the portal.
Gotchas: The id that you provide is built into the SSO Portal URL (i.e. https://exampleportal.us.xiid.im/{id}).
Remove an SSO Portal
Process: Open the Xiid Agent Management Portal, navigate to the SSO Portals tab, find the SSO Portal you would like to delete, and click the red X on the row associated with the SSO Portal.
Gotchas: None
Xiid Translators
Adding a new Translator
Process: From the Xiid Agent Management Portal, navigate to the Translators page. Then use the Add Translator button to create a new translator. Provide any tags you would like to group and associate the translator.
Gotchas: Translators are organized by Tags. Do not forget to add relevant tags to your Translators and to add those Translator Tags in any SSO Portals you would like the translators to apply to.
Removing a Translator
Process: In the Xiid Agent Management Portal, select the Translators tab, find the Translator you wish to delete, and click the red X button on the left of the Translator.
Gotchas: Check for any SSO Portals that use the Translator rule before deleting and ensure that the rule is no longer needed.
Xiid Applications
Adding an RDP Application
Process: Open the Xiid Agent Management Portal, navigate to the Applications tab, click the Choose button inside the RDP card, and click the Add Application button. Select the SSO Portal to add the RDP access to, select the RDP Agent (see RDP Agents), and fill out the remaining information.
Gotchas: If you leave the User field blank, the User who is signed into the SSO Portal is the username that will be used for RDP access. If you leave the IP Address field blank, the IP Address will be automatically provided (useful for dynamically allocated IP address remote machines).
Adding an RDP App (VDI) Application
Process: Open the Xiid Agent Management Portal, navigate to the Applications tab, click the Choose button inside the RDP App card, and click the Add Application button. Select hte SSO Portal to add the VDI access to, select the RDP Agent (see RDP Agents), and fill in the remaining fields. Provide the full path to the application on the remote machine that you would like to access and any command line arguments to provide to the application.
Gotchas: If you leave the User field blank, the User who is signed into the SSO Portal is the username that will be used for RDP access. If you leave the IP Address field blank, the IP Address will be automatically provided (useful for dynamically allocated IP address remote machines). For multiple command line parameters, enter them as they would be entered via commandline (typically with a space (’ ‘) delineation).
Adding a Google Workspace Application
Process: In the Xiid Agent Management Portal, go to the Applications tab, click the Choose button inside the GSuite card, and click the Add Application button. Fill in the information and select Google for the type. On the Parameters screen, enter the domain tied to your Google Workspace account and click the Create IdP Consumer button. After creating the consumer, the GSuite Configuration screen will pop up with the last steps to configure the Google Workspace integration. Follow the prompts to configure your Google Workspace Administrator settings and add the sign-in/sign-out hooks. On the last step, download the certificate and upload it to your Google Workspace account.
Gotchas: If you lose track of the GSuite Configuration screen, you can click the purple Question Mark (?) button to open the screen again.
Adding an Office 365 Application
Process: Open the Xiid Agent Management Portal, navigate to the Applications tab, click the Choose button inside the Office 365 card, and then click the Add Application button. Select the SSO Portal and fill in the rest of the fields. The Username and Password fields must be an administrator for Microsoft 365 account. Follow the remaining screens to adjust your Microsoft settings.
Gotchas: If you are having issues with the Microsoft administrator account, you may need to temporarily disable MFA on the account while going through the initial setup of the Application. Also, ensure that you have an appropriate Microsoft Subscription.
Adding a SAML2 Application
Process: Open the Xiid Agent Management Portal, navigate to the Applications tab, click the Choose button inside the SAML2.0 card, and click the Add Application button. Select an SSO Portal and fill out the rest of the fields. For the domain, enter the external domain name associated with the SAML Service Provider and for the Entry Point enter the URL of the entry point that initiates the SAML authentication flow.
Gotchas: The Entry Point field is not the Assert Consumer Service (/acs), the ACS should be provided within the SAML XML, as per pure SAML implementation. If you need help finding the Entry Point URL, most Service Providers that support Single Sign-On will specify this URL in their SAML or SSO documentation. It can sometimes be referred to as the Service Provider Login URL. The domain field may be Service-Provider-Specific, so check the SP documentation, particularly if the SP does not know your domain name.