Preparation for installation of Monitor ERP TimeCard
These actions should be performed by your IT department or your IT supplier. The actions require knowledge in Windows Server administration. If you have questions you can contact the Monitor Support Center by phone: +46 650 766 03 or by e-mail: support@monitorerp.com
You install Monitor ERP TimeCard on a separate server in DMZ which have Internet Information Server (IIS) installed. If the customer already has the Monitor ERP Web server installed on a server, then it is good to install the TimeCard on the same server. Certain parts of TimeCard should also be installed on the application server (the Monitor server) on the customer's internal network (LAN).
Monitor's tech support will perform the installation for the customer on the two servers. This in performed by remote access via the program Splashtop. The TimeCard is installed so the web sever responds on the address http://localhost:80, that is, standard TCP port 80 for HTTP. It is recommended, prior to actual startup, to change so the web server responds on the address https://localhost:443, that is, TCP port 443 for HTTPS. The customer's IT department or IT supplier is responsible for ensuring this is done. An SSL certificate should also be installed for this on the the server for TimeCard, if it has not already been installed. See the description below of the SSL certificate.
System recommendations
In our system recommendations for Monitor ERP you also find the system recommendations for Monitor ERP TimeCard. These can be found here:
https://www.monitorerp.com/support/system-recommendations/
If you have questions regarding hardware for the TimeCard, please contact the Monitor Support Center by phone: +46 650 766 03 or by e-mail: support@monitorerp.com.
SSL certificate
- Purchase an SSL certificate for the server where the TimeCard will be installed. This should be a certificate issued by a certification authority such as Verisign, Go Daddy, or Comodo. Certificates are either issued for the server's DNS name (e.g. "timecard.yourcompany.com") or for an entire domain (as a so-called wildcard certificate "*.yourcompany.com").
- When you have received the certificate file you should copy it to the server for the TimeCard.
Administrator account and user rights
An account with local administrator rights is required on the server where the installation is made. You can use the same account that runs the service for the application server (the Monitor server).
In Windows on the TimeCard's server, the user right Write will be configured for the account group IIS_IUSRS on the folder TimeCard. This should be configured in connection with the installation. Example of path (which may vary from installation to installation):
C:\inetpub\Timecard (Contains system files for the TimeCard).
Configuration of Internet Information Server (IIS)
On the server for the TimeCard you should configure IIS with multiple roles and functions. In the Windows Server Manager you add this in the map structure according to the table below.
Structure map | Add |
---|---|
Server Roles > Web Server (IIS) > Web Server > Common HTTP Features | Default Document, Directory Browsing, HTTP Errors, Static Content |
Server Roles > Web Server (IIS) > Web Server > Health and Diagnostics | HTTP Logging, Request Monitor, Tracing |
Server Roles > Web Server (IIS) > Web Server > Performance | Static Content Compression, Dynamic Content Compression |
Server Roles > Web Server (IIS) > Web Server > Security | Request Filtering |
Server Roles > Web Server (IIS) > Management Tools | Management Console |
Features | IIS Hostable Web Core |
TimeCard's URL/domain name and port
Domain name, URL, and TCP port (443 or 80) for the TimeCard's web server are decided by the customer's IT department.
Firewall configuration
Network's firewall
Protocol | Port | Direction | Function |
---|---|---|---|
TCP | 9922 | LAN → DMZ | Used for communication from the application server (Monitor server) to the server for TimeCard. |
TCP | 9922 | DMZ → LAN | Used for communication from the server for TimeCard to the application server. |
TCP | 443 | Internet → DMZ | Is used for encrypted communication (HTTPS) between end users and the TimeCard's web server. Used for communication with Adaptation Updater and Monitor's package manager. |
TCP | 80 | Internet → DMZ | Alternatives. Can be used for unencrypted communication (HTTP) between end users and the TimeCard's web server. However, it is not recommended to use unencrypted communication over the Internet. |
Windows firewall in the application server (the Monitor server)
Protocol | Port | Direction | Function |
---|---|---|---|
TCP | 9922 |
Inbound |
Used for communication from the server for TimeCard to the application server. |
TCP | 9922 | Outbound | Used for communication from the application server to the server for TimeCard. |
TCP | 443 |
Inbound, Outbound |
Used for communication with Adaptation Updater and Monitor's package manager. |
Windows firewall in the TimeCard's server
Protocol | Port | Direction | Function |
---|---|---|---|
TCP | 9922 |
Inbound |
Used for communication from the application server to the server for TimeCard. |
TCP | 9922 | Outbound | Used for communication from the server for TimeCard to the application server. |
TCP | 443 | Inbound | Is used for encrypted communication (HTTPS) between end users and the TimeCard's web server. Used for communication with Adaptation Updater and Monitor's package manager. |
TCP | 80 | Inbound | Alternatives. Can be used for unencrypted communication (HTTP) between end users and the TimeCard's web server. However, it is not recommended to use unencrypted communication over the Internet. |
Illustration of network and firewall configuration