Skip to content

Administrative Web Interface

The Mideye Server utilizes a web interface for operation, administration, and management. This interface can be accessed via https://:, where the port number is defined during the server installation process.

The Web server port is configured in application-prod.yml around row 74. Default for Windows is 443 and Linux 8443

Configuration file locations

  • Windows: C:\Program Files (x86)\Mideye Server 6\config\application-prod.yml.
  • Linux: /opt/mideyeserver6/config/application-prod.yml
server:
    port: 8443

It is recommended to access the web interface from a desktop client using a modern web browser such as Microsoft Edge, Firefox, Chrome, or Safari. Web browsers on servers are often locked down and may not function as expected.

Web interface SSL-certificate

During the installation of the Mideye Server, a self-signed SSL certificate is automatically generated. To replace this with a custom certificate, please refer to the Certificate Management section.


Web interface Root password

A root user is created during the server installation. This account should be used exclusively for creating administrative accounts and for emergency purposes.

Reset password for Root account

To reset the root account password, encrypt the new password using the encoding utility tool available at:

https://<MIDEYESERVER-FQDN>:<ssl-port>/utility/encode-password

Enter your password into the field of the encoding utility tool:

Tool

Copy the generated encoded password:

Encoded

Log on to the database using an account with write permission and execute

mysql> UPDATE mideyeserver_db.mideye_user SET jhi_password = 'encrypted_password' WHERE user_name = 'root';

Unlocking the Root Account

To unlock the root account, log into the database with write permissions and execute the following command:

mysql> UPDATE mideyeserver_db.mideye_user SET is_locked = 0 WHERE user_name = 'root';

Web interface administrative accounts

To administer the web GUI, Mideye Server has four user roles:

  • Root: There is only one root user, and this account should not be in use after creating a Super Administrator.
  • Super Administrators: Same permissions as root user.
  • Administrators
  • Operators

All roles except for the root role can be mapped to LDAP accounts. See section LDAP-RADIUS Translation for details.

User Management (only authorized to perform these operations on a user with a lower security level)

  • Create user
  • Update user
  • Delete user (any user is not allowed to delete itself)

Note: Operators are not allowed to write to any table except locked LDAP users.

The table below shows different tasks and what roles are allowed to perform the entity:

Radius Server Create Root, Super Admins, Admins
Update Root, Super Admins, Admin
Delete Root, Super Admins, Admin
Read Root, Super Admins, Admin, Operators
Radius Client Create Root, Super Admins, Admins
Update Root, Super Admins, Admins
Delete Root, Super Admins, Admins
Read Root, Super Admins, Admin, Operators
Ldap Profile Create Root, Super Admins, Admins
Update Root, Super Admins, Admins
Delete Root, Super Admins, Admins
Read Root, Super Admins, Admin, Operators
Approved Radius IP Create Root, Super Admins, Admins
Update Root, Super Admins, Admins
Delete Root, Super Admins, Admins
Read Root, Super Admins, Admin, Operators
LDAP RADIUS Translation Create Root, Super Admins, Admins
Update Root, Super Admins, Admins
Delete Root, Super Admins, Admins
Read Root, Super Admins, Admin, Operators
Accounting Read Root, Super Admins, Admin, Operators
Authentication Log Read Root, Super Admins, Admin, Operators
Locked Ldap Users Update Root, Super Admins, Admin, Operators
Read Root, Super Admins, Admin, Operators

Create a new database Super Administrator

To create a new Super Administrator account, navigate to “Users and Tokens” followed by “Mideye Users”. Select “Actions”, followed by “Add new database user” and select 'Super Administrator' from the “Role” dropdown list. Add the following data to the account:

  • Username
  • Authentication Type
  • Password
  • Phone number (optional)
  • Token number (optional)
  • Message type (default FLASH-SMS)
  • Expiration Date (optional)
  • Select Web Admin RADIUS client in the “Radius Client” dropdown list

!!! note “Radius User Attributes” Can only be added to the user after the user has been given the appropriate data. After the correct data has been added, save the user and edit the user once more. From there, “Radius User Attributes” can be added.

Change password for database account

All database accounts can have their password changed. It is not possible to change the password of an account with the same privileges level as the logged-on account meaning that a Super Administrator can only change the password on accounts that have lower permission i.e Administrators, Operators and database users.

To change password, navigate to the “Mideye Users” tab. From there, pick the user that needs the password changed, and proceed to click on the icon between the pen and the bin.

Map LDAP-groups to Mideye Web GUI roles

Instead of using database accounts to administrate Mideye Server, LDAP-groups can be mapped to all roles except for the ROOT-role. Complete the following steps to add LDAP-groups:

  • Connect to LDAP with a LDAP Profile.
  • Enable LDAP Profile – LDAP-RADIUS Translation and add the attribute memberOf next to “LDAP Attribute Name”.
  • Last part is to map LDAP-accounts or groups to the predefined roles used by Mideye Server. Navigate to “RADIUS Settings” followed by “RADIUS Translation”.
  • Add the DN of a user or group to the predefined roles. In the example below, three groups was added to Super Administrator, Administrator and Operator