orchestrator
2022.4
false
- Getting Started
- Requirements
- Best Practices
- Installation
- Updating
- Identity Server
- Troubleshooting startup errors
Azure App Service Installation
Orchestrator Installation Guide
Last updated Oct 7, 2024
Azure App Service Installation
The Azure installation script enables you to install Orchestrator on one or multiple nodes.
Important:
1. All the steps are mandatory in the installation procedures listed below. Orchestrator does not work without installing Identity Server.
2. Before starting the Orchestrator installation, make sure your certificates are issued by a Certificate Authority trusted by Azure, such as DigiCert.
3. Azure Stack is not supported, as API incompatibilities can occur. Please use Azure Cloud for your deployment.
To install Orchestrator on an Azure App Service perform the following steps:
- Through your own user identity - use the -noAzureAuthentication parameter when signing in with Azure PowerShell.
- Through a service principal - create an Azure AD application and service principal that can access your Orchestrator App Service and Resource Group . Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.
- Through your own user identity - use the -noAzureAuthentication parameter when signing in with Azure PowerShell.
- Through a service principal - create an Azure AD application and service principal that can access your Identity App Service and Resource Group. Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.
- In the Azure Portal, under App Services, create a new app service with a custom name such as
UiPathResourceCatalogService
. When creating the web app, make sure to select the Stack.NET Core 6
. For more information, see Microsoft's official documentation. - Navigate to Settings > Configuration > General Settings tab and select 64-bit for the Platform.
- Set the database connection string in the Configuration > Connection Strings of the web app, with the name
DefaultConnection
. For example,Server=13.13.13.13;Initial Catalog=UiPath;Persist Security Info=False;User ID=dbUser;Password=pass123; MultipleActiveResultSets=False;Encrypt=True; Connection Timeout=30;TrustServerCertificate=True
. - The Azure PowerShell authentication mechanism supported by our scripts can be one of the following two:
- Through your own user identity - use the -noAzureAuthentication parameter when signing in with Azure PowerShell.
- Through a service principal - create an Azure AD application and service principal that can access your Resource Catalog App Service and Resource Group. Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.
Note: Multi-node installations require the setup of the .
To install Orchestrator on multiple nodes on an Azure App Service perform the following steps:
- Through your own user identity - use the -noAzureAuthentication parameter when signing in with Azure PowerShell.
- Through a service principal - create an Azure AD application and service principal that can access your Identity App Service and Resource Group. Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.
- In the Azure Portal, under App Services, create a new app service with a custom name such as
UiPathResourceCatalogService
. When creating the web app, make sure to select the Stack.NET 6 (LTS)
. For more information, see Microsoft's official documentation. - Navigate to Settings > Configuration > General Settings tab and select 64-bit for the Platform.
- Set the database connection string in the Configuration > Connection Strings of the web app, with the name
DefaultConnection
. For example,Server=13.13.13.13;Initial Catalog=UiPath;Persist Security Info=False;User ID=dbUser;Password=pass123; MultipleActiveResultSets=False;Encrypt=True; Connection Timeout=30;TrustServerCertificate=True
. - The Azure PowerShell authentication mechanism supported by our scripts can be one of the following two:
- Through your own user identity - use the -noAzureAuthentication parameter when signing in with Azure PowerShell.
- Through a service principal - create an Azure AD application and service principal that can access your Resource Catalog App Service and Resource Group. Optionally, ask your friendly DevOps team to provide you with an Azure Service Principal ID and Password that can access the App Service and associated Resource Group.