Upgrading the PingAuthorize Policy Editor manually
If you originally installed the PingAuthorize Policy Editor using .zip
files, use this procedure to upgrade the Policy Editor when a new version is released.
Steps
-
In your current Policy Editor, complete the steps in Backing up policies.
-
Stop the Policy Editor.
$ bin/stop-server
-
Obtain the new version of the PingAuthorize Policy Editor and extract it to a location outside the existing Policy Editor’s installation.
-
Prepare the existing policy database.
The new server installation might require changes to the policy database structure.
Choose from:
-
If you store your policies in the H2 policy database, copy the existing database. The server
setup
tool performs these upgrades and generates a newconfiguration.xml
file.This example assumes the old installation is in
/opt/pingauthorize/PingAuthorize-PAP-previous
, and the new installation is in/opt/pingauthorize/PingAuthorize-PAP
. Run the following commands to upgrade from each version:- Step 8.1 and later
-
$ cp /opt/pingauthorize/{pingauthorize}-PAP-previous/Symphonic.mv.db opt/pingauthorize/{pingauthorize}-PAP
- Step 8.0 earlier
-
$ cp /opt/pingauthorize/{pingauthorize}-PAP-previous/admin-point-application/db/Symphonic.mv.db opt/pingauthorize/{pingauthorize}-PAP
-
If you store your policies in a PostgreSQL database, follow the instructions for Upgrading a PostgreSQL policy database.
-
-
Run the
setup
tool.Updating PingAuthorize Server uses an
update
tool. However, PingAuthorize Policy Editor does not have this tool. Instead of updating the Policy Editor in-place, you must install the new Policy Editor.The
setup
tool uses the default credentials to upgrade the database. If the credentials no longer match the default values, provide the correct credentials to thesetup
tool using the appropriate command-line options:-
If you are using the default H2 policy database implementation, provide the non-default values using the
--dbAdminUsername
,--dbAdminPassword
,--dbAppUsername
, and--dbAppPassword
command-line options. Otherwise,setup
fails when it cannot access the H2 policy database, or it might reset credentials to their default values. For more information, see Manage policy database credentials. -
If you are using a PostgreSQL policy database implementation, provide the server runtime user value through the
--dbAppUsername
command-line option. For the server runtime password, provide this value to thePING_DB_APP_PASSWORD
environment variable before server start.
Follow the instructions in either of the following topics:
-
-
Start the new Policy Editor.
Follow the instructions in Post-setup steps (manual installation).
-
In the new Policy Editor, complete the steps in Upgrading the Trust Framework and policies.