Configuring Security Groups When iProcess Workspace (Windows) Is Installed in Azure
To use iProcess® Workspace (Windows) instances in Azure to connect to TIBCO iProcess Engine, perform the following steps to appropriately configure security groups.
| 1. | Start an Azure Virtual Machine (AVM) in your Virtual Network (VNET). |
| 2. | Name the created virtual machine as avm-OracleServer and install the Oracle Database Server on this virtual machine. |
| 3. | Start a second AVM in your VPC. |
| 4. | Name the created virtual machine as avm-iPE and install iProcess Engine on this virtual machine. |
| 5. | Start a third AVM instance in your Virtual Network. |
| 6. | Name the created virtual machine as avm-iPWW and install iProcess Workspace (Windows) on this virtual machine. |
| 7. | Create the following security groups for all three Azure Virtual Machines. |
| — | nsg-OracleServer for the avm-OracleServer instance. |
| — | nsg-iPE for the avm-iPE instance. |
| — | nsg-iPWW for the avm-iPWW instance. |
| 8. | Configure nsg-OracleServer, nsg-iPE, and nsg-iPWW |
| a. | Specify a custom TCP rule that allows only machines on an external domain to access the Oracle Database Server (The default port is 1521.) |
| b. | Specify a rule on avm-OracleServer for iProcess Engine to communicate with the database server. |
| c. | Specify a rule on avm-iPE for the database server to communicate with iProcess Engine. |
| d. | Specify a rule on avm-iPE for iProcess Workspace (Windows) to communicate with iProcess Engine. |
| e. | Specify a rule on avm-iPWW for iProcess Engine to communicate with the iProcess Workspace (Windows). |
| f. | Specify Remote Desktop (RDP) rule for access to avm-iPWW from an external domain. |
Inbound Security Rules
|
Priority |
Name |
Source |
Destination |
Service |
Action |
|
105 |
iPE_Port |
192.0.2.0/32 |
Any |
Custom (Any/111) |
Allow |
|
130 |
Tibco |
192.0.2.0/32 |
Any |
Custom (Any/48000-48020) |
Allow |
|
180 |
SPO Port |
192.0.2.0/32 |
Any |
Custom (Any/45157) |
Allow |
|
1000 |
default-allow-ssh |
192.0.2.0/32 |
Any |
SSH (TCP/22) |
Allow |
Note: 192.0.2.0/32 is used as an example IP address, replace this with your IP address.
After configuring these security groups, your setup looks something like the following illustration.