You can integrate deister proxSafe key management system into Security Center using the deister proxSafe plugin by following a sequence of steps.
The following table lists the tasks required for the integration with Security Center, and how to verify that the integration was successful.
|Step||Task||Where to find more information|
|Understand prerequisites and key issues before deploying|
|1||Learn what you can do using the plugin.|
|2||Before installing the plugin, read the release notes to learn about the new features, the known issues, and the limitations.|
|3||Learn about the different components and how they connect together.|
|4||Ensure that the server where the plugin will be installed meets the recommended system requirements and is running a compatible version of Security Center.|
|Prepare Security Center|
|5||In Security Center, create a georeferenced map. Maps can enhance your situation awareness as you represent and control your security devices directly on maps.|
|6||Verify that the Security Center license has a valid certificate for the plugin. Go to the Config Tool home page, click , and confirm that deister proxSafe is in the list.||
|Deploy the plugin|
|7||On a Security Center server, download the plugin and install it.|
Grant users the privileges that they need to use the plugin.
|9||In Config Tool, create the deister proxSafe plugin role.|
|10||(Optional) Change the plugin configuration to suit your particular needs.|
|11||Apply access rules to deister proxSafe assets.|
|12||Schedule regular cleaning and backing up of the plugin database.|