Prerequisites
In order to proceed with the deployment, you are required to meet the hardware and software requirements listed below:
1. Hardware Requirements
XMPro Web Server
- Ensure your server meets the minimum XMPro Platform hardware requirements
- Ensure your server meets the minimum Windows Server 2022 hardware requirements
Database Server
- NOTE: These instructions are based on SQL Server running on a different server however SQL Server can be run on the same XMPro Web Server.
- Ensure your server meets the minimum SQL Server 2022 hardware requirements
2. SQL Server Install
Install SQL Server 2022 (Standard) with Mixed Mode authentication (not Windows authentication)
Install SQL Server Management Studio
Create a dedicated SQL user account with the following permissions:
- Connect to your SQL Server instance
- Server type Database Engine
- Server name: Your server name (the default value is typically MSSQLSERVER)
- Authentication: SQL Server Authentication
- Login: sa
- Password: The password you set during installation
Create the new user account:
- In Object Explorer, expand your server
- Right-click on "Security" folder
- Select "New" → "Login..."
- Enter a login name for your dedicated user
- Select "SQL Server authentication"
- Enter and confirm a strong password
- Uncheck "User must change password at next login" if it's checked
- Click on "Server Roles" page in the left panel
- Assign the required roles
- Check the boxes for "dbcreator" and "securityadmin" roles
- Click "OK" to create the user
- Use a strong password (alphanumeric, 15+ characters, avoid special characters)
- Note the SQL Server name, username, and password for later use
Warning
Install the software listed in the next section in the order they are listed
3. Software Required for Installation
- Install .NET Framework 4.8 Runtime (required for web applications)
- Install .NET Framework 4.8.1 Runtime (required for installers)
- Install IIS with the following features:
- Open Server Manager → Add Roles and Features
- Select Web Server (IIS) role
- Expand Web Server and Common HTTP Features
- Uncheck WebDAV Publishing
- Check everything under .NET Framework features
- Under Application Development, check everything EXCEPT CGI
- Complete installation
- IIS Configuration: Setting Folder Permissions
- Navigate to
C:\inetpub\
- Right-click on the
wwwroot
folder - Select the Security tab
- Click Edit to modify usernames
- Click Add
- Type
IIS_IUSRS
in the object names box - Click Check Names (the name will be underlined if found)
- Click OK
- Set permissions for this user: Grant Full Control
- Type
- Navigate to
- Install URL Rewrite Module (x64 version)
- Install Microsoft ASP.NET Core Runtime 8 (Hosting Bundle)
4. Browser Configuration
Note
The installers require Windows Server Internet Explorer functionality to connect to network resources during the installation process.
Open Edge, enable IE compatibility mode:
- Open Edge Settings → Default browser
- Enable "Allow sites to be reloaded in Internet Explorer mode"
- Go to Edge Settings → Privacy, search, and services
- Under Security, set Enhanced Security to "Balanced" mode
Open Internet Explorer, enable Active Scripting and Active Scriptlets for both Internet and Trusted Sites Zones:
- Open Internet Options → Security tab
- Click "Custom level"
- Enable "Active Scriptlets" under ActiveX controls and plug-ins
- Enable "Active Scripting" under Scripting section
Disable Internet Explorer Enhanced Security Configuration (if on Windows Server):
- Open Server Manager → Local Server
- Find IE Enhanced Security Configuration
- In the Properties section on the right, locate "IE Enhanced Security Configuration" (it should say "On")
- Set to "Off" for Administrators
5. Signing Certificate Setup (Inter-App Authentication)
Download and install OpenSSL for Windows (Win64 Light version v3.5.0 or newer)
Open Command Prompt as Administrator
Navigate to the OpenSSL installation directory
Create Signing Certificate
Run the following commands in sequence, replacing {YourMachine} with your server name:
cd C:\Program Files\OpenSSL-Win64
cd bin
Generate a Private Key:
openssl genrsa -out sign.pem 2048
Create a certificate signing request:
openssl req -x509 -newkey rsa:4096 -sha256 -nodes -keyout sign.key -out sign.crt -subj "/CN=XMIdentity"
Export the certificate to PFX format:
openssl pkcs12 -export -out sign.pfx -inkey sign.key -in sign.crt -certfile sign.crt
The Exported files will be located at C:\Program Files\OpenSSL-Win64\bin
It is recommended to move them to a secure location on your machine
6. HTTPS/SSL Certificate Setup
- Select your server name in the left panel
- Double-click "Server Certificates" in the center panel
- In the Actions panel on the right, click "Create Self-Signed Certificate"
- In the dialog that appears:
- Enter a friendly name that identifies your server (e.g., "XMPro-ServerName")
- Select "Personal" for the certificate store
- Click OK
- The certificate will now appear in the list of server certificates
- Next, set up HTTPS bindings:
- In the left panel of IIS Manager, expand your server name
- Expand "Sites"
- Select "Default Web Site"
- In the Actions panel on the right, click "Bindings..."
- Click "Add..."
- Set Type to "https"
- Set IP Address to "All Unassigned"
- Set Port to "443"
- Select the SSL certificate you just created from the dropdown
- Check "Require Server Name Indication" if you have multiple sites on this server
- Click OK, then Close
- Test the HTTPS configuration by navigating to https://localhost in a browser on the server
- You will see a certificate warning because it's self-signed. This is normal.
Warning
For production environments, consider obtaining a trusted SSL certificate from a certificate authority.
Warning
It is recommended to restart the machine after installing and configuring all the prerequisites
Last modified: June 04, 2025