Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Welcome to Tx3's

VERA

Vera Cloud!

As you prepare to utilize VERAVera's centralized electronic approval repository, you can use the checklist below to guide you on your way.


Note

VERA Vera is capable of connecting to an unlimited number of endpoints and, as such, some of the steps below can be repeated to connect your VERA Vera Cloud environment to as many endpoints as your need.

URLs and Ports 

  •  

    Open Outgoing TCP Port Access from your Environment to

    VERA

    Vera Cloud

    •  

      443

    •  

      8443

Your environment will need to communicate with both the VERA Vera Web Portal on port 443 and the VERA Vera API Server on port 8443. VERA Vera uses SSL communication for all incoming requests and requires ports that are different than the standard (non-SSL) web communication ports. If you cannot use 443 or 8443, please notify your Tx3 Account Manager and different ports can be provisioned. This may need to be repeated on each server that will connect to VERAVera.

  •  

    Allow Outgoing Access to the

    VERA

    Vera Cloud URL

If your environment restricts access to an approved list of URLs, you will need to add the VERA Vera Cloud URL to that list. Typically the url will follow this pattern: https://[your-company-name]-vera.saas.tx3services.com. Your specific URL will be communicated to you by your Tx3 Account Manager. This may need to be repeated on each server that will connect to VERAVera.

  •  

    Allow Incoming Access from

    VERA

    Vera Cloud to your Environment

VERA Vera will need to communicate back to your endpoint server and utilize your endpoint's API. The incoming traffic must be allowed from the VERA Vera Cloud URL and using your endpoint's API port. This may need to be repeated on each server that VERA Vera will connect to.
  •  

    Provide Tx3 with your Endpoint URL and API Port Information

You must provide Tx3 with your endpoint's API port and URL information. VERA Vera will use this information to communicate back to your endpoint as records are approved or rejected. This may need to be repeated on each server that VERA Vera will connect to.

Service Accounts

  •  

    Create a Service Account in your Endpoint System

You must create a Service Account for VERA Vera to access your endpoint. The service account should have sufficient privileges to update records via API in all projects that will be connected to VERAVera. This will need to be repeated on all endpoints.

  •  

    Provide the Service Account Credentials to Tx3

The credentials will be stored in VERA Vera in order to access your endpoint system. The password will be encrypted before storing it in VERAVera. A screen share session can be setup if you wish to encrypt and enter the password  yourself. This will need to be repeated for all endpoints.

Local Users

  •  

    Provide Tx3 with a List of User Accounts

    •  

      VERA

      Vera Service Account

    •  

      Local Admin Accounts

    •  

      Local User Accounts

    •  

      SAML User Accounts

JIRA endpoints will need to communicate with VERA Vera using a VERA Vera Service Account. This account will be created when your cloud environment is configured. You should provide the Service Account Name and expected password. This same account will be stored in the VERA Vera for JIRA Add On configuration settings. Additional user accounts can be supplied at this time as well. Please provide a CSV file to import when your VERA Vera Cloud environment is configured (see Import VERA Vera users for more information on the CSV Import process).

SAML Setup

  •  

    Provide Tx3 with SAML 2.0 Identity Provider Details

    •  

      URL

    •  

      Certificate

If you are using a SAML 2.0 SSO engine, please provide the Single Sign On Service URL for your IdP and the public certificate associated with that IdP.
  •  

    Add VERA Cloud Service Provider Entity IDs to your SAML IdP

    •  

      Tx3VERA

    •  

      Tx3VERASignatures

On your SAML IdP, please configure the above entity ids that VERA Vera will use to communicate with your IdP. The IdP endpoint for the Tx3VERASignatures Tx3 Vera Signatures entity ID must accept either the ForceAuthN parameter or the "urn:oasis:names:tc:SAML:1.0:am:password" Authentication Context to force re-authentication.

Policies

  •  

    Provide Tx3 with Existing Policy Files

    •  

      Approval Policy

    •  

      Records Management Policy

If you have existing VERA Vera Policy Files, please send these to Tx3 so that they can be included in your VERA Vera Cloud Environment. These policy files may be different for each endpoint.

Table of Contents

Table of Contents
maxLevel2