You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/install_server.md
+12-3Lines changed: 12 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -138,9 +138,7 @@ We'll be using `example.com` as our domain for this example.
138
138
139
139

140
140
141
-
!!!tip
142
-
Already have your own SSL certificate? [Read this](functions/settings_override.md#using-your-own-wildcard-ssl-cert) before continuing.
143
-
141
+
144
142
### Step 5 - Run the install script
145
143
146
144
Switch to the `tactical` user:
@@ -160,6 +158,17 @@ chmod +x install.sh
160
158
./install.sh
161
159
```
162
160
161
+
!!!info
162
+
Already have your own SSL certificate? Call the install script with the `--use-own-cert` flag, like this:
163
+
```bash
164
+
./install.sh --use-own-cert
165
+
```
166
+
Ensure your cert and private key exist on the server as the install script will prompt you for the locations of these 2 files.
167
+
168
+
Also ensure that it is a legitimate, trusted certificate and includes the full chain for proper validation. Do not use this option with self-signed certs.
169
+
170
+
171
+
163
172
!!!danger
164
173
You can install with the `--insecure` switch to use any DNS name you want. Self signed certs will be generated for all the DNS names, and all SSL certificate chain validation will be disabled in TRMM.
Copy file name to clipboardExpand all lines: docs/mesh_integration.md
+20-25Lines changed: 20 additions & 25 deletions
Original file line number
Diff line number
Diff line change
@@ -11,19 +11,19 @@ Tactical RMM integrates with [MeshCentral](https://github.com/Ylianst/MeshCentra
11
11
!!!note
12
12
MeshCentral has issues with Firefox, use a Chromium-based browser.
13
13
14
-
At some point in the future, these functions will be directly built into the Tactical agent, removing the need for MeshCentral.
15
-
16
14
It should be noted that Tactical RMM and MeshCentral are 2 completely separate products and can run independently of each other.
17
15
18
16
They do not even have to run on the same box, however when you install Tactical RMM it simply installs MeshCentral for you with some pre-configured settings to allow integration.
19
17
20
18
It is highly recommended to use the MeshCentral instance that Tactical installs, since it allows the developers more control over it and to ensure things don't break.
21
19
22
-
## OMG MeshCentral isn't maintained anymore!
20
+
## How does it work?
23
21
24
-
MeshCentral is still [actively being maintained](https://meshcentral2.blogspot.com/2023/10/meshcentral-windows-arm64-nodejs-v11.html), the lead devs had jobs in which they were paid by a corporation to develop MeshCentral, they now have got other jobs which means they are supporting and developing MeshCentral in their free time (like alot of other projects) this means development is slower but not that it isn't maintained anymore. If this changes or it becomes necessary to fix something that breaks or packages needing updated we are prepared to begin maintaining our own fork. The features of MeshCentral that TRMM uses are only the 3 items above and are extremely mature.
22
+
Please watch this video to fully understand how mesh integrations and permissions sync work.
MeshCentral has an embedding feature that allows integration into existing products.
29
29
@@ -33,24 +33,30 @@ The Tactical RMM agent keeps track of your Mesh agents, and periodically interac
33
33
34
34
When you do a take control / terminal / file browser on an agent using the Tactical UI, behind the scenes, Tactical generates a login token for MeshCentral's website and then "wraps" MeshCentral's UI in an iframe for that specific agent only, using it's unique ID to know what agent to render in the iframe.
35
35
36
+
## Customize Take Control Username
37
+
38
+
If you've enabled the Mesh "Ask Consent + Bar" display option that shows across the top when controlling a users machine and you'd like to change the name that users see, make sure the user has a First and/or Last name set TRMM (Settings > User Administration).
39
+
40
+
## Get a url to login to mesh as the mesh superuser
## Running your own existing or separate MeshCentral server?
37
46
38
47
We do testing to make sure everything works with the version found [here](https://github.com/amidaware/tacticalrmm/blob/master/api/tacticalrmm/tacticalrmm/settings.py) (look for MESH_VER).
39
48
40
49
Installation instructions for using your own MeshCentral server:
41
50
42
51
1. Run standard installation.
43
-
2. When asked for Mesh URL specify your existing Mesh server URL.
44
-
3. After installation, you will need to run thru manually uploading installers and connecting token with [this](troubleshooting.md#need-to-recover-your-mesh-token):
45
-
4. Make sure DNS is pointing to your existing server (you must also remove `mesh.yourdomain.com` from `/etc/hosts` on the trmm server).
52
+
2. After installation is complete, disable meshcentral `sudo systemctl disable --now meshcentral`.
53
+
3. In TRMM Web UI go to Settings > Global Settings > MeshCentral and update values from your existing mesh (make sure to use a mesh superuser).
54
+
4. Add `USE_EXTERNAL_MESH = True` to `/rmm/api/tacticalrmm/tacticalrmm/local_settings.py`
55
+
5. Restart TRMM server.
46
56
47
57
!!!info
48
58
Mesh usernames are **CaSe sEnSiTive**
49
59
50
-
## Customize Take Control Username
51
-
52
-
If you've enabled the Mesh "Ask Consent + Bar" display option that shows across the top when controlling a users machine and you'd like to change the name that users see, login to https://mesh.yourdomain.com, go to **Users**, select **User > Edit**`Real Name`
Then when installing an agent, make sure to pass the `-nomesh` flag to the [installer](install_agent.md#optional-installer-args)
104
110
105
-
## Security Implications
106
-
107
-
Tactical RMM has a full permission module, but because of how Tactical RMM integrates with MeshCentral currently there is a permissions bypass atm. First, here's how Tactical RMM's integration works.
With that understanding, when you trigger any function in Tactical RMM that uses a MeshCentral function (Remote Control, or Remote background) the user gets the full admin login Auth token for logging into MeshCentral. If they then goto https://mesh.example.com they will see all agents and have full administrative permissions for everything in MeshCentral.
112
-
113
-
If you have multiple techs, and need to restrict their computer access permissions, right now you will need to disable auto login and manually manage your meshcentral users and computers. First you will need to:
111
+
## OMG MeshCentral isn't maintained anymore!
114
112
115
-
1. Check the `Disable Auto Login for Remote Control and Remote background:` option.
116
-
2. Manually login to MeshCentral, and manually create users and set their permissions/restrictions.
117
-
3. All techs will then have to manually login to https://mesh.example.com daily so they can use Remote Control and the MeshCentral Remote Background features.
113
+
MeshCentral is still [actively being maintained](https://meshcentral2.blogspot.com/2023/10/meshcentral-windows-arm64-nodejs-v11.html), the lead devs had jobs in which they were paid by a corporation to develop MeshCentral, they now have got other jobs which means they are supporting and developing MeshCentral in their free time (like alot of other projects) this means development is slower but not that it isn't maintained anymore. If this changes or it becomes necessary to fix something that breaks or packages needing updated we are prepared to begin maintaining our own fork. The features of MeshCentral that TRMM uses are only the 3 items above and are extremely mature.
118
114
119
-
It is planned at some point in the future for this to either be automated, or eliminated entirely. For now, you will need to handle this yourself.
0 commit comments