Central Client Configuration
Where a Bravura Safe server is maintained in-house, it is often necessary for system administrators to pre-set certain client application configurations, such as the Server URL, before rolling out the software to end-users using an endpoint management system. These configurations take effect during installation of the client application and vary by client.
To set up a predefined base server URL on Linux systems, follow these instructions:
If they do not exist on your system, establish one of the following directory paths:
For Google Chrome, the directory should be
/etc/opt/chrome/policies/managed/
For Chromium, the directory should be
/etc/opt/chromium/policies/managed/
Within the
managed
directory, generate a file namedsafe.json
with the content below:{ "3rdparty": { "extensions": { "cjidmfgdjckibjdfnglfdgohkaballnn": { "environment": { "base": "https://my.safe.server.com" } } } } }
Please note that the extension ID ("
cjidmfgdjckibjdfnglfdgohkaballnn
" above) is specific to your installation. To locate your extension ID, go to your browser's extensions page (for instance,chrome://extensions
in Chrome).Note
If you plan to use the Chrome or Chromium Web Store version of Bravura Safe, click here for guidance on setting up a forced installation of Bravura Safe on user systems when managed policies are distributed. If you are already familiar with creating the necessary directories, you can skip those steps.
Since you will be distributing these configuration files to user systems, it is advisable to ensure that only administrators have write permissions in the
/policies
directory.Leverage your chosen software distribution or MDM tool to deploy the following onto user systems:
The Chrome or Chromium browser
The
/etc/opt/<chrome or chromium>/policies/managed/safe.json
file
Tip
For additional assistance, consult Google's Chrome Browser quick start guide for Linux users.
To set up a predefined base server URL on macOS:
Create a file named:
com.google.chrome.extensions.cjidmfgdjckibjdfnglfdgohkaballnn.plist
Locate the specific ID assigned to your installation by visiting the extensions section within your browser (e.g., chrome://extensions).
Once you have created the
.plist
file, insert the following:<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>environment</key> <dict> <key>base</key> <string>https://my.safe.server.com</string> </dict> </dict> </plist>
Transform the
.plist
document into a.mobileconfig
configuration profile for deployment.Note
If you are implementing the Chrome or Chromium Web Store iteration of Bravura Safe, you can generate an additional configuration profile to enforce installation on user devices. This profile can be distributed as follows.
Deploy the following components onto the users' macOS systems using your choice of software distribution platform or Mobile Device Management (MDM) system:
The Chrome or Chromium-based internet browser
The prepared
.mobileconfig
configuration profile
To establish predefined environment URLs for Windows systems, proceed as follows:
Open the Windows Group Policy Editor and either create a new Group Policy Object (GPO) or select an existing one that targets your user group.
Within the GPO, go to User Configuration > Preferences > Windows Settings > Registry.
In the navigation pane, right-click on Registry and choose New > Registry Item.
Configure a Registry Item with the details below:
Action: Update
Hive:
HKEY_LOCAL_MACHINE
Key Path:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\cjidmfgdjckibjdfnglfdgohkaballnn\policy\environment
Find the specific ID from your installation in your browser's extensions section (e.g.,
chrome://extensions
).Note
For those using Microsoft Edge, which is also Chromium-based, the registry path differs.
Utilize the following path for Edge:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\lgjgabmkhcjfpcmflkhmhjgmnnpfgmnc\policy\environment
Value name:
base
Value type:
REG_SZ
Value data: Input the domain configured for your server
Confirm the settings by clicking OK.
Note
A GPO can also be employed to mandate the installation of the browser extension. For further information on this process, consult the relevant guide.
To establish a preset base server URL on Linux systems:
Generate the
/etc/firefox/policies
directory:mkdir -p /etc/firefox/policies
To ensure that previous administrators retain the ability to modify files within the
/policies
directory, adjust permissions:chmod -R 755 /etc/firefox/policies
In the
/etc/firefox/policies
directory, create a file namedpolicies.json
and populate it with:{ "policies": { "3rdparty": { "Extensions": { "{487126d9-6017-4b6e-9319-b2d415c7fb26}": { "environment": { "base": "https://my.safe.server.com" } } } } } }
Finally, utilize the desired software distribution tool or Mobile Device Management (MDM) system to disseminate the
/etc/firefox/policies/policies.json
file across user workstations.
To establish a preset base server URL on macOS systems:
Eliminate the automatic quarantine attribute that macOS applies to Firefox by running:
xattr -r -d com.apple.quarantine /Applications/Firefox.app
Establish a directory:
mkdir -p /Applications/Firefox.app/Contents/Resources/distribution
In the newly created distribution directory, generate a file named
policies.json
and insert:{ "policies": { "3rdparty": { "Extensions": { "{487126d9-6017-4b6e-9319-b2d415c7fb26}": { "environment": { "base": "https://my.safe.server.com" } } } } } }
Apply your preferred method of software distribution or Mobile Device Management (MDM) to distribute the
/Applications/Firefox.app/Contents/Resources/distribution/policies.json
to the respective macOS devices.
To configure a preset base server URL on Windows systems:
Launch the Windows Group Policy management console. Make a new Group Policy Object (GPO) or modify an existing one that applies to your target users.
After modifying the GPO, navigate to User Configuration > Preferences > Windows Settings > Registry.
In the navigation pane, right-click on Registry and access New > Registry Item.
Configure a new Registry entry with the specified attributes:
Action: Update
Hive:
HKEY_LOCAL_MACHINE
Key Path:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Mozilla\Firefox\3rdparty\Extensions\{487126d9-6017-4b6e-9319-b2d415c7fb26}\environment
Value name:
base
Value type:
REG_SZ
Value data: Enter the domain configured for your server
Confirm the settings by clicking OK.
For central configuration prior to deployment, begin by setting up the desktop application on a single computer:
Install the desktop application:
For Windows, execute a silent installation of Bravura Safe with administrative privileges by running:
installer.exe /allusers /S
Click here for more details about silent installers/uninstallers.
Proceed to the local settings for the desktop application, which vary by operating system. For example:
For Windows, use:
%AppData%\Bravura Safe
For macOS, use:
~/Library/Application Support/Bravura Safe
Note
To locate the directory, see: Data storage - Desktop applications.
Within this directory, locate and open the
data.json
file.Modify the
data.json
file to tailor the Desktop application settings to your requirements. Specifically, insert the following structure to align the application with your privately-managed Server URL:{ "environmentUrls": { "base": "https://my.safe.server.com", "api": null, "identity": null, "webVault": null, "icons": null, "notifications": null, "events": null, "enterprise": null } }
Give the "region" parameter the value "Self-hosted":
"region": "Self-hosted"
After customizing as needed, deploy the pre-configured, templated desktop application using your chosen endpoint management system (such as Jamf).
Note
Instead of editing the
data.json
file manually, you can define environmentUrls through the Bravura Safe desktop application itself. Choose the appropriate region, then exit the desktop app and find yourdata.json
file to extract the environment variable details for use.
Prior to deployment, administrators typically have the capability – using many Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) tools – to set up applications in advance. To prepare the Bravura Safe Mobile apps for use with your own hosted Server URL, configure the application as follows:
Configuration Key | Value Type | Configuration Value |
|
| Server URL: |