Cisco WebEx Social Administration Guide, Release 3.4
Director
Downloads: This chapterpdf (PDF - 334.0KB) The complete bookPDF (PDF - 2.99MB) | Feedback

Director

Table Of Contents

Director

System Pages

System: Configuration

Unified Access

NFS

NTP

Notifier

Analytics Store Cron Job

Health and Diagnostics

Console Login Banner

System: Topology

Provision New Server

Server List

System: Software

Upload

Upgrade

System: Health

Downloading Log Files

Viewing Health Status

Application Pages

Application: Portal

Compliance Officer Email

Error Reporting

Welcome Post Configuration

Proxy Settings

Advanced Portal Properties

Application: Security

Cluster Security

Kerberos Properties

SAML SSO

WebEx SSO

WebEx IM SSO

Mobility

Add New Trusted Certificate

Trusted Certificates

HTTPS/SSL

Application: Integration

SharePoint (Native)

Email Configuration

WSRP Settings

Chat Proxy

Stats Page


Director


The Director is used to set up your Cisco WebEx Social topology and manage various system configuration options. It provides access to various configuration pages, which are arranged in the following categories:

System—Configure various system settings, provision and manage nodes in your deployment, upgrade your Cisco WebEx Social software, and obtain information about the health of your system

Application—Configure and manage various portal, security, and integration settings

Stats—View statistics and metrics for various Cisco WebEx Social components.

When you use the Director, be aware of the following:

Several of the configuration options can greatly affect the operation of your Cisco WebEx Social topology. Use care when making these changes.

When you click Save after making configuration changes, the Director displays the Apply Config in the panel on the left. You must click this button to apply your saved changes to the nodes in your deployment. If required, nodes restart automatically when you click Apply Config.

This section includes these topics:

System Pages

Application Pages

Stats Page

System Pages

The System pages in the Director let you configure various system settings, provision and manage nodes in your deployment, upgrade your Cisco WebEx Social software, and obtain information about the health of your system.

The following section describe the System pages in detail:

System: Configuration

System: Topology

System: Software

System: Health

System: Configuration

The Configuration page provides areas for configuring a variety of items that relate to your Cisco WebEx Social deployment. The following sections describe these areas:

Unified Access

NFS

NTP

Notifier

Analytics Store Cron Job

Health and Diagnostics

Console Login Banner

Unified Access

Use the options in the Unified Access area in the Configuration page to configure a unified access password and components that can be accessed with this password.

To configure the Unified Access parameters, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Configuration from the list on the left of your screen.

Step 3 In the Unified Access area, take these actions:

a. Enter values for the fields that Table 5-1 describes.

b. Click Save.


Table 5-1 Unified Access Settings 

Parameter
Description

Credentials

Unified Password

Password to be set for the administration interfaces that you choose with the Access Propagation option.

The password must follow these guidelines:

Must contain at least 8 characters

Must contain at least 1 upper case letter, one lower case letter, one digit 0 through 9, and one special character

Cannot include the space character

Grub

Search

Notifier

Message Queue

Index Store

Check the check box for each component for which to propagate the unified access password. Components are:

Search—Search Store and Index Store administration interface

Notifier—Notifier administration interface

Message Queue—Message Role administration interface

Grub—Linux GRUB

Index Store—Index Store administration interface


NFS

Use the options in the NFS area in the Configuration page to configure the Network File System (NFS) mount point.

Before you configure NFS, see the "NFS Requirements" section in Cisco WebEx Social Installation and Upgrade Guide.

To configure this NFS mount point, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Configuration from the list on the left of your screen.

Step 3 In the NFS area, take these actions:

a. In the NFS Host field, enter the host name of the NFS server.

b. In the NFS Domain field, enter the fully qualified domain name or the IP address of the NFS server.

This item is required in the NFS server is not in the same NFS domain as the Cisco WebEx Social nodes.

c. In the Exported Directory field, enter the path from which the four NFS mount points are exported. Use this format:

/exported_root_folder

For example, if you export the /export/webex_social directory in the exports file on the NFS server, specify a slash (/) as the Exported Directory in the Director GUI.

d. Click Save.


You can check NFS status and related log files as follows:

Use these commands to check the status of NFS on Cisco WebEx Social nodes:

[root@webexsocial-1 ~]# df -Tht nfs4

[root@webexsocial-1 ~]# sudo service autofs status

Use these commands to check the status of NFS on the NFS server:

[root@nfs ~]# sudo exportfs -v

[root@nfs ~]# sudo service nfs status

Check these log files on the Director node:

/opt/logs/date/hostname_messages—For RSyslog failures

NTP

Use the options in the NTP area in the Configuration page to designate the Network Time Protocol (NTP) server for use with Cisco WebEx Social.

To configure NTP, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Configuration from the list on the left of your screen.

Step 3 In the NTP area, take these actions:

a. In the Primary field, enter the fully qualified domain name of the primary NTP server.

b. In the Secondary field, enter the fully qualified domain name of the secondary NTP server.

c. Click Save.


Notifier

The Notifier is an XMPP publisher that is used to notify Cisco WebEx Social users of events, including system alerts, announcements, and activities. Use the options in the Notifier area in the Configuration page to configure the Notifier.

To configure the Notifier, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Configuration from the list on the left of your screen.

Step 3 In the Notifier area, configure the fields that Table 5-2 describes.

Step 4 Click the Save button that appears under the Enable SSO box.


Table 5-2 Notifier Settings 

Parameter
Description

LDAP Hostname/IP

Fully qualified domain name or IP address of the LDAP host.

Make sure that the machine on which Cisco WebEx Social is installed can communicate with the LDAP server. If a firewall exists between the two machines, make sure that the appropriate ports are open.

Credentials

Password of the user that is specified in the Principal field (see the Principal field description in this table).

Full Name

LDAP field for obtaining the first and last name of users.

This value must match the entry in the Full Name field in the LDAP Authentication window (you access this window by selecting Portal > Settings > Authentication > LDAP Authentication from the control panel for the system administrator).

For example, this value can be set to cn.

Screen Name

This value should map to the LDAP attribute that Cisco WebEx Social uses for screen name (typically sAMAccountName for Active Directory).

Make sure that the value you enter here matches the Screen Name field in the LDAP Authentication window (you access this window by selecting Portal > Settings > Authentication > LDAP Authentication from the control panel for the system administrator).

Enable SSO

If you check this box, single sign-on is enabled. In this case, Notifier does not authenticate a user against LDAP because the password of the user is not sent to Cisco WebEx Social. Notifier does verify the existence of the user in LDAP.

This option is disabled by default.

LDAP Port

Port used for communication with the LDAP host.

389 is commonly used.

Base DN

Specifies the initial search context in LDAP for users. It is the top level of the LDAP directory tree.

For example: cn=users,dc=ad1,dc=webexsocial,dc=com

Principal

Distinguished Name of a user who has sufficient privileges to read the content of the container that Base DN points to.

For example:
cn=wxs,cn=users,dc=your_domain,dc=[com | net | local]

Import Search Filter

(Display only) LDAP Object type used to filter the search.

Enable Secure LDAP

Check this box to enable a secure communications protocol, such as HPPTS, for the Notifier.


Analytics Store Cron Job

The Analytics Store is a Mongodb database that contains information about user activities and Cisco WebEx Social metrics. Cisco WebEx Social uses data from the Analytics Store to provide suggestions about what communities or other aspects of the system may interest a particular user. Cisco WebEx Social also uses the Analytics Store to calculate the raw data used in the Metrics reporting that you access in the Portal > WebEx Social Metric window (see the "WebEx Social Metrics" section for more information).

The system executes a CRON job on the primary Analytics Store to compute suggested content and connections, and to calculate the raw data used in the Metrics reporting. You use the Analytics Store Cron Job area in the Configuration page to configure the hour of the day that the CRON job starts.

To configure the start time for a the CRON job, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Configuration from the list on the left of your screen.

Step 3 In the Analytics Store Cron Job area, take these actions:

a. From the Hour of Day (UTC) drop-down list, select the UTC time that the configured Cron task runs each day. Cisco recommends that you set this time to be during off-peak hours. Alternatively, you might find it convenient to set this time to correspond to midnight local time.

b. Click Save.


Health and Diagnostics

Use the option in the Health and Diagnostics area in the Configuration page to configure email IDs for alerts.

To configure email IDs, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Configuration from the list on the left of your screen.

Step 3 In the Health and Diagnostics area, take these actions:

a. In the SNMP Community String field, enter the SNMP community string for your SNMP server.

b. From the Collected Polling Interval (seconds) drop-down list, choose how frequently you want the system to poll nodes for performance statistics (15, 30, 60, or 120 seconds).

a. In the EmailID(s) for Alerts text field, enter email IDs, separated by commas.

b. Click Save.


Console Login Banner

Use the option in the Console Login Banner area in the Configuration page to configure the message of the day, which appears when a user logs in to the OS console in the VMware environment when setting up virtual machines.

To configure the daily message that appears when you log in to the OS console, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Configuration from the list on the left of your screen.

Step 3 In the Console Login Banner area, take these actions:

a. In the Message of the Day field, enter the text you want displayed when you log in to the console.

b. Click Save.


System: Topology

The Topology page provides areas for configuring a variety of items that relate to your Cisco WebEx Social deployment. The following sections describe these areas:

Provision New Server

Server List

Provision New Server

Use the options in the Provision New Server area in the Topology page to configure the role for a server in your Cisco WebEx Social deployment.

To provision a server, follow these steps:

If you selected the Dashboard tab, take either of these actions in the menu tree:

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Topology from the list on the left of your screen.

Step 3 From the Role drop-down list, choose one of the following options to designate the role of the server:

RDBMS Store

Message Queue

Cache

Notifier

Index Store

Search Store (master)

Search Store (slave)

JSON Store

Analytics Store

App Server

Worker

For an explanation of each role, see the "Overview of Cisco WebEx Social Nodes" section.

Step 4 In the FQDN field, enter the fully qualified domain name or the IP address of the server.

Step 5 Click Add.


Server List

The Server List area in the Topology page provides information about the servers (nodes) that are in your Cisco WebEx Social topology and lets you enable, disable, or delete a node.

To access this area, sign in to the Director, click System in the Director menu bar, then select Topology from the list on the left of your screen.

When you are viewing this area, you can click the Refresh All button to fetch and display current version information and operational status for all nodes in the Server List area.

You also can click the Enable All button to enable all disabled Cache, Worker, and App Server nodes, in that order. You can click the Disable All button to disable all enabled App Server, Worker, and Cache nodes, in that order.


Note Do not use the Enable All or Disable All buttons after a Fresh install or an Upgrade that involves data migration. In these cases, nodes must be enabled or disabled as the installation or upgrade procedure describes.


Table 5-3 describes the information and controls that the Server List area provides for each server.

Table 5-3 Server List Information and Controls 

Item
Description

Role

Cisco WebEx Social role that is assigned to the server.

FQDN

Fully qualified domain name of the server.

Version Info

Provides three lines of information:

Line 1—Cisco WebEx Social software version that is running on the server.

Line 2—Date and time of the last successful software configuration check.

Line 3—Information about a server failure, if a failure occurred. Otherwise, displays "OK."

Operational Status

Displays the current status of the server, which can be:

Running

Stopped

Not Installed

Unreachable Host

Connection Failed

Action

Includes a drop-down menu that provides some or all of these choices, depending on the role:

Refresh—Fetches current version information and operational status and displays this information for server

Disable/Enable—Toggle button. Disable stops the service for the corresponding role. Enable starts the service for the corresponding role.

These buttons apply only to App Server, Cache, and Worker roles. To disable other roles, use an SSH connection to access the node.

When you enable or disable servers, enable App Server roles last, and disable App Server roles first.

Delete—Removes the server from the Cisco WebEx Social topology and updates the global configuration.

JSON Store and Analytics Store nodes cannot be removed.


System: Software

Use the Software page to upgrade the Cisco WebEx Social software that runs on the nodes in your Cisco WebEx Social deployment. This page includes these areas with options for uploading an upgrade file and performing the upgrade.

The following sections describe these areas:

Upload

Upgrade

Upload

Before you can use this page to perform an upgrade, you must have received the patch .img file for the upgrade and stored this file on a Linux or Unix node that supports SCP. You can either use SCP to obtain the file or enter the URL of its storage location.


Note Before performing a software upgrade, see the upgrade information in Cisco WebEx Social Installation and Upgrade Guide. In particular, see the "Using the Software Page" section in that document. This information includes important steps that you should follow before and after the procedure that is provided here.


To upload the patch .img file, follow these steps.

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Software from the list on the left of your screen.

Step 3 Take either of these actions:

If you want to use SCP to obtain the file:

a. Click the SCP button to display options for using SCP.

b. In the Host Name field, enter the fully qualified domain name or the IP address of the node where you placed the patch .img file.

c. In the File Name field, enter the complete path and file name of the .img file.

d. In the Linux/Unix User Name field, enter the user ID of the node on which the patch .img file has been placed.

e. In the Password field, enter the password for the User ID that you entered.

If you want to enter a URL of a location where the image is stored:

a. Click the URL button to display options for entering a URL.

b. In the Upgrade File URL field, enter the location where the image is stored.

Step 4 Click Fetch Image.

The file is copied to the Director node and software version that you uploaded appears in the Available Upgrade Version field in the Upgrade area of the page.


Upgrade

Before you can use the Software page to perform an upgrade, you must have uploaded a patch .img file for the upgrade so that it appears in the Available Upgrade Version field.


Note Before performing a software upgrade, see the upgrade information in Cisco WebEx Social Installation and Upgrade Guide. In particular, see the "Using the Software Page" section in that document. This information includes important steps that you should follow before and after the procedure that is provided here.


To perform a software upgrade, follow these steps.

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Software from the list on the left of your screen.

Step 3 Ensure that the software version that you uploaded appears in the Available Upgrade Version field.

Step 4 Click Upgrade.

The software on each node in your Cisco WebEx Social cluster is upgraded.


System: Health

The Health page lets you view or download Cisco WebEx Log files and displays the health status of various Cisco WebEx Social services.

Downloading Log Files

You can view or download up to 30 Cisco WebEx Log files at one time. To do so, follow these steps.

Procedure


Step 1 Sign in to the Director.

Step 2 Click System in the Director menu bar then select Health from the list on the left of your screen.

Step 3 In the Download Logs area, take these actions:

a. From the Date drop-down list, select the date of the log files that you want.

b. From the Module drop-down list, select the module for which you want log files.

c. From the Node drop-down list, select the Cisco WebEx Social node for which you want log files.

d. Click Download.

e. In the dialog box that appears, make settings as desired, then click OK to open or save the log files.


Viewing Health Status

The Health area of the Health page displays the health status of various services that run on each Cisco WebEx Social node. The information in this area refreshes automatically every 60 seconds.

Service status is divided into these categories:

Critical—The service has failed or has exceeded critical levels

Warning—The service has experienced a non-critical error

OK—The service is performing as expected

The display near the top of the screen indicates how many messages in each category are displayed. The system retains messages indefinitely.

The health status includes the following information for each service:

Service—Name of the service

Host—FQDN of the hose that is reporting the status

Duration—Length of time that the report has been running

Flapping—Indicates whether the report is periodically changing status is in same state for the period that is indicated by Duration

Message—System generated message that provides additional information

Application Pages

The Application pages in the Director let you configure and manage various portal, security, and integration settings.

The following section describe the Application pages in detail:

Application: Portal

Application: Security

Application: Integration

Application: Portal

The Portal page provides areas for configuring a variety of items that relate to your Cisco WebEx Social deployment. The following sections describe these areas:

Compliance Officer Email

Error Reporting

Welcome Post Configuration

Proxy Settings

Advanced Portal Properties

Compliance Officer Email

Use the options in the Compliance Officer Email Area in the Portal page to configure how you want emails from a compliance officer to appear when they are sent to users.

To configure the compliance officer email, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Portal from the list on the left of your screen.

Step 3 In the Compliance Officer Email area, take these actions:

a. In the Name field, you can leave the default "Compliance Manager" or change it to a different name. A user sees this name when receiving an email from the company compliance officer.

b. Make sure that the default selection of Compliance Officer appear in the Role Name drop-down list.

c. In the Address field, enter the email address of your compliance officer. A user sees this name when receiving an email from the company compliance officer.

Step 4 Click Save.


Related Topic

Compliance Officer Role

Error Reporting

Use the options in the Error Reporting area in the Portal page to configure actions that occur when a user clicks links in the Cisco WebEx Social Help window. For related information, see the "Configuring Items in the Help Window" section.

To access the Error Reporting area, sign in to the Director, click Application in the Director menu bar then select Portal from the list on the left of your screen.

The Error Reporting area includes these fields:

Portal Help Link—Not used

Send Feedback Link—Page that appears when users click the Send Feedback link in the Cisco WebEx Social Help Window

System Admin Guide Link—Page that appears when users click the See system admin guide link in the Cisco WebEx Social Help window

Portal Feedback Link—Not used

Tutorial Videos Link—Page that appears when users click the View Tutorial Videos link in the Cisco WebEx Social Help window

If you make changes to any of these fields, make sure to click the Save button in the Error Reporting area to save your changes.

Welcome Post Configuration

Use the options in the Welcome Post Configuration area in the Portal page to set up a welcome post that you want to appear in the library of a each new Cisco WebEx Social user. You can designate the name that users see as the creator of the post, the title of the post, and the text of the post.

To set up a welcome post for new Cisco WebEx Social users, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Portal from the list on the left of your screen.

Step 3 In the Welcome Post Configuration area, take these actions:

a. In the Admin First Name field, enter the first name of the system administrator.

This name and the last name that you enter in the next field appear as the creator of the post.

b. In the Admin Last Name field, enter the last name of the system administrator.

c. In the Post Title field, enter the title of the post.

d. In the Post Body field, enter the text of the post in HTML format.

e. Click Save.


Proxy Settings

Use the options in the Proxy Settings area in the Portal page to configure Cisco WebEx Social nodes to use an existing proxy server to access services that are outside of Cisco WebEx Social. You can then set up your Cisco WebEx Social nodes to communicate with remote servers via a proconfigured proxy server.

Cisco WebEx Social supports HTTP and HTTPS proxy to access remote servers and connects to the proxy server by using whichever protocol the proxy server requires. If the proxy supports both HTTP and HTTPS, Cisco first attempts to connect using by HTTP. If HTTP fails, Cisco WebEx Social attempts to connect by using the HTTPS settings.

The App Server nodes use the proxy or proxies that you configure.

Configuring Settings

To configure proxy settings. Be aware that this procedure causes App Server nodes to restart automatically.

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Portal from the list on the left of your screen.

Step 3 In the Proxy Settings area, take these actions:

a. Enter values for the fields that Table 5-4 describes.

b. Click Save.

The App Server nodes restart automatically.


Table 5-4 Proxy Settings 

Parameter
Description

HTTP Settings

Host/IP

Fully qualified domain name or IP address of the proxy server.

Port

Port on the proxy server that nodes in the Cisco WebEx Social environment use to communicate with the proxy.

The typical port for HTTP communication is 80.

Username

User ID that the proxy server requires for authentication.

Required if proxy server requires authentication.

Password

Password that the proxy server requires for authentication.

Required if proxy server requires authentication.

Authentication type

Drop-down list from which you select the authentication type that the proxy server uses.

(Required if proxy server requires authentication.)

Use the same settings for HTTPS

Checking this box populates the HTTPS (Secure) Settings fields with the same information that you entered in the HTTP Settings field.

HTTPS Settings

Host/IP

Fully qualified domain name or IP address of the proxy server.

Port

Port on the proxy server that nodes in the Cisco WebEx Social environment use to communicate with the proxy.

The typical port for HTTP communication is 8080.

Username

User ID that the proxy server requires for authentication.

Required if proxy server requires authentication.

Password

Password that the proxy server requires for authentication.

Required if proxy server requires authentication.

Authentication type

Drop-down list from which you select the authentication type that the proxy server uses.

(Required if proxy server requires authentication.)

Exceptions

Exceptions

Host name or IP address of each node to which Cisco WebEx Social should connect directly. All nodes in your Cisco WebEx Social topology should be entered here so that request between them are not redirected to the proxy server.

If you make multiple entries, separate each one with a pipe symbol (|).

Do not include any spaces in this field.

You can use an asterisk (*) in a host name or IP address as a wildcard to represent one or more characters. For example if all servers in the webexsocial-cisco.com domain should be connected directly from Cisco WebEx Social, you could enter *.webexsocial-cisco.com.


Disabling Proxy Settings

To stop using a proxy server, perform the following steps. Be aware that this procedure causes App Server nodes to restart automatically.

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Portal from the list on the left of your screen.

Step 3 In the Proxy area, take these actions:

a. Clear the values in all fields.

b. Click Save.

All proxies are removed and the App Server nodes restart automatically.


Advanced Portal Properties

The Advanced Portal Properties area allows various Cisco WebEx Social properties to be changed.

For a property that can be set to true or false, a value of true is inferred if the property is set to true, t, y, on, or 1. A value of false is inferred if the property is set to any other value or if the property has an empty value.

To change these properties, perform the following steps.


Caution Do avoid disrupting the operation of Cisco WebEx Social, update properties only when instructed to do so by Cisco technical support or when you are certain of the changes that you are making.

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Portal from the list on the left of your screen.

Step 3 (Optional) To designate the number of portal properties that appear on each page in this area, select the number from the Show drop-down list.

Step 4 Locate the property that you want to change.

To do so, you can either:

Scroll through the list of properties, using the Next and Previous buttons as needed to go to other pages of the list.

Type part of all of a property name in the Search field. The system automatically displays matching properties as you type.

Step 5 and enter the new value in the Value field.

Step 6 Click Save.

The App Server nodes restart automatically.


Advanced Portal Properties for the Cisco WebEx Social API

The Advanced Portal Properties area in the Portal page of the Director includes properties that control the operation of the Cisco WebEx Social Application Programming Interface (API). Table 5-5 describes these properties.

Table 5-5 Advanced Portal Properties for Cisco WebEx Social API 

Parameter
Description
Valid Values

quadapi.oauth.token-request-expire-ms

Number of milliseconds after it is created that a Request Token expires.

This parameter applies to the Cisco WebEx Social API.

Valid values are integer 1 or greater.

The default value is 300000 (5 minutes).

quadapi.oauth.token-access-expire-ms

Number of milliseconds after it is created that a Access Token expires.

This parameter applies to the Cisco WebEx Social API.

Valid values are any integer.

The default value is 1800000 (30 minutes). 0 means never expire.

quadapi.oauth.max-verifier-callback-
count

Number of times that oauth_verification will be tried to be exchanged. After that, the exchange fails.

This parameter applies to the Cisco WebEx Social API.

Valid values are any integer.

The default value is 5.

quadapi.oauth.version

Specifies the OAuth version that is used for the Cisco WebEx Social API.

Must 1.0.

quadapi.auth.user-cache-expire-secs

Maximum number of seconds that user log in credentials are stored in cache.

This parameter applies to the Cisco WebEx Social API.

Valid values are any integer.

The default value is 600 (10 minutes).

quadapi.auth.allowBasicAuthentication

Designates whether to allow base 64 encoding for authentication of API calls

Valid values are true and false.

The default value is true (allow base 64 encoding).

quadapi.auth.resourcesForBasic
Authentication

Comma-separated list of resources for basic access authentication (user ID and password encoded with the base 64 algorithm)

Valid values are:

ROOT—Cisco WebEx Social API server resource.

management/apiconsumers—
Designates the management/apiconsumer resource.

management/apiclients—Designates
the management/apiclients resource.

ALL—Makes all resources available by the Basic Access Authentication mechanism. By default, all resources other than those defined by ROOT and management/apiconsumers are protected by OAuth.

The default value is ROOT,management/apiconsumers, management/apiclients

quadapi.auth.quad-oauth-header

Enables or disables the Oauth header. If enabled, the custom Apache header is used for OAuth signature validation.

Valid values are true and false.

The default value is true (enables signature validation).

quadapi.common.events.allOn

Enables or disables the eventing framework.

Valid values are true and false.

The default value is false (which disables the eventing framework).

quadapi.contextpath.root

Sets the root context path for API URIs.

The value must be preceded with a slash (/).

The default value is /api/quad/rest.

quadapi.contextpath.url-rewrite-enabled

Enables or disables Cisco WebEx Social API URI rewrite.

Valid values are true and false.

The default value is false (which disables Cisco WebEx Social API URI rewrite).

quadapi.auth.allowed_unauthenticated
_methods

Reserved for future user.

quadapi.oauth.max-timestamp-age-ms

Range of valid timestamps, in milliseconds into the past and future. The total range of valid timestamps is twice this value, rounded to the nearest second. This range is used for validating an OAuth request.

The default value is 300000.

quadapi.oauth.max-verifier-callback-
count

Number of checks permitted for the OAuth callback token (verifier) if the OAuth verification fails.

The default value is -5.

quadapi.auth.quad-oauth-path-header

Used for computing the OAuth signature. Indicates if the URL path should be retrieved from the x-quad-oauth-path header or if it has to be calculated from the request.

Valid values are true and false.

The default value is true (URL path should be retrieved from the x-quad-oauth-path header).

quadapi.oauth.allow.preauthorized

Designates whether API consumers can can be preauthorized. A preauthorized API consumer does not have to go through the additional step of authorizing the client to obtain an verifier.

Valid values are:

listed —Only the API consumers that are listed in the quadapi.oauth.preauthorized
.consumers property are eligible for preauthorization

all—All API consumers are eligible for preauthorization

none—All API consumers must specifically be authorized by the user

The default value is listed.

adapi.oauth.preauthorized.consumers

Comma-separated list of API consumers that are eligible for preauthorization.

quadapi.oauth.allow.token.refresh

Indicates whether Access Token refresh is permitted using the oauth_session_handle.

Valid values are true and false.

The default value is true (Access Token refresh is permitted using the oauth_session_handle).

quadapi.oauth2.allow.preauthorized

Designates whether the clients can be preauthorized. A preauthorized client does not require a user to go through the additional step of authorizing the client to obtain an authorization code.

Valid values are:

listed—Only the clients that are listed in the quadapi.oauth.preauthorized.clients property are eligible for preauthorization

all—All clients are eligible for preauthorization

none—All clients must specifically be authorized by the user

The default value is listed.

quadapi.oauth2.preauthorized.clients

Comma-separated list of clients that are eligible for preauthorization.

quadapi.oauth2.allow.token.refresh

Indicates whether Access Token refresh is permitted using the refresh_token.

Valid values are true and false.

The default value is true (Access Token refresh is permitted using the refresh_token)


Application: Security

The Security page provides areas for configuring a variety of items that relate to your Cisco WebEx Social deployment. The following sections describe these areas:

Cluster Security

Kerberos Properties

SAML SSO

WebEx SSO

WebEx IM SSO

Mobility

Add New Trusted Certificate

Trusted Certificates

Trusted Certificates

HTTPS/SSL

Cluster Security

Provides an option for configuring SSL termination. From the Terminate SSL on drop-down menu, choose one of these options:

Choose NONE if SSL is not used in your environment

Choose LOADBALANCER to terminate SSL on the load balancer and send traffic to Cisco WebEx Social via HTTP

Choose APPSERVER to terminate SSL on App Servers

If you change the value in the Terminate SSL on field, click Save in the Cluster Security area to save your changes.

Kerberos Properties

Kerberos is an authentication protocol that allows devices to communicate securely over a non-secure network. With Kerberos, user passwords are not circulated among nodes. Instead, only tickets are circulated.

You should configure Kerberos in Cisco WebEx Social deployments in which Kerberos is the authentication method for external applications. The Kerberos area provide options for performing this configuration.

Before You Begin

Create a service principal name (SPN) for the Cisco WebEx Social load balancer on the Microsoft Active Directory server. For instructions, see your Microsoft Active Directory documentation.

Create a service account in Microsoft Active Directory to be used to generate a keytab file.

Use the SPN and service account that you created to generate a keytab file and name it krb.keytab. For instructions, see your Microsoft Active Directory documentation.

Copy the keytab file that you generated to the /etc/kerberos/ folder on each App Server node. Create this directory if it does not exist.

Make sure that each App Server node can access port 389 on the LDAP server.

Make sure that each App Server node can reach the content repository server on the port that is configured for that server. See the "Content Repositories" section.

LDAP must be configured in the Portal tab. See the "Authentication" section.

Make Kerberos configuration settings in the Portal tab of the Control Panel. See the "Users" section.

To configure Kerberos on Cisco WebEx Social nodes, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Security from the list on the left of your screen.

Step 3 In the Kerberos area, take these actions:

a. Check the Apply to App Server Nodes box.

b. In the Server Name field, enter the host name of a Microsoft Active Directory server in your network.

Cisco WebEx Social validates users by using tickets against this server.

c. In the Realm Name field, enter the Microsoft Active Directory realm for Kerberos.

The value that you enter must be in all upper case letters.

See your Kerberos documentation for additional information about realms.

d. In the Domain Name field, enter the Cisco WebEx Social domain name.

e. In the Service Name field, enter the name of the service principal for the Cisco WebEx Social load balancer

f. In the Service Account Name field, enter the user name for the service account that is defined in Microsoft Active Directory for the Cisco WebEx Social load balancer SPN.

g. In the Service Account Password field, enter the password for the service account that is defined in Microsoft Active Directory for the Cisco WebEx Social load balancer SPN.

h. Click Save.


SAML SSO

The options in the SAML SSO area are not used for an on-premises installation of Cisco WebEx Social. For more information, contact your Cisco representative.

WebEx SSO

Use the options in the WebEx SSO area in the Security page to configure the WebEx single sign-on (SSO) parameters.

For detailed information about configuring WebEx, see the "WebEx Site" section.

To configure the WebEx SSO parameters, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Security from the list on the left of your screen.

Step 3 In the WebEx SSO area, take these actions:

a. Enter values for the fields that Table 5-6 describes.

b. Click Save.

The App Server nodes restart automatically.


Table 5-6 WebEx SSO Parameters 

Item
Description

Keystore File

Keystore file that you are using for WebEx.

Use the Browse button to locate and select the keystore file.

Keystore Password

Password for the keystore that you are using for WebEx.

Key Password

Password for the key that you are using for WebEx.


WebEx IM SSO

Use the options in the WebEx IM SSO area in the Security page to configure the WebEx IM single sign-on (SSO) parameters.

For detailed information about configuring WebEx IM, see the "Using WebEx IM for Chat and Presence" section.

To configure the WebEx IM SSO parameters, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Security from the list on the left of your screen.

Step 3 In the WebEx IM SSO area, take these actions:

a. Enter values for the fields that Table 5-7 describes.

b. Click Save.

The App Server nodes restart automatically.


Table 5-7 WebEx IM SSO Parameters 

Item
Description

Keystore File

Keystore file that you are using for WebEx IM.

Use the Browse button to locate and select the keystore file.

Keystore Password

Password for the keystore that you are using for WebEx IM.

Key Password

Password for the key that you are using for WebEx IM.

SSO Alias

Key alias to be used for WebEx SSO.


Mobility

The Mobility area includes the OAuth Client URL field. This field designates the URL the of the client that provides OAuth authentication for mobile devices that are running Cisco WebEx Social 3.1 for iPhone and iPad.

Enter the URL in this format:

[http: | https:]//host_FQDN

If you make changes in the OAuth Client URL field, click Save in the Mobility area to save your changes.

Add New Trusted Certificate

Use the options in the Add New Trusted Certificate area in the Security page to add a new trusted certificate to Cisco WebEx social. A trusted certificate is a third-party certificate that you can use instead of a self-signed certificate. When you add a trusted certificate, it is saved to a local database and appears in the Trusted Certificates area in the Security page, but it is not deployed. To deploy a trusted certificate, see the "Trusted Certificates" section.

To add a new trusted certificate, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Security from the list on the left of your screen.

Step 3 In the Add New Trusted Certificate area, take these actions:

a. In the Alias field, enter the alias to be used for the trusted certificate.

b. In the Trusted Certificate field, click the Browse button to browse your local computer for the trusted certificate file. Select the file and click Open.

The name of the certificate is displayed in the Trusted Certificate field.

c. Click Save.


Trusted Certificates

Use the options in the Trusted Certificates area in the Security page to deploy and delete trusted certificates.

When you deploy trusted certificates, the following events occur:

The certificates are pushed to each App Server node and appended to the existing certificates file on each node

The App Server nodes and the Notifier nodes restart

When you delete a trusted certificate, it is removed from Cisco WebEx Social.

The Trusted Certificates lists each trusted certificate that has been added to Cisco WebEx Social, and displays the alias, subject, issuer, and expiration date and time of each one.

Deploying Trusted Certificates

Before you can deploy a trusted certificate, it must be added to Cisco WebEx social as described in the "Add New Trusted Certificate" section.

To deploy trusted certificates, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Security from the list on the left of your screen.

Step 3 In the Trusted Certificates area, click the Deploy Trusted Certificates button.

All certificates in the Trusted Certificates area are deployed.


Deleting a Trusted Certificates

To delete a trusted certificate, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Security from the list on the left of your screen.

Step 3 In the Trusted Certificates area, click the Delete button in the Actions column for the trusted certificate to delete.


HTTPS/SSL

If you set the Terminate SSL on option to APPSERVER in the Cluster Security area of the Security page, you can use the following options in the HTTPS/SSL area to optionally designate the following:

Certificate—Third-party certificate that is used for SSL authentication

Private Key—Private key that is used for SSL authentication

To designate either of these items, click the corresponding Browse button, then navigate to and select the item.

If you make changes in the Certificate field or the Private Key field, click Save in the HTTPS/SSL area to save your changes.

Application: Integration

The Integration page provides areas for configuring a variety of items that relate to your Cisco WebEx Social deployment. The following sections describe these areas:

SharePoint (Native)

Email Configuration

WSRP Settings

Chat Proxy

SharePoint (Native)

Use the options in the SharePoint area to make some configuration settings that are required when Microsoft 2007 SharePoint is to be used as a document repository.

For more detailed information about repositories and SharePoint, see the "Content Repositories" section.

Before You Begin

Configure SharePoint as described in the "Content Repositories" section.

To configure SharePoint, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Integration from the list on the left of your screen.

Step 3 In the SharePoint (Native) area, take these actions:

a. Check the SharePoint Integration Enabled box.

b. In the SharePoint URL field, enter the URL of the SharePoint site document library to which Cisco WebEx Social is to connect.

The URL should be in this format:

http://sharepoint_host/sharepoint_site/document_library

where:

sharepoint_host—IP address host name of the SharePoint server or farm.

sharepoint_site—Name of the SharePoint sites. You can include subsite names. If you specify subsites, separate each site with a slash (/).

document_library—Name of the document library.

The following example shows a URL that includes one site:

http://mysharepointhost/mysharepointsite/mydocumentlibrary
 
   

The following example shows a URL that includes a subsite:

http://mysharepointhost/mysharepointsite/ 
mysharepointsubsite/mydocumentlibrary
 
   

c. Click Save.

The App Server nodes restart automatically.


Email Configuration

Use the options in the Email Configuration area i to set up the email integration feature. Email integration can include the following:

Digest notification (also called WebEx Social Activity Snapshot)—An email message that contains a summary of Cisco WebEx Social activities that a user is interested in. A digest notification can include information about new followers, posts, community memberships, and community discussions that apply to the user. Users can receive digest notifications daily (these notifications include a summary of activities that occurred that day) or weekly (these notifications include a summary of activities that occurred the past week).

Instant notification—An email notification that is sent to a user immediately after certain actions occurs in Cisco WebEx Social. For example if User A starts to follow User B, mentions User B, or shares a post with User B, User B receive an instant notification of the action.

System announcements and alerts—See "Sending Manual Announcements and Alerts."

Inbound email—Allows users to create content in Cisco WebEx Social by replying to some instant notifications. For example if you reply by email to an @mention email notification, you create a comment on this update in Cisco WebEx Social just as if you created the comment through the Cisco WebEx Social user interface.

To enable Inbound email, Cisco WebEx Social creates unique, auto-generated email addresses for communities and discussion categories. The domain in which these email address are set as described in the procedure in this section. in addition to the configuration that the procedure describes, you must configure your DNS server so that it knows how to route email addressed to auto-generated Cisco WebEx Social email addresses. To do so, create these resources:

A forward zone for your mail domain.

An MX record in your new forward zone for the Worker node. If you have multiple Worker nodes you can add an MX record for each of them, which will also enable DNS load balancing.

Configuring General Email Parameters

To configure general email parameters for your system, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Integration from the list on the left of your screen.

Step 3 In the Email Configuration area, take these actions:

a. In the Mail Domain field, enter the SMTP domain of the Cisco WebEx Social application.

b. In the Message Size Limit field, enter the maximum size in bytes of an inbound or outbound email message, including envelope information, that Cisco WebEx Social can handle. The default value is 10240000 bytes.


Note Setting this option to a value that is too low or too high can cause the loss of non-delivery notifications or bounced messages.


c. In the Mail Networks field, enter a list of IP addresses of client servers that can use the Postfix Mail Transfer Agent (MTA) for email messages.

At a minimum, enter the IP addresses of the App Server nodes and the Worker nodes in your deployment.

Separate multiple IP addresses with commas (,).

d. Click Save.


Configuring Inbound Email

To configure the inbound email parameters, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Integration from the list on the left of your screen.

Step 3 Make sure that general email parameters are configured as described in the "Configuring General Email Parameters" section.

Step 4 In the Inbound Email area, take these actions:

e. Check the Enable Inbound Mail box so that incoming email adheres to Cisco WebEx Social policies and permissions.

If you do not check this box, incoming email bounces.

f. Check the Enable Expand Sender or Mailing List box if you want Cisco WebEx Social to use the SMTP EXPN command to expand mailing lists to identify email senders.

g. Check the Enable Failure Feedback if you want Cisco WebEx Social to provide feedback as an automatically-generated email message when an inbound email cannot be delivered. When you enable this option, a community administrator can designate where the delivery error message is sent by using the Error Reporting option in the Edit Community Email page of a community.

h. Click Save.


Configuring Outbound Email

Use the options in the Outbound Email area to configure the email relay host and relay TCP port.

To configure the Outbound Email parameters, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Integration from the list on the left of your screen.

Step 3 Make sure that general email parameters are configured as described in the "Configuring General Email Parameters" section.

Step 4 In the Outbound Email area, take these actions:

a. Check the Enable Outbound Mail box.

b. In the Email Relay Host field, enter the name of the email relay host.

c. In the Email Relay TCP Port field, enter the number of the email relay TCP port.

d. Click Save.

e. Click Save.


Configuring Email Digest

To configure email digest, follow these steps:

To configure the Outbound Email parameters, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Integration from the list on the left of your screen.

Step 3 Make sure that general email parameters are configured as described in the "Configuring General Email Parameters" section.

Make sure that inbound email parameters are configured as described in the "Configuring Inbound Email" section.

Make sure that outbound email parameters are configured as described in the "Configuring Outbound Email" section.

Step 4 In the Email Digest area, take these actions:

a. In the Weekly Digest Notification Date (day:hh:mm:timezone) field, choose day of the week and the time and time-zone offset at which weekly email digest notification is summary is sent each week.

b. In the Daily Digest Notification Time (hh:mm) field, choose the time at which a daily email digest notification is summary is sent each day. A setting of 0 0 indicates midnight.

c. Click Save.

d. Configure announcement items as described in the "Announcement Rate Control" section.


Announcement Rate Control

To configure the announcement rate control items, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Integration from the list on the left of your screen.

Step 3 In the Announcement Rate Control area, take these actions:

e. In the Announcement Destination Recipient Limit field, enter the maximum number of recipients per outgoing email. For larger audiences multiple identical emails are generated, addressing no more recipients than what is specified with this limit. The recommended value is 20. If this field is not set, Cisco WebEx Social defaults to 50 recipients, which is the default value set in Postfix.

f. In the Announcement Destination Rate Delay field, enter the number of seconds for which Cisco WebEx Social waits before sending the next mass email (see Announcement Destination Recipient Limit). The recommended value is 10s (ten seconds). Other supported suffixes are m for minutes and h for hours.

g. Click Save.


Configuring Properties for Email Integration

Table 5-8 describes the Cisco WebEx Social properties that control various items for the email integration feature.

To change the value of a property, in the Director, click Portal, and in the Advanced Portal Properties area, locate the property and update its value. Then click Save in the Advanced Portal Properties area and click Apply Config in the left panel of the Director. (For related information, see the "Advanced Portal Properties" section.)

Table 5-8 Properties for Email Integration 

Property
Explanation

communities.mailinglists.ui.adminonly

Set this property to true to disable the mailing list binding feature for community owners and community administrators. This way, only the Cisco WebEx Social Administrator is able to create discussion category to mailing list bindings.

mail.digest.notification.user-defaults

Set this property to weekly or daily to indicate the frequency at which the system sends email digest notifications.

mail.instant.notification.user-defaults

Set the property to any of combination of the following values to designate for what types of activities instant email notifications will be sent. If you include multiple values, separate each one with a comma (,) only (do not include spaces).

FOLLOW_ME

POST_MENTION

POST_SHARE

POST_SHARE_OTHER

POST_EDIT

POST_EDIT_CONTRIBUTED

POST_EDIT_WATCHLIST

COMMUNITY_JOIN_REQUEST

COMMUNITY_CREATE_REQUEST

COMMUNITY_ROLE_CHANGED

COMMUNITY_INVITE_ME

COMMUNITY_REQUEST_MEMBERSHIP

outbound.email.from.address

Set this property to the email address of the outbound email notification sender.

The default value is empty. In this case, the sender email address is noreply@mail_domain, where mail_domain is the value that you defined in the Mail Domain field as described in the "Configuring General Email Parameters" section.

outbound.email.from.name

Set this property to the name of the outbound email notification sender.

The default value is Cisco WebEx Social.

outbound.email.mailinglists.enabled

Set this property to true to enable the outbound notifications for all communities in Cisco WebEx Social. Set this property to false to disable the outbound notifications for all communities in Cisco WebEx Social.

outbound.enabled

Set this property to true to enable outbound email.

users.form.my.account.email-notifications

Set this property to email-notifications-quad and restart the App Server node if you want the Email Notifications selection to be available to users on their My Account pages.

If you leave this property blank, the Email Notifications selection is not available on the My Account pages.

users.form.update.email-notifications

Set this property to email-notifications-quad and restart the App Server node if you want the Email Notifications option to be available to administrators when they select Users from the Portal drawer.

If you leave this property blank, the Email Notifications option is not available to administrators on the Portal > Users page.

worker.digestscheduler.announcements.
bulkJobScheduleInterval

Set this property to specify the interval of time (in milliseconds) between two BulkJobs.

Valid values are 200 through 5000. The default value is 250.

worker.digestscheduler.announcements.
isActive

Set this property to true to enable the announcements scheduler. Set to false to disable it. The announcements scheduler works only if worker.digestscheduler.isActive is set to true.

The announcements scheduler periodically checks the database for pending email notifications for announcements and alerts and processes them.

The default value is true.

worker.digestscheduler.announcements.
mainJobRepeatInterval

Specify the milliseconds between two main job executions of the announcement scheduler.

Valid values are 10000 through 180000. The default value is 30000.

worker.digestscheduler.announcements.
maxSizeBulkJobs

Set this property to limit the maximum number of recipients that a single run of the BulkJob can process.

Valid values are 300 through 900. The default value is 600.

worker.digestscheduler.isActive

Set this property to true to enable the scheduler for email digest notifications.

worker.outbound.announcement.job.
recipient.limit

Set this property to limit the maximum number of recipients that the Java email job on the Worker node can process in a single outbound mass email.

This value must not exceed the value of the Announcement Destination Recipient Limit field that is set in the Director in Application > Portal > Email Configuration.

Valid values are 5 through 250. The default value is 30.


WSRP Settings

Use the options in the WSRP Settings area in the Integration page to configure the Web Services for Remote Portlets (WSRP) cluster link in your Cisco WebEx Social topology.

For detailed information about implementing WSRP, see the "WSRP" section.

Table 5-9 describes the parameters in the WSRP Settings area.

Table 5-9 WSRP Settings 

Parameter
Description

Cluster Link Enabled

Checking this check enables the cluster link

Autodetect Address

IP address of the WSRP cluster link gateway


Chat Proxy

Use the option in the Chat Proxy area in the Integration page to configure the chat proxy settings. A chat proxy enables Cisco WebEx Social to communicate with a chat server.

To configure the chat proxy settings, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Application in the Director menu bar then select Integration from the list on the left of your screen.

Step 3 In the Chat Proxy area, take these actions:

a. In the Chat Proxy URL field, enter the following, as appropriate:

If you are using Cisco Unified Presence (CUP) or WebEx IM for chat and presence, enter the BOSH binding URL

If you are using Microsoft OCS for chat and presence, enter the URL of the CWC client

If you are using IBM Lotus SameTime for chat and presence, enter the URL of the SameTime proxy server

b. From the Server Type drop-down list, select the type of chat proxy server to be used:

If you are using CUP, WebEx IM, or Microsoft OCS for chat and presence, select default

If you are using IBM Lotus SameTime for chat and presence, select sametime

c. Click Save.


Stats Page

The Stats page in the Director allows you to view statistics and metrics for various Cisco WebEx Social components. To view statistics and metrics, follow these steps:

Procedure


Step 1 Sign in to the Director.

Step 2 Click Stats in the Director menu bar.

Step 3 Select either of these tabs:

Dashboard—Lets you view a predefined set of statistics and metrics for Cisco WebEx Social nodes

Raw—Lets you view statistics and metrics for Cisco WebEx Social node component categories

Step 4 Click one of these buttons to choose a time range type for which to retrieve statistics:

Relative—Retrieves stats and metrics for the past number of minutes, hours, days, weeks, or months that you specific

Absolute—Retrieves stats and metrics for the date and time range that you specify

Step 5 Take either of these actions to choose the time range for the statistics:

If you chose the Relative time range, In the Fetch last field, enter the number of units for which you want to view metrics, and select the units for which you want to view metrics (minutes, hours, days, weeks, or months).

If you chose the Absolute time range:

a. Click the From field and choose the start date from the pop-up calendar.

b. Choose the start time from the drop-down list next to the From field.

a. Click the To field and choose the end date from the pop-up calendar.

b. Choose the end time from the drop-down list next to the From field.

Step 6 Take either of these actions:

If you selected the Dashboard tab, take either of these actions in the menu tree:

Check the box next to a node category to see combined statistics and metrics for all nodes of that type.

Expand a node type so see a list of individual nodes of that type, then check the box next to a node for which you want to view statistic and metrics. If you check the box for more than one node, combined statistics and metrics for those nodes are displayed.

If you selected the Raw tab, Use the Select Metrics menu tree to expand the component categories for which you want to view statistics and metrics. When you reach the node level, check the box that appears in front of each component for which you want to view statistic and metrics.

The metrics information is displayed in the graph in the main portion of the screen.