Page tree
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

MidPoint 3.7 and later

This is the guide that describes how to install midPoint as a service, how to properly configure it and how to control it. This guide may be too complex if all you want is just to try midPoint. In that case please see the tips in Installation Guide page.


This page describes the steps required to install midPoint Identity and Access Management from a binary distribution. MidPoint is a Java web application distributed in a form of a stand-alone self-contained server.

Before You Start

There are few things to check before you start the installation:

  • Make sure to see Release Notes for list of environments that are known to work and for the list of known issues in current release.

  • Check the System Requirements


Java SE Development Kit 8

The development environment requires at least JDK 8. You can use OpenJDK wich might be already installed on your system of you can download JDK from Oracle.

JAVA_HOME environment variable should point to the JDK installation path.

Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files 8

Optional AES-128 is used by default for encrypt/decrypt operations, so JCE is not needed. If you want to use bigger key size, e.g. AES-256, then JCE is required for cryptographic operations. You can download it at After downloading zip file follow installation instructions written in README.txt

Java 8 only

MidPoint 3.7 is supported only on Java 8 platforms. MidPoint supported both Java 7 and Java 8 for several years. The support for Java 7 was deprecated in midPoint 3.4.1 and it was removed in midPoint 3.5.

Download MidPoint

Download the midPoint binary release from Evolveum download site.

Install MidPoint

Unpack the archive file to an installation directory. Following directory locations are recommended:

Operating systemInstallation directory
Linux and other UNIX systems/opt/midpoint
WindowsC:\Program Files\midpoint

Following instructions will refer to the relative paths inside the installation directory.




Run Control


Setting Up a Service


TODO: run as non-root user. set file permissions


MidPoint encrypts some data to protect sensitive parts of the database such as passwords. First start of midPoint generates and encryption key for you. But it generates a short encryption key that is suitable both for use by export-limited and full-strength cryptography modules. Therefore is full-strength JCE extension was installed it is recommended to change the encryption key to a full-strength key. It can be achieved by keytool utility. The Encryption and Keys page describes the procedure.

See Also

  • No labels