Installing Control Room on Google Cloud Platform
Log in to a Google Cloud Platform (GCP) server instance as administrator. Then download and start the Control Room installer and install in Custom mode.
Note: There are many possible system configurations and requirements. These installation steps do not account for all those possibilities so your specific setup and installation steps will vary and Automation Anywhere does not make any warranties that these steps conform with your specific configurations.
Complete the prerequisites for installation:
- Verify Automation 360 On-Premises prerequisites.
- Ensure that you have the following:
- Automation Anywhere Control Room installation file
- TLS certificate
- License file
Prepare to install Control Room on Google Cloud Platform
Ensure that you complete the required steps to prepare the Google Cloud Platform instances for installing the Control Room.
Perform custom installation of Control Room on Google Cloud Platform
Install and apply the customized configuration required for the Control Room cluster on Google Cloud Platform after completing initial preparations.
Configure Google Cloud Platform settings after installation
After installing the Control Room, configure the required settings on Google Cloud Platform.
Complete the Control Room configuration and validation.
Complete Control Room post-installation configuration
After installing the Control Room, complete the configuration settings to ensure timely Automation Anywhere communications are specified and confirm Automation Anywhere services are running.
Post-installation user management
After completing the post-installation tasks, validate the setup by logging in to the Control Room and installing a license. First time access to the Control Room walks you through the configuration for your authentication method.
- Complete Control Room post-installation configuration
Manage your users
As a Cloud user with administrator permissions, you can create, view, edit, delete, and enable or disable a user. Creating users steps vary depending on whether the user is a non-Active Directory, Active Directory, or single sign-on (SSO) user from an IdP server.