As an administrator, view and manage settings that are configured for the Control Room.
To view the following configuration details, go to:
- Control Room installation type, access URL, and the program files destination folder from the Control Room.
- Website security and configuration details, Control Room users, database and repository details, deployment settings, and security details in the Control Room database and software.
The general settings tab provide information about the installation type, the access URL, and the program files' destination folder. You cannot edit these settings as they are configured during installation.
The following table describes the general settings:
|Control Room Installation type||The type of setup used to install the Control Room: either Express or Custom. This setting is configured during installation and is not editable.|
|Control Room access URL||The fully qualified name of the server that is used by the Bot Creator, Bot Runner, and users to access the
Control Room. Use the Control Room access
URL in the following scenarios:
Opt to change the access URL if the Control Room is set up in custom mode.
To modify the URL, perform these steps:
Edit and view Control Room database and software configuration
The Control Room database and software settings provide details about website security and configuration, Control Room users, database, and repository, deployment, and security settings. Edit the settings for the Control Room repository, deployment, and password.
The following table describes the Control Room database and software settings:
|Website security||The type of security protocol used:
|Website configuration||The website configuration details such as the web server host name. If
the Control Room is configured for Express installation, only
one host name is shown. If it is configured for Custom installation,
multiple host names are shown. This setting is configured during
installation and is not editable.
The web server host name and port details of all registered and active users are listed. However, the user name and password values are not shown.
|Control Room users||The authentication type used to log in to the Control Room instance by bots. It can be Active Directory, single sign-on (SSO) SAML, or
database. This setting is configured during installation and is not
|Control Room database||
Shows the settings for:
This setting is configured during installation and is not editable.
Database password: You can now update the database password in the Control Room.
Note: Change the database password during a scheduled downtime and just before the actual password changes for the database. Once the database password is changed in the Control Room, Automation Anywhere Enterprise will not work until the password is changed for the database.To update the password, perform these steps:
To configure the database settings for the external key vault (CyberArk), perform these steps:
|Control Room repository||The location where all bots, application files, and
supporting files are stored. The default path is set to
during installation, if this is not updated during installation. You can
modify this path after installation through this
To modify, perform these steps:
Bot Runner deployment session: Shows whether
users with run and schedule privileges are allowed to run a Bot Runner session on Control Room when you
deploy or schedule a bot.
By default, this setting is Enabled.To modify the setting, perform these steps:
Callback URLs: Allows a user to configure known callback URLs for the
Bot Deployment API to send the bot status and the bot output from variables after the bot has finished
To modify the setting, enter the Callback URL in the field and save your changes.
|Security||This field defines the password policy settings for all Control Room users. Customize the password length, password
content, select the number of log-on attempts allowed, and enable or disable
security-related questions and answers.
The password policy is applicable for a Control Room that is configured for Database authentication type.
To modify this, perform these steps:
|Elasticsearch disaster recovery backup cluster||
This field defines the disaster recovery server IP address for Elasticsearch disaster recovery.
Enter the IP address for your Automation Anywhere Enterprise disaster recovery site. Elasticsearch is installed on the same server as the Control Room.
|API key duration||This defines the validity of the Authentication API key, in days or
minutes, for a user.
To specify the duration or validity of the API key in either day(s) or minute(s), click the plus and minus sign.
|Login banner settings||The banner settings enable the admin user to configure a banner text and
display it on the login page of the Control Room and Enterprise Client. This setting can provide legal protection in a secured
To configure or modify the setting, perform these steps:
All updates to the configuration settings are captured in the Audit Log page and all the actions performed to edit the general settings.
To view details of each audit entry:
- Go to the required data and move your mouse over view details icon.
- Click on the view Audit details icon.
- View the entries that are changed in the details page that is launched.
To view the details for successfully disabling a Bot Session, open the Control Room and go to the password policy setting.