Identify ${site} folder, where your application files are by finding ${site}/web.config file
Policy agent settings are in ${site}/web.config file. add following settings to <appSettings> section:
<add key="com.sun.identity.agents.config.naming.url" value="" />
<add key="com.sun.identity.agents.config.organization.name" value="/" />
<add key="com.sun.identity.agents.app.username" value="" />
<add key="com.iplanet.am.service.password" value="" />
<add key="com.sun.identity.agents.config.key" value="" /> <!--skip this setting, if password is not encrypted)-->
<add key="com.sun.identity.agents.config.local.log.path" value="${basedir}/App_Data/Logs"/> <!--override log files path-->
Settings values provided by OpenAM server administrator or could be found in c:iis7_agentIdentifier_${site_id}configOpenSSOAgentBootstrap.properties file from previous installation.
Policy Agent could be enabled in section <httpModules> in ${site}/web.config file:
<add name="iis7agent" />
<add name="OpenAM" type="ru.org.openam.iis.OpenAMHttpModule"/>
IMPORTANT: new section must be first entry after <httpModules> tag or after <clear/> tag inside <httpModules>, if it exists
Policy Agent could be disabled in <httpModules> section of ${site}/web.config file:
Remove entry:
<add name="OpenAM" type="ru.org.openam.iis.OpenAMHttpModule"/>
Example settings ${site}/web.config: https://github.com/OpenIdentityPlatform/OpenAM-.Net-Agent/blob/master/ru.org.openam.iis.site.sample/web.config
The server uses non-trusted certificate. Add server certificate to trusted list or disable strict certificate check (not recommended in production):
<add key="com.sun.identity.agents.config.trust.server.certs" value="true"/>
Networking equipment does not properly handle maintaining keepalive network connections, try to prohibit keepalive connections:
<add key="org.openidentityplatform.agents.config.keepalive.disable" value="true"/>