Skip to content

Mideye Admin Web: Access & Configuration

The Mideye Server uses a web interface for operation, administration, and management. Access it at:

https://<FQDN>:<ssl-port>

Default ports: 443 (Windows) or 8443 (Linux). The port can be reconfigured in application-prod.yml — see Application Configuration.


During installation, a self-signed SSL certificate is generated automatically. To replace it with a custom certificate, see Certificate Management.


A root user is created during server installation. This account should only be used for creating administrative accounts and for emergencies.

  1. Navigate to the encoding utility:
https://<FQDN>:<ssl-port>/utility/encode-password
  1. Enter your new password:

Encoding utility tool

  1. Copy the generated encoded password:

Encoded password output

  1. Execute the appropriate SQL command on the database:

MySQL / MariaDB:

UPDATE mideyeserver_db_name.mideye_user
SET jhi_password = 'encrypted_password'
WHERE user_name = 'root';

Microsoft SQL Server:

UPDATE mideyeserver_db_name.dbo.mideye_user
SET jhi_password = 'encrypted_password'
WHERE user_name = 'root';

MySQL / MariaDB:

UPDATE mideyeserver_db_name.mideye_user
SET is_locked = 0
WHERE user_name = 'root';

Microsoft SQL Server:

UPDATE mideyeserver_db_name.dbo.mideye_user
SET is_locked = 0
WHERE user_name = 'root';

Mideye Server has four user roles:

RoleDescription
RootSingle built-in account — use only for initial setup and emergencies
Super AdministratorSame permissions as root
AdministratorFull management except user operations on same or higher roles
OperatorRead-only access; can only update locked LDAP users

All roles except Root can be mapped to LDAP accounts.

EntityOperationAuthorized Roles
RADIUS ServerCreate / Update / DeleteRoot, Super Admin, Admin
RADIUS ServerReadRoot, Super Admin, Admin, Operator
RADIUS ClientCreate / Update / DeleteRoot, Super Admin, Admin
RADIUS ClientReadRoot, Super Admin, Admin, Operator
LDAP ProfileCreate / Update / DeleteRoot, Super Admin, Admin
LDAP ProfileReadRoot, Super Admin, Admin, Operator
Approved RADIUS IPCreate / Update / DeleteRoot, Super Admin, Admin
Approved RADIUS IPReadRoot, Super Admin, Admin, Operator
LDAP RADIUS TranslationCreate / Update / DeleteRoot, Super Admin, Admin
LDAP RADIUS TranslationReadRoot, Super Admin, Admin, Operator
AccountingReadRoot, Super Admin, Admin, Operator
Authentication LogReadRoot, Super Admin, Admin, Operator
Locked LDAP UsersUpdate / ReadRoot, Super Admin, Admin, Operator

  1. Navigate to Users and TokensMideye Users.
  2. Select ActionsAdd new database user.
  3. Set the Role to Super Administrator.
  4. Fill in the required fields:
    • Username
    • Authentication Type
    • Password
    • Phone number (optional)
    • Token number (optional)
    • Message type (default: FLASH-SMS)
    • Expiration date (optional)
  5. Select Web Admin in the RADIUS Client dropdown.
  6. Save. To add RADIUS User Attributes, edit the user again after saving.

Navigate to Mideye Users, find the user, and click the password change icon (between edit and delete).

A Super Administrator can only change passwords on accounts with lower permissions (Administrators, Operators, and database users).


Instead of database accounts, LDAP groups can be mapped to all roles except Root:

  1. Connect to LDAP with an LDAP Profile.
  2. Enable LDAP-RADIUS Translation and add the memberOf attribute.
  3. Navigate to RADIUS SettingsRADIUS Translation.
  4. Map LDAP user or group DNs to the predefined roles.

LDAP group mapping example