Skip to content

Mideye Pre-Install: Hardware & Network Checklist

ResourceLinuxWindows
RAM4 GB minimum8 GB minimum
Disk10 GB free10 GB free
PlatformPhysical or virtualPhysical or virtual

A user account with administrator rights is required to install the software, restart services, and reboot the operating system.

VersionStatus
Windows Server 2025 (64-bit)✅ Supported
Windows Server 2022 (64-bit)✅ Supported
Windows Server 2019 (64-bit)✅ Supported
Windows Server 2016 (64-bit)✅ Supported
VersionStatus
Ubuntu 24.04 LTS✅ Supported
Ubuntu 22.04 LTS✅ Supported
Ubuntu 20.04 LTS✅ Supported
Debian 12 (Bookworm)✅ Supported
Debian 11 (Bullseye)✅ Supported
VersionStatus
RHEL 9 / Rocky 9 / Alma 9✅ Supported
RHEL 8 / Rocky 8 / Alma 8✅ Supported
PlatformStatus
Docker🔜 Planned
Podman🔜 Planned

The database is not included in the installation package and needs to be created before proceeding with the installation.

When Mideye Server 6 connects to a clean database it will populate it. When RADIUS Shared Secrets are added, the Mideye Server will encrypt them in the database. Make sure to have the keystore and the keystore key backed up in case they need to be retrieved at some point. Read more about this in the Database section of the Reference Manual.

Several Mideye Servers can be connected to a database cluster and share the database. This brings up two concerns:

  • One of the servers must be made Cluster Leader.
  • The RADIUS Shared Secrets stored in the database are encrypted. Because of this the keystore and the keystore key needs to be replicated to all Mideye Servers.

Read more about this in the Shared Database Clusters section.

DatabaseSupported VersionsNotes
Microsoft SQL Server2016, 2017, 2019, 2022Express edition also supported*
MariaDB10.5, 10.6 LTS, 10.11 LTS, 11.xRecommended for Linux
MySQL8.0, 8.4 LTSCommunity and Enterprise editions

*SQL Server Express edition is also supported and most common in single server setups.


Note the following:

  • Host name / IP address.
  • Database type (Microsoft SQL or MySQL).
  • SQL account name and password.
  • Database name (default: mideye).
  • Instance name (if applicable).

The database can be installed locally or be hosted remotely on another server. If two or more Mideye Server 6 is connected to the same database one of them needs to be set as Cluster Leader.

Note the following:

  • LDAP service account with read-rights for Mideye Server user search.

Integration manuals for the RADIUS client (e.g. VPN-concentrator, Citrix portal etc) can be found under the Integrations section.

Note the following:

  • IP Address
  • RADIUS port
  • RADIUS shared secret
  • If PAP or MS-CHAPv2 is used. Note: For MS-CHAPv2, a Microsoft Network Policy Server (NPS) is required.
  • Ensure the firewall is open for two-way communication between RADIUS client and Mideye Server on the selected RADIUS port (default: udp/1812). If installing on Windows the installation package will automatically add firewall rules for RADIUS and the TCP-port that is being used by the web-interface. Note that these firewall rules by default will only allow traffic on the Ethernet port if its “Network profile” is set to “Private”. These firewall openings must be added manually when installing on Linux-based operating systems.

  • Note the public IP used by the Mideye Server when communicating with the Mideye Switch on a customer-specific TCP port assigned by Mideye.

  • Request a firewall opening and customer specific TCP port from support@mideye.com.

  • Verify that the firewall is open for outgoing TCP traffic from the Mideye Server to 217.151.192.84 and 79.136.112.54 on the customer-specific port.

  • For simplified Mideye+ activation, the Mideye Server also needs access to the following URLs:
    https://activate01.mideye.com:443
    https://activate02.mideye.com:443
    https://activate01.mideye.com/health

Note the following:

  • Proxy server IP address
  • Port number
  • SOCKS version

Request login credentials to the Downloads page from support@mideye.com. Include your mobile number in the request, since login is protected with two-factor authentication.