Installing Tidal Repository on Windows

To install Tidal Repository on Windows:

  1. Download the Tidal-Repository-Release-Windows-<build number>.zip from https://support.tidalsoftware.com.

  2. Extract the archive. The location where the archive was placed now contains a setup.exe (installer) and installer-util.jar.

    To launch the installer, open the setup.exe file. Note that you must run the Windows installer as administrator.

Installing Tidal Repository through the GUI

To install Tidal Repository through the GUI:

Note: Opening the setup.exe file launches the installation via the GUI. Follow the instructions from the GUI.

  1. Click Next and choose the destination folder.

  2. Click Next and provide application properties (application port and database type).

  3. Click the desired database (MSSQL, Oracle, or PostgreSQL):

    For a MS SQL database:

    Database Server – The location of your database.

    Server port – The port to connect to.

    Schema – A database name for MS SQL. The name must begin with a letter, not a number.

    LoginID and Password – The login ID and password under which a database admin user (a user with a full access to the database) enters the system.

    TLS Version – In the dropdown list, choose TLS 1.0/1.1/1.2 to use the TLS cryptographic protocol and choose the protocol version to use. Choose No TLS if you do not want to use TLS protocols.

    If you install TR on OEL 8.4 and MS SQL server selecting TLS 1.0 and receive a "Connection failed. Database doesn't exist or provided credentials are wrong" error, follow these steps:

    • Open file to path_to_jdk/jre/lib/security/java.security.

    • Replace properties:

      jdk.disabled.namedCurves = secp112r1, secp112r2, secp128r1, secp128r2, \
      secp160k1, secp160r1, secp160r2, secp192k1, secp192r1, secp224k1, \
      secp224r1, secp256k1, sect113r1, sect113r2, sect131r1, sect131r2, \
      sect163k1, sect163r1, sect163r2, sect193r1, sect193r2, sect233k1, \
      sect233r1, sect239k1, sect283k1, sect283r1, sect409k1, sect409r1, \
      sect571k1, sect571r1, X9.62 c2tnb191v1, X9.62 c2tnb191v2, \
      X9.62 c2tnb191v3, X9.62 c2tnb239v1, X9.62 c2tnb239v2, X9.62 
      c2tnb239v3, \
      X9.62 c2tnb359v1, X9.62 c2tnb431r1, X9.62 prime192v2, X9.62 prime192v3, \
      X9.62 prime239v1, X9.62 prime239v2, X9.62 prime239v3, brainpoolP256r1, \
      brainpoolP320r1, brainpoolP384r1, brainpoolP512r1

      TO

      jdk.disabled.namedCurves = secp112r1, secp112r2, secp128r1, secp128r2, \
      secp160k1, secp160r1, secp160r2, secp192k1, secp192r1, secp224k1, \
      secp224r1, secp256k1, sect113r1, sect113r2, sect131r1, sect131r2, \
      sect163k1, sect163r1, sect163r2, sect193r1, sect193r2, sect233k1, \
      sect233r1, sect239k1, sect283k1, sect283r1, sect409k1
      sect409r1, \
      sect571k1, sect571r1, brainpoolP256r1, \
      brainpoolP320r1, brainpoolP384r1, brainpoolP512r1

      AND

      jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, RC4, DES, MD5withRSA, \
      DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \
      include jdk.disabled.namedCurves

      TO

      jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, \
      DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \
      include jdk.disabled.namedCurves

    To create a new user, click Should the system create a new user for selected database checkbox. Provide User and Password credentials.

    Note: The password should contain at least one uppercase letter, one lowercase letter, one number, and no spaces.

    If a database schema for MS SQL does not exist, the system creates the schema automatically.

    For an Oracle database:

    To set up the connection to the database (for example, to the Oracle Cloud Autonomous Database), click the Custom JDBC URL checkbox.

    Then enter the connection string.

    Example: jdbc:oracle:thin:@(description=(retry_count=20)(retry_delay=3)(address=(protocol=tcps)(port=1521)(host=adb.us-phoenix1.oraclecloud.com))(connect_data=(service_name=g55e469066f5512_db20220628143858_high.adb.oraclecloud.com))(security=(ssl_server_dn_match=yes)))

    LoginID and Password – The login ID and password under which a database admin user (a user with a full access to the database) enters the system.

    To create a new user, click Should the system create a new user for selected database checkbox. Provide User and Password credentials.

    Note: The password should contain at least one uppercase letter, one lowercase letter, one number, and no spaces.

    To use the default installation approach, complete the fields in the Database Server dialog.

    • Database Server – The location of your database.

    • Port – The port to connect to.

    • SID or service name – An Oracle database name which must begin with a letter, not a number.

    • LoginID and Password – The login ID and password under which a database admin user (a user with a full access to the database) enters the system.

    To create a new user, click Should the system create a new user for selected database checkbox. Provide User and Password credentials.

    Note: The password should contain at least one uppercase letter, one lowercase letter, one number, and no spaces.

    For a PostgreSQL database:

    Database Server – The location of your database.

    Port – The port to connect to.

    Database name – A database name for PostgreSQL. The name must begin with a letter, not a number.

    Login ID and Password – The login ID and password under which a database admin user (a user with a full access to the database) enters the system.

    To create a new user, click Should the system create a new user for selected database checkbox. Provide User and Password credentials.

    • If you click this checkbox, the name of the schema created matched the username.

    • If you don’t click the checkbox, the name of the schema and username used to connect to the database should be the identical.

    Note: The password should contain at least one uppercase letter, one lowercase letter, one number, and no spaces.

  4. Choose Next.

  5. Choose Install to start the installation.

  6. Choose Finish to close the wizard.

Post-Installation

To start the service when the Tidal Repository is successfully installed, use the Tidal service manager. You can find the Tidal service manager in the Tidal Repository installation folder.

You can also start Tidal Repository via Services:

  1. Access the Windows search function and enter Services and open it.

  2. Find the TidalRepository record.

  3. Choose this record. Choose Start on the left side of the screen.

SSL Configuration

SSL (Secure Sockets Layer) is a transaction security standard that provides encrypted protection between browsers and App servers. When SSL is enabled for an App server, browsers communicate with the App server by means of an HTTPS connection (HTTP over an encrypted Secure Sockets Layer).

These steps describe how to enable SSL for Tidal Repository:

  1. Access the folder where Tidal Repository is installed.

  2. Open the CONFIG folder.

  3. Open the application.properties file and add these properties.

    ssl.enabled=true
    ssl.port=<port>
    ssl.key-alias=<hostname of TR machine>
    ssl.key-password=<keystore password>
    ssl.key-store=<absolute path to the key>
    ssl.key-store-provider=<SUN/verisign/self-signed/other> (optional)
    ssl.key-store-type=<JKS/JCEKS/PKCS12/PKCS11/DKS> (optional)

    Note: The absolute path to the key (ssl.key-store) should be provided with a double slash ‘\\’ for Windows. For Linux, the absolute path should be provided with a single slash “\”.

    1. Prepare the jks-file using the keytool of the same JRE that is used by TR:

      Example: JAVA_PATH/bin>keytool -genkeypair -alias baeldung -keyalg RSA -keysize 2048 -keystore baeldung.jks -validity 3650

    2. Ensure that the location where the jks-file is stored conforms to the “ssl.key-store” option from the application.properties file.

    3. Check that the password set during generation conforms to the “ssl.key-password” option from the application.properties file.

      Note: Use the TRCLI utility to generate an obfuscated version of the password. For example, /opt/TIDAL/TRCLI/trcli encrypt -p password.

    4. Open the application.properties file and add these properties:

      ssl.enabled=true
      ssl.port=8443
      ssl.key-alias=baeldung
      ssl.key-password=changeit
      ssl.key-store=c:\temp\baeldung.jks
      ssl.key-store-provider=SUN