MID Server configuration Administrators must configure a MID Server to ensure that it has access to sufficient system resources, probes the proper data sources, and communicates with the instance as expected. You must complete all the steps in MID Server Installation before attempting any of the configuration steps explained here. Restart a MID Server after any configuration change for the changes to take effect. Note: All new MID Servers must be validated before use. Validation ensures that the MID Server is trusted to access credentials used by the instance for automations. For instructions, see Validate and invalidate the MID Server. MID Server Records that cannot be altered These records cannot be modified or deleted. Table Record Public Page [sys_public] InstanceInfo Scripted Web Service [sys_web_service] InstanceInfo GetMIDInfo MIDAssignedPackages MIDFieldForFileProvider MIDFileSyncSnapshot MIDServerCheck MIDServerFileProvider Using special characters in an XML file The XML specification defines five predefined entities that represent special characters, and requires that all XML processors honor them. If these characters are used in a password, you will experience unexpected results. The following characters represent the five pre-defined entities: " & ' < > If you use the pre-defined entity characters in an XML file, such as the MID Server configuration file, you need to encode them. To encode pre-defined entities into an XML document: replace " with " replace & with & replace ' with ' replace < with < replace > with > For example, to specify the password as test& in the MID Server config.xml file: <parameter encrypt="true" name="mid.instance.password" value="test&"/> The MID Server dashboardThe MID Server dashboard is a central place for MID Server users to monitor ongoing operations. The dashboard consists of reports and gauges that display information from the MID Server Status table. MID Server selectionYou can configure applications to select MID Servers in a variety of ways. MID Server IP range auto-assignmentIP ranges that represent a subnet can be automatically assigned to MID Servers.MID Server propertiesProperties control the behavior of all MID Servers or a particular MID Server.MID Server parametersParameters control the behavior of a particular MID Server and have lower precedence than MID Server properties. MID Server pauseThe MID server can be put into a Paused state to temporarily prevent it from polling the ECC Queue for work or sending Discovery results back to the instance.MID Server domain separationMID Servers can be configured in separate domains.Privileged commands for the MID ServerTo discover certain information on a host server, the MID Server must run SSH commands with higher privileges. The platform provides default privileged commands for the MID Server to use and the ability to add additional commands to the system.Map an IP address to a DNS nameIf the MID Server manages resources within defined IP ranges, all host servers must have their DNS names mapped to an IP address.MID Server security and encryptionSeveral options are available for you to enhance security on MID Servers, including credential and encryption security, the authorization of SOAP requests, and the establishment of secure socket layer (SSL) connections.