The integration pack for System Center Operations Manager

Important

This version of Orchestrator has reached the end of support. We recommend you to upgrade to Orchestrator 2022.

The integration pack for Operations Manager is an add-in provided by System Center Orchestrator. Use the integration pack to connect an Orchestrator Runbook server to an Operations Manager management server so that you can automate various actions.

For more information about integration packs, see the System Center integration guide.

System requirements

Before you deploy the Operations Manager integration pack, install and configure the following software:

  • Orchestrator.

  • Operations Manager. The integration pack version should match the System Center version.

    Note

    If you're using the Orchestrator 2016 or 1801 integration pack for Operations Manager 2016 UR4 or later and if you've configured Operations Manager to accept only TLS 1.1 or 1.2 connections, make the registry changes as detailed here.

  • To allow server interaction with Operations Manager, install the Operations Manager console where an Orchestrator Runbook server or Runbook Designer is installed.

  • The Orchestrator integration library management pack is required by the Create Alert object.

    Note

    The Create Alert object installs the management pack automatically in Operations Manager the first time it's run. To uninstall the integration pack, remove the Orchestrator integration library management pack from Operations Manager.

  • Orchestrator.

  • Operations Manager. The integration pack version should match the System Center version.

  • To allow server interaction with Operations Manager, install the Operations Manager console where an Orchestrator Runbook server or Runbook Designer is installed.

  • The Orchestrator integration library management pack is required by the Create Alert object.

    Note

    The Create Alert object installs the management pack automatically in Operations Manager the first time it's run. To uninstall the integration pack, remove the Orchestrator integration library management pack from Operations Manager.

Download the integration pack

Register and deploy the pack

After you download the integration pack file, you must register it with the Orchestrator management server. Then deploy it to Runbook servers and Runbook Designers. Learn more.

Configure the connections

A connection establishes a reusable link between Orchestrator and an Operations Manager management server. You can create as many connections as you need to specify links to multiple Operations Manager management servers. You can also create multiple connections to the same server to allow for differences in security permissions for user accounts.

To configure a connection:

  1. In Runbook Designer, select Options > Operations Manager.
  2. On the Connections tab, select Add.
  3. In Connection Entry, in the Name box, enter the name or IP address of the server that runs Operations Manager.
  4. In the Domain box, enter the domain name of the Operations Manager server. Or select the ellipsis button (...) to browse for the domain, select it, and then select Add.
  5. In the User name and Password boxes, enter the credentials that the Orchestrator server will use to connect to the Operations Manager server.
  6. In Monitoring Intervals\Polling and Monitoring Intervals\Reconnect, accept the default value of 10 seconds, or change the value. The property (default value: 10 seconds) is configurable.
  7. Select Test Connection. When the confirmation message appears, select OK.
  8. Add more connections if necessary.
  9. Select OK > Finish.

Enable SCO IP for Operations Manager 2016 UR4 or later

You must enable SCO IP for Operations Manager 2016 (UR4+) when the Operations Manager configuration accepts only TLS 1.1 or TLS 1.2.

Follow these steps:

  1. Set Windows to use only TLS 1.2.

    Method 1: Manually modify the registry

    Important

    Carefully follow the steps in this section. You could cause serious problems if you modify the registry incorrectly. Before you begin, back up the registry so that you can restore it if a problems occurs.

    Use the following steps to enable or disable all SCHANNEL protocols across the system.

    Note

    We recommend that you enable the TLS 1.2 protocol for incoming communications. Enable the TLS 1.2, TLS 1.1, and TLS 1.0 protocols for all outgoing communications. Registry changes don't affect the use of the Kerberos protocol or the NTLM protocol.

    a. Start Registry Editor. To do this, right-click Start, enter regedit in the Run box, and then select OK.

    b. Locate the following registry subkey:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols

    c. Right-click Protocol, and point to New > Key.

    Screenshot showing New registry key.

    d. Enter SSL 3.0.

    e. Repeat the previous two steps to create keys for TLS 0, TLS 1.1, and TLS 1.2. These keys resemble directories.

    f. Create a client key and a server key under each of the SSL 3.0, TLS 1.0, TLS 1.1, and TLS 1.2 keys.

    g. To enable a protocol, create the DWORD value under each client and server key, as follows:

    • DisabledByDefault [Value = 0]
    • Enabled [Value = 1]

    h. To disable a protocol, change the DWORD value under each client and server key, as follows:

    • DisabledByDefault [Value = 1]
    • Enabled [Value = 0]

    i. Select File > Exit.

    Method 2: Automatically modify the registry

    Run the following Windows PowerShell script in administrator mode to automatically configure Windows to use only the TLS 1.2 protocol:

        $ProtocolList       = @("SSL 2.0","SSL 3.0","TLS 1.0", "TLS 1.1", "TLS 1.2")
        $ProtocolSubKeyList = @("Client", "Server")
        $DisabledByDefault = "DisabledByDefault"
        $Enabled = "Enabled"
        $registryPath = "HKLM:\\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\"
    
        foreach($Protocol in $ProtocolList)
        {
          Write-Host " In 1st For loop"
          foreach($key in $ProtocolSubKeyList)
          {		
              $currentRegPath = $registryPath + $Protocol + "\" + $key
              Write-Host " Current Registry Path $currentRegPath"
    
              if(!(Test-Path $currentRegPath))
              {
                  Write-Host "creating the registry"
                  New-Item -Path $currentRegPath -Force | out-Null			
              }
              if($Protocol -eq "TLS 1.2")
              {
                  Write-Host "Working for TLS 1.2"
                  New-ItemProperty -Path $currentRegPath -Name $DisabledByDefault -Value "0" -PropertyType DWORD -Force | Out-Null
                  New-ItemProperty -Path $currentRegPath -Name $Enabled -Value "1" -PropertyType DWORD -Force | Out-Null
    
               }
              else
               {
                   Write-Host "Working for other protocol"
                   New-ItemProperty -Path $currentRegPath -Name $DisabledByDefault -Value "1" -PropertyType DWORD -Force | Out-Null
                   New-ItemProperty -Path $currentRegPath -Name $Enabled -Value "0" -PropertyType DWORD -Force | Out-Null
               }
           }
         }
    
         Exit 0
    
  2. Set System Center to use only TLS 1.2.

    Before you change the registry in this step, back up the registry in case you need to restore it later. Then set the following registry key values.

    Values for 64-bit operating systems

    Path Registry key Value
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\v2.0.50727 SystemDefaultTlsVersions dword:00000001
    HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft.NETFramework\v2.0.50727 SystemDefaultTlsVersions dword:00000001
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\v4.0.30319 SystemDefaultTlsVersions dword:00000001
    HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft.NETFramework\v4.0.30319 SystemDefaultTlsVersions dword:00000001

    Values for 32-bit operating systems

    Path Registry key Value
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\v4.0.30319 SystemDefaultTlsVersions dword:00000001
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\ v2.0.50727 SystemDefaultTlsVersions dword:00000001
  3. Install the following updates on all Service Manager roles. Update roles on management servers, Azure Data Warehouse servers, the Self-Service portal, and Analyst consoles (including the Analyst consoles installed on the Orchestrator Runbook servers).

    Operating system Required update
    Windows 8.1 and Windows Server 2012 R2 3154520 Support for TLS System Default Versions included in the .NET Framework 3.5 on Windows 8.1 and Windows Server 2012 R2
    Windows Server 2012 3154519 Support for TLS System Default Versions included in the .NET Framework 3.5 on Windows Server 2012
    Windows 7 SP1 and Windows Server 2008 R2 SP1 3154518 Support for TLS System Default Versions included in the .NET Framework 3.5.1 on Windows 7 SP1 and Server 2008 R2 SP1
    Windows 10 and Windows Server 2016 3154521 Hotfix rollup 3154521 for the .NET Framework 4.5.2 and 4.5.1 on Windows

    3156421 Cumulative Update for Windows 10 Version 1511 and Windows Server 2016 Technical Preview 4: May 10, 2016
  4. Restart the computer.