Step 1: Components and architecture, prerequisites, and download
Invicti Enterprise is available as an On-Demand and On-Premises solution. Invicti Enterprise On-Premises is identical to the hosted version in terms of features and capabilities, but since it runs on your own servers and network, there are a few things to note:
- You can scan any internal web application without the need to allow incoming access through corporate firewalls.
- No internet connection is required.
- Invicti Enterprise On-Premises can also be easily deployed on Amazon Web Services (AWS), Microsoft Azure, Google Cloud, or any other type of private cloud environment.
- If your business has to adhere to strict regulatory compliance requirements and policies or you have concerns about your data being stored on our servers, you can still take advantage of Invicti Enterprise's workflow tools, scaling, and scanning capabilities. The On-Premises edition can be installed on your own servers managed by your team.
- No data will leave the On-Premises edition of Invicti Enterprise.
This document explains the components and architecture, prerequisites, and how to download Invicti Enterprise On-Premises.
NOTE: All Invicti editions support IPv6 both as servers and agents. This means you can configure the Invicti Enterprise On-Premises server to use IPv6, and Invicti Enterprise can scan websites that use IPv6. |
Components and architecture
Invicti Enterprise On-Premises contains five parts which are explained in the table below:
Component | Explanation |
Application Server | This provides the web interface that enables the efficient administration and automation of scans. This is the application that users will see and use via the Invicti Enterprise UI. |
Agent | This is a service application that executes scans and informs the Invicti Enterprise Application Server of the results. A single agent can only run one scan at a time. If you want to run more than one scan at a time, you will need to install more agents. |
Authentication Verifier | This is a service application that verifies form-based login authentication configuration. It is an optional component. However, if you are scanning websites that require form authentication, you need to install it. |
Authentication Verifier Service | This is a service application that establishes communication between the Authentication Verifier Agent and the Invicti Enterprise Application Server. It is an optional component. However, if you are scanning websites that require form authentication, you need to install it. |
IAST Bridge | This is a service application that relays information from the Shark agent to the scanning agent. It is an optional component. If you are using Invicti Shark (IAST) for Java, .NET, and Node.js, you need to install this bridge. |
The following diagram shows the architecture of Invicti Enterprise On-Premises.
Prerequisites
This section lists the minimum requirements for installing each of the components of Invicti Enterprise On-Premises.
ALLOWLISTING REQUIREMENTS:
|
Minimum requirements for the Invicti Enterprise Application Server
All components (the Application Server, the Agent, the Authentication Verifier, the Authentication Verifier Service, the IAST Bridge, and the Database Server) can be installed on the same server if the hardware meets the listed requirements.
TIP: We highly recommend that you install the Webapp, Agents, and DB on separate servers to maximize stability and performance. |
Software requirements |
|
Hardware requirements | Minimum: 2x cores CPU, 4GB RAM, 5 GB Free Disk Space This specification applies to using the Invicti Enterprise interface and scanning a few simple websites. While Invicti Enterprise may run on a machine with a lower specification than this, we do not recommend doing so for performance reasons. Recommended: 2x cores CPU, 16GB RAM, 20 GB Free Disk Space This is a good general-purpose specification. Advanced: 4x cores CPU, 32GB RAM, 50 GB Free Disk Space This option is suitable if you have a large number of users, advanced websites, and want to run a large number of scans simultaneously. |
Access requirements |
|
Minimum requirements for the Invicti Enterprise Agent
These are the minimum requirements for installing the Invicti Enterprise Agent.
Software requirements |
|
Hardware requirements |
|
Network requirements |
|
Access requirements |
|
Minimum requirements for the Authentication Verifier Service and Authentication Verifier
These are the minimum requirements for installing the Invicti Enterprise Authentication Verifier Service and Authentication Verifier Agent.
Software requirements |
|
Hardware requirements |
|
Network requirements |
|
Access requirements |
|
Minimum requirements for IAST Bridge
These are the minimum requirements for installing the Invicti IAST Bridge.
Software requirements |
|
Hardware requirements |
|
Network requirements |
|
Access requirements |
|
Minimum requirements for the Database Server
These are the minimum requirements for the Database Server.
IMPORTANT: The database is not provided by Invicti. You must set it up yourself. |
Software requirements |
|
Hardware requirements |
|
Network requirements |
|
Access requirements |
|
NOTE: The db_owner permission is required during installation and updating. The db_datareader and db_datawriter roles are enough for daily operations. |
Downloading the installer files
TIP: Check out our video walk-through to learn how to install Invicti Enterprise On-Premises: Invicti Enterprise On-Premises Installation |
How to download the installer files
- Download to your server the InvictiEnterprise.zip file that was emailed to you.
- Extract the .zip file to a directory.
- Check that these five files are in the directory:
- WebAppSetup.exe (Invicti Enterprise Application Server installer)
- AgentSetup.exe (Invicti Enterprise Agent installer)
- AuthVerifierAgentSetup.exe (Invicti Enterprise Authentication Verifier installer)
- AuthVerifierServiceSetup.exe (Invicti Enterprise Authentication Verifier Service installer)
- IASTBridgeSetup.exe (Invicti IAST Bridge installer)
NOTE: If you also purchased Invicti API Security, the .zip file will contain an additional file called ApiHubServiceSetup.exe. For instructions on how to install Invicti API Security as a component of Invicti Enterprise On-Premises, refer to Installing Invicti API Security On-Premises. |