Common issue with the Symantec VIP integration for Epic Hyperdrive.
- VIP Enterprise Gateway
- Epic Hyperdrive
VIP Integration Guides for Epic can be found here.
Verify that the installation is being done by a user with Windows administrative privileges.
Ensure that the correct version of Visual C++ is installed on the machine as indicated in the prerequisites section of the integration guide. Note: Newer or older versions of Visual C++ will not work.
Logs are not being generated after installation.
The VIP plugin must have permissions to write to C:\Program Files (x86)\Symantec\EPIC\Logs. This is not automatically set by Windows.
Grant Write permissions on the Logs folder for Administrator or Users groups. Any users logging into the machine who will be using Hyperdrive must have write permissions to this location.
openssl pkcs12 -in certificate.p12 -out certificate-pub.pem -clcerts -nokeys
Use any text editor to open the certificate-pub.pem and remove "Bag Attributes" information (example: remove all lines above ----BEGIN CERTIFICATE----)
Optional: DigiCert Cert Utility can be used to extract the PEM without the private key.
8/26/2025 12:53:33 PM : Radius authentication process started for user : BROADCOM
8/26/2025 12:53:33 PM : ValidateUserPush: Client.OperationResult.Challenge and _state:xxxxxxxxx3539
8/26/2025 12:53:33 PM : Radius authentication process started for user : BROADCOM
8/26/2025 12:53:39 PM : Authenticate: Client.OperationResult.Accept and REPORT_VALIDATION_RESULT.VR_NONE
8/26/2025 12:53:39 PM : Radius authentication process ended for user : BROADCOM
8/26/2025 12:53:39 PM : User BROADCOM authentication successful
8/26/2025 12:53:39 PM : SAML Signing Certificate has expired
8/26/2025 12:53:40 PM : saml assertion is signed successfully