Skip to main content

Set Up ADITO Designer for an ADITO Cloud System

Purpose

This guide explains how to set up a Windows workstation for working with ADITO projects in ADITO Designer. It covers GitLab onboarding, access to the ADITO Self-Service Portal (SSP), installation and first start of ADITO Designer, loading an xRM project from a cloud system, establishing the required SSH tunnel using a passphrase-protected key via Pageant, and validating a first deploy.


Prerequisites

Before you start, ensure that all prerequisites in this section are met.

  • You need a PC or notebook with an Intel® Core™ i7 (or comparable CPU), at least 16 GB of RAM, and a fast internet connection for both download and upload.
  • You must use 64-bit Windows 10 or Windows 11. Installing ADITO Designer on macOS or Linux is generally possible due to the Java runtime (OpenJDK 13), but it is not supported. Participation in training is therefore Windows-only.
  • You must have Google Chrome or Microsoft Edge available because Firefox does not work in this scenario. Ideally, set one of these browsers as your default browser.
  • You must meet the requirements in Prerequisites for ADITO Designer.
  • You need a TOTP-capable authenticator app for two-factor authentication (2FA), for example Bitwarden.
  • You need the Designer version and the xRM project version intended for your cloud system.
  • You need access to ADITO GitLab. ADITO provides an email link for initial password setup.
  • You need an ADITO cloud system provided via SSP at https://ssp.adito.cloud/. SSP uses the same credentials as ADITO GitLab.
  • You need credentials for the ADITO customer area and the ADITO Service Client (https://service.adito.de/) only if you download ADITO Designer from those portals.
warning

A passphrase is mandatory for private SSH keys according to ADITO security requirements. Because ADITO Designer cannot prompt for a passphrase, you must use Pageant to provide the passphrase-protected key during authentication.


1. Set up your ADITO GitLab account

This section prepares your GitLab identity and the authentication artifacts required by ADITO Designer and SSP.

1.1 Set your password

After ADITO has created your GitLab account, you receive an email with a link to set your password. Use the following steps to complete the initial setup.

  1. Open the email and click the password setup link.
  2. In the browser, enter a strong password and confirm it.
  3. Submit the form to complete the process.

GitLab password setup email Figure: GitLab email with the initial password setup link.

GitLab password setup form Figure: Setting the initial GitLab password in the browser.

1.2 Enable two-factor authentication (2FA)

GitLab requires TOTP-based two-factor authentication (2FA) on the first login. The setup consists of registering the secret in an authenticator app and confirming a one-time password.

  1. Sign in at https://gitlab.adito.de/. GitLab opens the 2FA setup screen automatically.
  2. In GitLab, display the QR code or the TOTP secret.
  3. In your authenticator app, add a new entry and scan the QR code or paste the secret.
  4. Use the current one-time password (OTP) from the authenticator to confirm setup in GitLab.
  5. Download or copy the recovery codes and store them securely.

GitLab 2FA setup Figure: GitLab provides the TOTP secret during 2FA setup.

Add entry in authenticator Figure: Adding the TOTP secret to an authenticator app (example).

One-time password Figure: The authenticator generates a one-time password (OTP).

Register with 2FA app Figure: Completing the 2FA registration in GitLab.

Recovery codes Figure: Recovery codes displayed after enabling 2FA.

2FA enabled Figure: GitLab confirms that 2FA is enabled.

1.3 Create a Personal Access Token (PAT)

ADITO Designer uses a Personal Access Token (PAT) to access ADITO GitLab. You create the token once in GitLab and then paste it into ADITO Designer when loading a cloud system.

  1. Open https://gitlab.adito.de/-/profile/personal_access_tokens.
  2. Enter a meaningful token name, for example ADITO Designer.
  3. Leave the expiration date empty if permitted. If expiration is required, choose a date far in the future.
  4. Select the api scope and create the token.
  5. Copy the token immediately and store it securely. GitLab does not show the full token again.

Access Tokens Figure: Access token management in GitLab.

Create PAT Figure: Creating a PAT with the api scope.

Copy PAT Figure: Copy the token immediately after creation.

1.4 Register an SSH key in GitLab

SSP authentication requires an SSH key pair. You register the public key in GitLab and use the private key later in Pageant and ADITO Designer.

warning

A passphrase is mandatory for private SSH keys. Because ADITO Designer cannot prompt for a passphrase, use Pageant to provide the passphrase-protected key during authentication.

  1. Open PuTTYgen.
  2. If you already have a key, load it. Otherwise, create a new key as described in Appendix B.
  3. Ensure the private key has a passphrase and save the private key (.ppk).
  4. Select and copy the complete public key text from PuTTYgen.
  5. In GitLab, open Preferences > SSH Keys, select Add new key, paste the public key, and save.

Copy public key in PuTTYgen Figure: Copying the public key from PuTTYgen.

Add SSH key in GitLab Figure: Opening the SSH key form in GitLab.

Paste SSH key Figure: Pasting the public key into GitLab.

SSH key registered Figure: SSH key listed in GitLab after saving.


2. Use the ADITO Self-Service Portal (SSP)

SSP at https://ssp.adito.cloud/ is used to manage ADITO cloud systems. You use SSP to start your system, retrieve the admin password, and open the web client.

2.1 Sign in to SSP

  1. Open https://ssp.adito.cloud/.
  2. Sign in with your ADITO GitLab username and password.
  3. Confirm the login with the current OTP from your authenticator app.

SSP login

SSP OTP verification Figure: SSP login and OTP verification.

2.2 Select and start the cloud system

  1. In the dashlet Meine Systeme, locate your assigned system.
  2. Select the checkbox next to the system to open the preview panel on the right.
  3. If the status is Heruntergefahren, start the system using System starten.
  4. Wait about two minutes until the status shows RUNNING. Refresh the browser if the status does not update automatically.

Assigned systems in SSP

System preview panel Figure: Assigned systems and the system preview panel in SSP.

2.3 Open the web client and sign in as admin

  1. In the system preview panel, click the https://... link to open the web client.
  2. In SSP, open Passwörter and copy the admin password using Admin Passwort kopieren.
  3. In the web client login screen, sign in as user admin and paste the copied password.
  4. After login, verify that the dashboard is displayed.

Open web client Figure: Opening the web client URL from SSP.

Copy admin password Figure: Copying the admin password from SSP.

Paste admin password Figure: Pasting the admin password into the login form.

Web client dashboard Figure: Web client dashboard after login.


3. Install and configure ADITO Designer

3.1 Download ADITO Designer (Versionsmanagement)

Request the correct ADITO Designer version from your ADITO contact. Download this version from the Versionsmanagement context in the ADITO Service Client or an internal ADITO system.

note

The source PDF also describes an alternative download via the ADITO customer login. This guide intentionally omits that path and focuses on downloading via Versionsmanagement.

Ensure that the ADITO Designer version matches the version of the cloud system created in SSP. The version numbers are not identical, so confirm both versions with your ADITO contact.

Download ADITO Designer

Download ADITO Designer Figure: Downloading ADITO Designer via Versionsmanagement.

3.2 Extract and start ADITO Designer

Extract the ZIP archive (for example ADITODesigner_2024.0.0.zip) to a location of your choice. The ZIP archive does not include a parent folder, so create a target folder first. The folder name must not contain spaces.

Extracting the ZIP Figure: Extracting the ZIP into a dedicated folder.

Starting ADITO Designer Figure: Starting ADITOdesigner64.exe from the bin folder.

On first start, ADITO Designer may take longer to initialize. Temporary files are stored under C:\Users\<USERNAME>\AppData\Roaming\.aditodesigner. If setup or runtime issues occur, delete the .aditodesigner directory and start again to reset the local state.

During the first start, required plugins are installed. Select Install all and proceed.

Install plugins Figure: Installing plugins on first start.

Accept license terms Figure: Accepting license terms.

Restart ADITO Designer Figure: Restarting after plugin installation.

Empty workspace Figure: ADITO Designer after restart.


4. Load the cloud project and install Node dependencies

4.1 Load the cloud system

You load the xRM project configuration from the cloud system into ADITO Designer using the load cloud system wizard. The wizard requires your GitLab Personal Access Token (PAT).

  1. In ADITO Designer, open File > New Project.
  2. Select load cloud system and continue with Next.
  3. When you are asked for Access Token, paste your GitLab PAT and confirm.
  4. Select Refresh to load the list of available cloud systems.
  5. Select your target system and continue.
  6. Set the project name and location. Keep the default location under Documents\\AditoProjects unless you have a good reason to change it.
  7. Select Only Git Project as Checkout Mode. If the option is not available, the system is likely not a dev stage system.
  8. Select the matching Branch/Tag and finish the wizard.

New project

Load cloud system Figure: Starting the “load cloud system” wizard.

Cloud systems overview Figure: Available cloud systems for the current user.

Project settings Figure: Project settings including checkout mode and branch/tag.

Project loading Figure: Cloning and project import progress.

note

Technical background (not required for the setup): Only Git Project checks out the Git state. If you need changes that exist only in the system database, use Only Current System State or Git Project and Current System State depending on your scenario.

4.2 Run npm install

After the project has been cloned, locate package.json in the project tree and run NodeJS > npm install from the context menu. This is required for features such as modularization, code formatting, and auto-completion. Warnings in the log can usually be ignored.

npm install Figure: Running npm install from the context menu.


5. Connect ADITO Designer to the cloud system

Expand system in the project tree. The active system is typically named default. In some Designer versions, you might be prompted for the private SSH key location and/or GitLab credentials. If you are prompted for GitLab credentials, enter the PAT (not your GitLab password).

Ensure Pageant is running and has your passphrase-protected private key loaded.

Credential prompts Figure: Example credential prompts.

5.1 Open the database tunnel

To access the system database, you must establish the database SSH tunnel from ADITO Designer. The tunnel uses your SSH key and therefore depends on Pageant if your key is protected with a passphrase.

  1. Start Pageant and add your passphrase-protected private key (.ppk). Keep Pageant running in the background.
  2. In ADITO Designer, expand system in the project tree.
  3. Select default. In the properties panel, click the edit icon next to tunnelConfigPath to open tunnelconfig.xml.
  4. In the tunnel list, locate the database tunnel. It contains adito-db.dev-<Cloud_System_Name>-c2-adito-cloud.svc.cluster-local in the target server address.
  5. Right-click the database tunnel and select Connect.
  6. If prompted with SSH Fingerprint unknown, confirm it with Yes.
  7. Wait until the tunnel icon turns green.

Connect tunnel Figure: Connecting the database tunnel in tunnelconfig.xml.

SSH fingerprint unknown Figure: Confirming an unknown SSH fingerprint.

Reconnect Figure: Reconnecting system components.

note

It can take up to about 30 minutes until a newly registered public key becomes active. During this synchronization period, a connection attempt typically turns the tunnel icon yellow and then back to gray. Retry later in that case.

note

The icon next to default can remain yellow because it only turns green when all tunnels are connected. For training scenarios, the database tunnel alone is sufficient.


6. Verify deploy

Changes you make in ADITO Designer become visible in the client only after a deploy. Deploy writes your changes into the system database in the cloud, in particular into the ASYS_SYSTEM table.

By default, ADITO Designer performs a transpile before each deploy. This is required for modularized projects, but typically not for training projects. To reduce deploy time in training, remove the transpile line from package.json as described in the training instructions, and save the file.

package.json transpile Figure: Removing the transpile line in package.json.

Make a small test change, for example by updating the title property of Activity_entity. Then run deploy using Deploy Project or Ctrl+F8 and confirm with OK. The first deploy can take several minutes and may show a long list of differences. Keep all items selected for the first deploy.

Example change Figure: Example change before deploy.

Deploy dialog

Deploy dialog Figure: Running deploy and confirming the deploy dialog.

Verify change Figure: Verifying the change in the client after re-login.


7. Optional: Use a Dev Drive on Windows 11

On Windows 11, you can improve ADITO Designer performance (for example for transpile operations) by using a Dev Drive.

  1. Create and mount the Dev Drive, and keep its drive letter stable to avoid later path changes.
  2. Move the ADITO Designer installation folder (the extracted ZIP directory) to the Dev Drive.
  3. Move your ADITO project folder (for example Documents\AditoProjects) to the Dev Drive.
  4. Move the ADITO Designer working directory .aditodesigner (default under C:\Users<USERNAME>\AppData\Roaming.aditodesigner) to the Dev Drive.
  5. Update the .aditodesigner path in ADITOdesigner.conf (in the Designer config folder) so it points to the new Dev Drive location.
  6. Start ADITO Designer and verify that it uses the working directory from the Dev Drive and that project operations work as expected.

Decide according to your security policies whether the Dev Drive should be scanned by antivirus software. Excluding the Dev Drive can improve performance but increases the risk of a successful malware attack.

Example Dev Drive setup and configuration reference:

Dev Drive

Dev Drive

Dev Drive


Appendix A: Configure Pageant

Pageant enables the use of passphrase-protected private keys with ADITO Designer. It avoids repeated passphrase prompts and is required because ADITO Designer cannot request the passphrase interactively. If you installed PuTTY/PuTTYgen as a package, Pageant is typically included. Otherwise, install it separately.

  1. Install Pageant as part of the PuTTY package (recommended) or as a standalone tool, and ensure it is available on the workstation.
  2. Start Pageant so it runs in the background and appears as an icon in the Windows task tray.
  3. Open the Pageant menu from the tray icon and select the option to view keys (for example View Keys).
  4. Add your private key by selecting Add Key and choosing your passphrase-protected .ppk file.
  5. Enter the passphrase when Pageant prompts you, and confirm that the key appears in the key list.
  6. Keep Pageant running while you work in ADITO Designer, because ADITO Designer relies on Pageant to access the decrypted key material.
  7. If authentication fails later, verify that Pageant is still running and that the key is still loaded; if not, add the key again.
  8. If you reboot the workstation, repeat the steps to start Pageant and load the key, unless you have implemented an approved auto-start mechanism.

Adding the SSH private key to Pageant and keeping Pageant running:

Pageant

Pageant

Pageant

Pageant

Pageant

Pageant


Appendix B: Create an SSH key or add a passphrase

  1. If you do not yet have an SSH key, create one with PuTTYgen.
  2. Store the key files under C:\Users<USERNAME>.ssh.
  3. Save the private key as id_rsa.ppk and assign a passphrase.
  4. Save the public key as id_rsa.pub.
  5. If you already have a private key without a passphrase, load it in PuTTYgen.
  6. Set and confirm a passphrase.
  7. Save the private key again and overwrite the original file.
  8. Keep the public key registered in GitLab; it remains valid and does not need to be replaced.

Creating an SSH key and adding a passphrase in PuTTYgen:

PuTTYgen

PuTTYgen

PuTTYgen

PuTTYgen

PuTTYgen

PuTTYgen

PuTTYgen


Appendix C: Create a cloud system in SSP

  1. If you have permission to create cloud systems, sign in to SSP with your Git credentials.
  2. Open the System context.
  3. Click the plus button to create a new system.
  4. Configure the system settings.
  5. Request the correct Branch/Tag from your ADITO contact and apply it during configuration.
  6. Save the system.
  7. Wait about 15 minutes until provisioning is completed.
  8. Open the system URL.
  9. Sign in with the admin password as described earlier in this guide.

Create cloud system Create cloud system Figure: Creating a new cloud system in SSP.


Appendix D: Troubleshooting

If npm install fails, verify that your project path and project name do not contain special characters and that you have write and delete permissions for the selected location. Delete the folder referenced in the error message and retry npm install. If the issue persists, run load cloud system again and choose a location where you have the required permissions.

If tunnels do not open due to ports already in use or firewall restrictions, ensure that you meet the network and proxy requirements described in Voraussetzungen_Betrieb_ADITO_Designer.pdf.

If the plugin installation dialog does not appear on first start, verify that internet access is available and that the ADITO plugin server is reachable. Also ensure that the proxy settings match the prerequisites document.