System Requirements

March 14, 2014 , by

Pistachio’s operating environment and requirements are listed below. All services can be run on a single server.

  • A Web Server running IIS 7.0 or higher
  • A SQL Server running SQL Server 2008 or higher
  • An optional File Server for storage of uploaded files
  • One or more SharePoint Server(s) that host Pistachio’s web part
  • ASP.NET Session State Server must be running
  • Full trust Level in SharePoint's web.config file

Hardware & Software Requirements

Web Server

The administration portal is used to configure Pistachio applications. The minimum recommended requirements are:

  • Windows 2008 or higher
  • Internet Information Services 7.0 or higher
  • .NET 4.0
  • 2 GB of RAM
  • 500 MB of hard disk space

SQL Server

It is recommended that SQL Server be installed on a server separate from the Web and SharePoint servers. This server will host Pistachio’s configuration database and application data. The requirements for this server are:

  • SQL Server 2008 Express or higher
  • 2 GB of RAM
  • 500 MB of hard disk space for Pistachio’s configuration database (enabling transaction logging may require more space)
  • 80 GB+ hard disk space recommended for other databases

File Server

The File Server is optional and is used to store files that are uploaded and associated with a record or group. It is preferable that files be uploaded directly into a SharePoint document library, but this option gives you access to a server share and folder structure. The File Server and SharePoint Server can be one-­‐and-­‐the-­‐same or a separate dedicated server.

SharePoint Server

The hardware requirements of the SharePoint server do not change due to the Pistachio web part being installed. The component does not add significant additional strain to the server, particularly if the SQL Server 2008 installation is on a separate server. Using Pistachio on a SharePoint Server does require:

  • SharePoint 2010
  • Direct connectivity to the SQL Server from the SharePoint Server
  • Storing Pistachio database connection settings in SharePoint’s property bag
  • Giving Pistachio DLLs full trust permissions through a custom trust level policy file

SharePoint Trust Level

Pistachio Web Part requires full trust level in SharePoint's configuration to operate. This can be accomplished in different ways. You can simply update the trust level setting in the web.config:

<trust level="WSS_Minimal" originUrl="" /> To <trust level="Full" originUrl="" />

Alternatively, you can create your own security policy file and then specify this file in the security policy section of the SharePoint's web.config. You may refer to the following Microsoft article for more information:
ASP.NET Trust Levels and Policy Files

You should add the following custom security entries next to the FirstMatchCodeGroup CodeGroup in your custom security policy file.

                    <CodeGroup 
                            class="FirstMatchCodeGroup"
                            version="1"
                            PermissionSetName="Nothing">
                        <IMembershipCondition 
                                class="AllMembershipCondition"
                                version="1"
                        />
<!--- Pistachio Custom Security Entry begin -->

<CodeGroup class="UnionCodeGroup" version="1" PermissionSetName="FullTrust">
    <IMembershipCondition class="StrongNameMembershipCondition" version="1" PublicKeyBlob="0024000004800000940000000602000000240000525341310004000001000100c7675b1bb525bbf4bb379e36c01b9efe93376db66c741f6374efc7da88139201ad0429e29a3ac179e437a1a7042c2ef23c817b51320948648008ce1732194ece25a51a0e80e084efb73217a4fe24d1da7fdb22e6d917148dd22d3fee768828727ac0196f754cf0af972dabdc3317659a6382c17d3884359545f2aa2a78e7ddd6"></IMembershipCondition>
</CodeGroup>

<CodeGroup class="UnionCodeGroup" version="1" PermissionSetName="FullTrust">
    <IMembershipCondition class="StrongNameMembershipCondition" version="1" PublicKeyBlob="0024000004800000940000000602000000240000525341310004000001000100f3905be5731fcb75f8ec774e36ac18ef60a5cf2ad4fbe9d8983aca74701e75ab6e8e07df64d22248c740ac1f4ff92b0541aa6796525da752dad610da0ce359ec0be5d1bc99aab04d5450511369941f619eca1573554c928b077634d06eb93a8dfd1d30b80069473f50dd4e971a5af1ca9c88160876d325bb3b5e51b954d424d1"></IMembershipCondition>
</CodeGroup>

<CodeGroup class="UnionCodeGroup" version="1" PermissionSetName="FullTrust">
    <IMembershipCondition class="StrongNameMembershipCondition" version="1" PublicKeyBlob="0024000004800000940000000602000000240000525341310004000001000100bb13f986ae76d52e467061fcd41eb650c24e4960b22fc19ea979574e894a58b58cae0ec5ce9bc50e7d91e95f49a4324d1ec43f92281c280992e17c22c9c7993e9bcabc671cf52bff45934113dc4ea953fae5ce5cadf699b6de56c6d9e642842637b3121b9d2eb32f29a569bac8d6f90832d14d358f3e5a5ce1401dc8d39403d6"></IMembershipCondition>
</CodeGroup>

<CodeGroup class="UnionCodeGroup" version="1" PermissionSetName="FullTrust">
    <IMembershipCondition class="StrongNameMembershipCondition" version="1" PublicKeyBlob="0024000004800000940000000602000000240000525341310004000001000100f9ab1678bcea8158f39a610d71573645ec3f01499758a77f5d05654468ff9c927f508b907148701431ad6d69a68d31d2b5eab1e78801c105989f464fa03b93c0691054a8e9f42afcfbeb015a575d9ae9377b5ba31cf7b29eea7007dd78a32182cf0b9bc6348b62c2c71ad34f9f43cb357f432ee03edb33888300d70b8d7f79df"></IMembershipCondition>
</CodeGroup>

<CodeGroup class="UnionCodeGroup" version="1" PermissionSetName="FullTrust">
    <IMembershipCondition class="StrongNameMembershipCondition" version="1" PublicKeyBlob="0024000004800000940000000602000000240000525341310004000001000100a320499cc19f76445e60fabe34cc38013a691b951f800fdf4027a0a64d891b4bf121312d2dcfbaad17174548992147a3e57d4bc9808cefe58d65b61bfe065822a90e48bd107860e9307954f407981d09b4409be7e6a77292afe14f794eb279aba6a76b96b592ce9e67d38bf97095361a75c558aa7438eb0b3348ac60dcaeb9be"></IMembershipCondition>
</CodeGroup>

<CodeGroup class="UnionCodeGroup" version="1" PermissionSetName="FullTrust">
    <IMembershipCondition class="StrongNameMembershipCondition" version="1" PublicKeyBlob="0024000004800000940000000602000000240000525341310004000001000100719f8da252df33a5dab48695b4725b524bc269a42573f5e76e7af73bd84397bb72d120796dbd74030c5a3c424273616711ea0ea67a5a3519ff607da893ccc6d8d01b4ad8fc56c43a0f9c8374eeb14fa34082a615d0dd414492874cecd1f12432c27dc2e881134d93c8478fc5e78ade0e0f8770095e228a4dff72dc42ce119aa8"></IMembershipCondition>
</CodeGroup>

<!--- Pistachio Custom Security Entry end -->

Installation Summary

The installation program does the following:

  • Creates the Administrative Portal in IIS
  • Creates the Pistachio database in an existing SQL Server environment
  • Prepares a PowerShell script file to install the Pistachio Windows Solution Package (WSP) in SharePoint.