Step 1: Determine whether you need the 64-bit or 32-bit installer.
Your company’s IT department will tell you which size you need based on your windows set-up.
Select the appropriate link to your installer to download the file:
-
Latest 64-bit Installer: https://zudello-global-customer.s3.ap-southeast-2.amazonaws.com/large-objects/middleware/installers/windows/64bit/zudello-middleware-installer-x64-1.8.1.122.exe
-
Latest 32-bit Installer: https://zudello-global-customer.s3.ap-southeast-2.amazonaws.com/large-objects/middleware/installers/windows/32bit/zudello-middleware-installer-x86-1.8.1.122.exe
NB: When in doubt, select 64-bit.
Step 2: Download the file and run the installer
Once the file is downloaded, select to open and run it.
If you get a “Windows protected your PC” notification, select “More info” followed by “Run anyway” to open the installer.,
Step 3: Continue through the installation process.
Read through and continue to select next through the stages of the installation.
Step 4: Middleware Key, Username and Password
Middleware Key
On the final page of the installation, you will be prompted to enter a Zudello Middleware Key, as well as a username and password (See section on setting up a user below).
You will have already been issued a Zudello Middleware Key by your IT department. It should look like this:
Example Middleware Key (You will be provided one along with this guide):
---BEGIN ZUDELLO MIDDLEWARE KEY---
eyJhcGlfa2V5IjoicHVfdW9iaVZ2NGdReGJjMjBmIiwiYXBpX3NlY3JldCI6InBrX2lwMm
ppdGNYcFpodXFrM1NVMWxpRHlxUEZ2VGZBT05OYWNHbiIsImNsdXN0ZXIiOiJhdS56dWRl
bGxvLmlvI1n0=
---END ZUDELLO MIDDLEWARE KEY---
Paste your entire key into the Zudello Middleware Key section.
Username and Password
You will need to enter the username and password for the windows user that you’ve set up the middleware to run as.
We recommend:
-
If you are running on a server, create a Windows server user.
-
If you are running on a standard Windows desktop, create a user whose password doesn’t expire and has UAC turned off.
Once you’ve entered your details, select Next and then the system will finish installing.
Information for Access Control List (ACL) Configuration