Summary
How to quickly install, configure and run Tachyon for first use in a small-scale lab, evaluation or pilot environment.
To simplify things, this quick start assumes a simple design in which you will be installing Tachyon components on a single web server, with SQL Server installed either locally or remote (split). When implementing in a more complex environment you should instead follow the design, install and verify phases described in the Implementing Tachyon Platform section.
This quick start is intended only for a fresh install. For upgrading or replacing an existing Tachyon system with Tachyon Platform 8.0, please see Upgrading to Tachyon Platform.
There are four stages to the Tachyon quick start. Each of these stages touch upon the design, install and verify phases described in the Implementing Tachyon Platform section.
Verifying Tachyon
This quick start provides an outline to installing, configuring and verifying a Tachyon system that is suitable for a lab-type environment. After the Prepare and Install sections, the Configure and Use sections provide steps that will verify the following aspects of the Tachyon system installation:
- Configure quick start users - confirms integration with Active Directory and the basic RBAC capabilities of Tachyon.
- Configure verification instructions - confirms the basic functionality for importing instruction definitions into Tachyon as well as confirming that licensing is working appropriately.
- Viewing connected devices - confirms that the Tachyon certificates have been correctly configured
- Asking a question - confirms that the Tachyon client communications are working
- Performing an action - confirms that two-factor authentication, email connections and the approval workflow are working. The stage 2 verification action also checks that the Tachyon client download mechanism is working and that the background channel has been correctly configured.
This run through of the basic Tachyon functionality listed above works as a verification of the installation of Tachyon in a lab environment. If you see any issues when running through these steps please check the Troubleshooting section for a list of known issues. For production environments a more formal verification process that uses the same 1E-TachyonPlatform.zip file as used in this quick start guide is provided on the Verifying page.
Prepare
This quick start assumes a simple design in which you will be installing Tachyon components on a single web server, with SQL Server installed either locally or remote (split).
A summary of the preparation tasks:
- Get a suitable license file for the Tachyon Platform, this should cover all the Tachyon applications you want to use.
- Review your quick start infrastructure.
- Prepare the quick start Tachyon server(s).
- Create the DNS Name.
- Install IIS roles, role services and features on the Tachyon Server.
- Get and install the Tachyon Server's web server certificate.
- Get and install a certificate on the Tachyon Server with at least Client Authentication Enhanced Key Usage. You might find that your Tachyon Server web certificate has this already, but that will not usually be the case.
- Get the Tachyon files that will be used to complete the quick start.
- Prepare the quick start Tachyon client devices.
- Create the quick start user accounts.
The below process assumes your quick start environment has a Microsoft Enterprise CA and you are familiar with how to:
- configure your CA to use a CRL DP that supports HTTP or HTTPS
- publish a Web Server certificate template or issue a PFX
- use certlm.msc or the mmc certificates snap-in to request a web server certificate
- deploy computer certificates to clients, optionally using auto-enrollment
Quick start infrastructure
A Tachyon system consists of:
- Tachyon Server, which includes the Tachyon Switch component and website, hosted on an IIS web server
- SQL Server instance, which hosts the Tachyon Master and Responses databases, can be local or remote (split)
- Tachyon clients on supported devices
- Browsers used by Tachyon users and administrators to access the Tachyon Explorer and Admin portal
Your environment also requires:
- A correctly routed network environment where each device is configured with a genuine default gateway
- The server where Tachyon Web Server will be installed also needs internet access so that the licensing will work, specifically to https://license.1e.com
- AD domain for the Tachyon Server and user accounts, but Tachyon client devices can be in workgroups or other domains
- SMTP email server - See Requirements: Email requirements for more details
- A PKI which serves the Tachyon Server and all Tachyon client devices
- Your CA(s) are able to issue certificates with a CRL DP that supports HTTP or HTTPS
Remote SQL
If using a remote SQL Server in a test environment, and you want to configure the Tachyon Server to support more than 500 devices, then you can either ignore the warning that you should have an additional network interface used for SQL traffic, or you can install and configure an additional network interface as described in Preparation: Configure a persistent route for SQL traffic.
PKI notes
If you have an existing PKI and have just added a new CDP to support HTTP/S then you will need to re-issue certificates to your servers and devices.
Tachyon deliberately does not work with self-signed certificates for security reasons. Therefore, Tachyon Server cannot be installed on the same server as a Root CA, because its certificate is self-signed. For the same reason, Tachyon client cannot be installed on a DC unless the client's Switch is configured to not require client certificates.
Tachyon uses TLSv1.2. If your PKI is using SHA512 then please ensure that your environment has relevant updates applied, as described in KB2973337. See Client issues: Enabling SHA-512 to work with TLSv1.2.
If you want Tachyon to manage legacy OSs that Microsoft no longer supports there may be issues with encrypted certificates described in Requirements - Constraints of Legacy OS.
Quick start Tachyon servers
These are the servers required by Tachyon in addition to quick start infrastructure.
Server | Software | Hardware |
---|---|---|
Tachyon Server | Windows Server 2016 or 2019 Full .NET Framework 4.6.2 or later | 1 CPU Core, 1GB RAM if Web Server only. 2 CPU Core, 2GB RAM if using combined Web and SQL Server. |
SQL Server | SQL Server 2017 Standard or Enterprise | 1 CPU Core, 1GB RAM if SQL Server only. |
Server(s) can be physical or virtual, and must be domain joined.
If using any other version of Windows OS or SQL Server, or more detail is required, please refer to Requirements: Server requirements, and Preparation: Server Provisioning.
If using a firewall on the Tachyon Server, then ensure the following incoming ports are open:
- Website HTTPS 443
- Switch Port 4000
If more detail is required, refer to Communication Ports in the Reference section.
DNS Name
Create the DNS Name for the Tachyon Server, for example tachyon.acme.local
This can be a CNAME or a (A) Host record.
This DNS Name is used in the Web Server certificate that needs to be installed on the Tachyon Server.
Install IIS
Run the following PowerShell script on the Tachyon Server. Do this even if IIS is already installed because it will ensure all the required features and roles are installed.
If more detail is required, refer to IIS Configuration in the main Preparation section.
Request a Web Server certificate
You will need to have requested a Web Server certificate from your Certificate Authority. To get the certificate in your organization you will have either:
- Submitted a CSR and received a password protected PFX file
- Used the Certificate Enrollment wizard to request a suitable Web Server certificate.
Once the Web Server certificate has been provided it must be imported into the Tachyon Server's local computer Personal Certificates store.
Each server that has Tachyon Server components installed requires its own Web Server certificate (except for a remote SQL Server). This certificate is also used by the Tachyon Switch and the Tachyon Coordinator. Therefore, a single-server installation requires only one Web Server certificate. This certificate must be provided on the server prior to installation of Tachyon.
The Web Server certificate requires the minimum of the following:
- Issued by a trusted Certificate Authority (CA)
- The certificate for the Root CA in the Certification Path must exist in the Trusted Root CA store of the server
- If the issuing CA is not the Root CA then the certificate for the issuing CA and any intermediate CA in the Certification Path must exist in the Intermediate CA store of the server
- The above CA certificates must exist on the Tachyon Web Server and Windows client devices
- Most organizations have automated distribution of these CA certificates to servers and clients, using Group Policy for example.
- Has at least the following Key Usage:
- Digital signature
- Key encipherment
- Has at least the following Enhanced Key Usages:
- Server Authentication
- Revocation information is included
- References at least one CRL Distribution point that uses HTTP - see DMZ Server note below
- Must have a private key available
DMZ Server
Please ensure you note the additional certificate requirements described below, when installing any server in a system that also contains a DMZ Server. Internal Master and Response Stack servers, and DMZ Server, each require two HTTPS bindings, as described in DNS Names. For even more detail, please refer Implementing a Tachyon DMZ Server .
Also note the requirement for server certificates to reference at least one CRL Distribution point that uses HTTP. These CRL DPs are likely to be in the internal network, and the firewall will need to allow the DMZ server to access these internal servers.
Web Server certificates used by a Tachyon Servers must be issued with their fields set as follows. Example DNS Names are discussed in DNS Names.
Fields | Example Option 3 type certificate |
---|---|
Subject Common Name Field (subject:commonName) | Subject (CN) can be any valid name, and is no longer mandatory as required by previous versions of Tachyon. |
Subject Alternative Name Extension (extensions:subjectAltName), type dnsName | The Tachyon Server DNS Name FQDN (DNS Alias) of the server. This is mandatory, same as required by previous versions of Tachyon. On a Master Stack - example: DNS Name=TACHYON.ACME.LOCAL On a Response Stack - example: DNS Name=TACHYONRS.ACME.LOCAL On a DMZ Server - example: DNS Name=TACHYONEXT.ACME.COM |
Subject Alternative Name Extension (extensions:subjectAltName), type dnsName | An Alternate DNS Name FQDN (DNS Alias) of the server. This is usually mandatory, for example if there is more than one server in your Tachyon system, as discussed in DNS Names. On a Master Stack, example: DNS Name=TACHYONALT.ACME.LOCAL or DNS Name=TACHYON.ACME.LOCAL On a Response Stack - example: DNS Name=TACHYONALT.ACME.LOCAL On a DMZ Server - example: DNS Name=TACHYONDMZ.ACME.LOCAL |
Example |
Request a client certificate
You will need to have requested a client certificate from your Certificate Authority. This will be used to authenticate communications between the Background Channel and the ContentDistribution components to support Nomad features.
Get the Tachyon files
You will need to download the following to complete the quick start.
1E Client installers
The 1EClient zip file can be downloaded from https://1eportal.force.com/s/tachyontopicdetail on the 1E Support Portal. The zip includes the following files used to install the Tachyon client on Windows devices:
- 1E.Client-x64.msi
- 1E.Client-x86.msi
Tachyon Server installers
The TachyonPlatform zip file can be downloaded from 1E Support Portal (1eportal.force.com/s/tachyontopicdetail). Extracting the zip will create a folder structure containing the following, where the files highlighted in bold are required by Tachyon Setup.
| Please refer to:
Tachyon Setup is the only supported method of installing a Tachyon Server. Installation using standalone MSI is not supported unless advised by 1E, which may be necessary in complex installations, using non-interactive (quiet/silent) command-lines, and may require post-install configuration steps. | ||||
| 1E may make available accumulated hotfixes (as MSP files) for the installers supported by Tachyon Setup. You should download the latest accumulated hotfixes before running Tachyon Setup. For each product included in Tachyon Setup, you should check the 1E Support Portal (1eportal.force.com/s/article/LatestHotfixes) and download the latest Accumulated Hotfix zip (if any). Ensure you download the correct version. If any installer MSI has a corresponding Accumulated Hotfix zip, then extract the MSP file and place it the Installers\Patches folder. If the Installers\Patches folder does not exist you will need to create it manually. You must not rename the extracted patch MSP files from 1E when placing them in the Installers\Patches folder. Remove older MSP files leaving only the latest for each product (if any). Please read the readme html included in the ZIP in case there are any special installation instructions. If in doubt, apply the MSP manually after installation, following the instructions in the readme. | ||||
| |||||
| This folder contains Tachyon consumer applications that will be installed by Tachyon Setup if their prerequisites are met. If you do not want to install a Tachyon consumer application, then delete the folder before running Tachyon Setup. Later, if you need to install the Tachyon consumer application then you can reinstate the folder and install the app using Tachyon Setup as described in Tachyon Setup: Applications maintenance. | ||||
| These Product Packs are required to support various Tachyon features, for more detail please refer to Tachyon Product Packs reference. If your license permits, you can use additional Product Packs available from Tachyon Exchange (tachyonexchange.1e.com) to meet specific use-cases.
The Tachyon Product Pack deployment tool can be started independently, or at the end of the Tachyon Setup process via the Quick Start: Post-installation checks screen, where the screen contains a link that launches the tool. The Tachyon Setup method of starting the tool is recommended because Tachyon Setup ensures you have the correct permissions to upload the Product Packs. Before Tachyon 5.0, Product Packs were provided as a separate TachyonProductPacks zip file, which you had to download separately and place in the right location for importing into Tachyon. Now they are included in the TachyonPlatform zip file so that the tool and packs can be found by Tachyon Setup. |
Quick start Tachyon client devices
The Tachyon client is supported on the following Windows OS in a quick start environment.
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
- Windows 10 CB 22H2
- Windows 11 CB 22H2
- Windows 10 CB 21H2
- Windows 11 CB 21H2
If using any other OS then please refer to Supported Platforms and Tachyon client installation pages in the Reference section.
Tachyon users on the Tachyon client devices can connect to the Tachyon Explorer portal using any of the following browsers:
Latest version of:
- Google Chrome
- Microsoft Edge (Chromium)
- Mozilla Firefox
PowerShell is used by some Tachyon Product Packs. If more detail is required, refer to PowerShell on Windows OS in the main Design considerations section.
If you have configured Tachyon Server to require client certificates (Tachyon Setup: Client certificates) then each device requires a certificate with the following properties, so the Tachyon client can be authenticated by the Tachyon Switch.
- Issued by a trusted Certificate Authority (CA)
- The certificate for the Root CA in the Certification Path must exist in the Trusted Root CA store of the client
- If the issuing CA is not the Root CA then the certificate for the issuing CA and any intermediate CA in the Certification Path must exist in the Intermediate CA store of the client
- If either of these CA certificates are different to those used by the Tachyon Web Server, they will need to be exported and imported on the Tachyon Web Server
- Most organizations have automated distribution of these CA certificates to clients and servers, using Group Policy for example.
- Has at least the following Enhanced Key Usage
- Client Authentication
- Has at least the following Key Usage
- Digital Signature
- Key encipherment
- Has a private key
- For workgroup and non-Windows devices, the private key must be exportable
- Revocation information is included.
- References at least one CRL Distribution point that uses HTTP.
- Has a Subject Name of type Common Name (CN=<computername>) or Subject Alternative Name (DNS Name=<computername>) where <computername> depends on the type of device:
- On domain-joined Windows PCs this must be the computername FQDN of the computer, for example W701.ACME.LOCAL
- On workgroup Windows PCs and non-Windows devices, this must be the computername of the computer - as returned by the hostname command, for example on Windows PC this could be W701, and on a Mac this could be MAC01.local
Tachyon clients and Switches use OpenSSL and its validation process to verify certificates.
Quick start user accounts
For simplicity in the quick start guide, we use just two Tachyon user accounts, the installation account and another full administrator account.
To get things up and running quickly in a lab environment, you may want to make use of the full administrator role. This will help minimize the number of users required for an evaluation and reduce the initial configuration required.
To further minimize the number of users needed, you can also enable the Windows account used to install Tachyon to assume the Tachyon full administrator role. The installation account is added as the system principal user in Tachyon by the installer, and its Tachyon permissions are locked down by default. You can allow it to assume the full administrator role using the following steps:
- Create a Tachyon user from an existing AD security group.
- Apply the Tachyon full administrator role to the user.
- Add the installation account to the AD security group.
In the short term it's fine to make use of full administrators in this way, but this practice is not really suitable for large-scale deployments and should be used with care for the following reasons:
- The full administrator role has permissions to do everything in Tachyon. It has across the board permissions to all Instruction Sets and therefore can be used to run actions that can have a major impact on your network.
- The full administrator accounts receive emails for all the transactions that are performed by Tachyon.
For the purposes of the quick start, which uses two-factor authentication, each account must have its AD account configured with an email address.
If two-factor authentication is enabled (as it is by default) email is required for any user who intends to run an action, in this case TCNInstaller01.
Using just the following accounts we can perform all the installation, Tachyon administration, verification questions, actions and approval tasks shown in this quick start guide.
Account | Description | Tachyon roles |
---|---|---|
TCNInstaller01 | Server installation account, used to install Tachyon Server and configure initial security user and roles settings. This account requires the following rights:
This account should be a member of the TCNGAdministrators group | The roles for this account cannot be changed directly, but this account may be added to AD groups with other Tachyon permissions assigned. |
TCNAdmin01 | A user account that will be used in combination with the TCNInstaller01 user to enable the request and approval of actions. | No direct Tachyon roles applied to this account. |
TCNGAdministrators | An AD Universal group with two members: TNCInstaller01 and TCNAdmin01. | Global Administrators role. |
Quick start service accounts
The table below describes all the service accounts and where they are used. Where domain accounts are required, you should create separate domain user accounts for each service.
Account | Description |
---|---|
CATSVC | 1E Catalog Update Service account. Used by the 1E Catalog Update service to connect to the 1E Cloud service via the Internet to download catalog updates and upload anonymous details about newly detected software. Used by the Catalog web application pool to connect to the 1ECatalog database on the SQL Server database instance. |
BISSASSVC | Business Intelligence (BI) SSAS user account. Used to access the BI cube on the SSAS instance by services on the web server and the linked server on the SQL Server database instance. |
SLATACHYON | A Tachyon user account that will be used by the Tachyon Connector, which provides the Tachyon Powered Inventory. This account will be a member of the 1E Inventory custom role, which has questioner permissions on the 1E Inventory instructions set. The instruction set contains four Tachyon instructions. You can choose different names for this role and instruction set. |
Network Service | On local servers, this is NT AUTHORITY\Network Service; on remote servers, this is: ACME\computer$ where computer is the computer name of the Tachyon Server. Used by the following for connection to databases on the SQL Server database instance:
Used by the 1E Tachyon Coordinator service to connect to the 1E license cloud to validate and activate the Tachyon license. Used by the System Center Configuration Manager (SCCM) Connector if the connector configuration has Use Windows Authentication enabled instead of a SQL Login. |
Local System | Used by the 1E Tachyon Switch Host service. |
Install
Tachyon Server
After obtaining your Tachyon.lic file from 1E you should store it in a secure location. In our example we've placed the Tachyon.lic file in the installation directory where Tachyon.Setup.exe is located.
Logon to the server using the server installation account TCNInstaller01.
Tachyon clients
When installing 1E Client (with Tachyon features enabled) the following installation settings are mandatory and must be supplied. Other Tachyon client configuration settings are optional and have been assigned default values.
The following properties can be entered manually when installing from the Windows Installer wizard. Alternatively, the properties can be included as part of a Windows msiexec command-line launch.
Property | Mandatory | Setting |
---|---|---|
BACKGROUNDCHANNELURL | Yes | Set to the previously configured Tachyon DNS Name FQDN. You will also need to specify the port and the rest of the background channel URL. By default, the port is set to 443. In our example, this would be set to: https://TACHYON.ACME.local:443/Background/ |
Yes | Set to the previously configured Tachyon DNS Name FQDN. From version 3.1 onwards, you will also need to specify the port. By default, this is set to 4000. In our example, this would be set to: TACHYON.ACME.local:4000 |
Example which enables only Tachyon client
Example Windows 1E Client installer command-line with only the Tachyon client features enabled, other client modules are not enabled. Tachyon uses HTTPS only.
msiexec /i 1E.Client-x64.msi SWITCH="tachyon.acme.local:4000" BACKGROUNDCHANNELURL="https://tachyon.acme.local:443/Background/" /qn /l*vx C:\Windows\temp\1EClient-install.log
Example which enables only Nomad client
Example Windows 1E Client installer command-line with only Nomad client module enabled, which also requires Tachyon client features to be enabled. Tachyon uses HTTPS only.
msiexec /i 1E.Client-x64.msi SWITCH="tachyon.acme.local:4000" BACKGROUNDCHANNELURL="https://tachyon.acme.local:443/Background/" MODULE.NOMAD.ENABLED=true MODULE.NOMAD.CONTENTREGISTRATION=1 MODULE.NOMAD.SSDENABLED=1 /qn /l*vx C:\Windows\temp\1EClient-install.log
Example which enables only PXE Everywhere Agent
Example Windows 1E Client installer command-line with only PXE Everywhere Agent client module enabled, and Tachyon features disabled (by setting SWITCH and BACKGROUNDCHANNELURL to none). PXE Everywhere uses only HTTP.
msiexec /i 1E.Client-x64.msi SWITCH=none BACKGROUNDCHANNELURL=none MODULE.PXEEVERYWHERE.ENABLED=true MODULE.PXEEVERYWHERE.CONFIGSERVERURL="http://pxecentral.acme.local/PXELite/PXELiteConfiguration.asmx" /qn /l*vx C:\Windows\temp\1EClient-install.log
Example which enables only Shopping client
Example Windows 1E Client installer command-line with only Shopping client module enabled, and Tachyon features disabled (by setting SWITCH and BACKGROUNDCHANNELURL to none). Ensure you use HTTP or HTTPS as appropriate.
msiexec /i 1E.Client-x64.msi SWITCH=none BACKGROUNDCHANNELURL=none MODULE.SHOPPING.ENABLED=true MODULE.SHOPPING.SHOPPINGCENTRALURL="https://appstore.acme.local/shopping" MODULE.SHOPPING.LOOPBACKEXEMPTIONENABLED=true /qn /l*vx C:\Windows\temp\1EClient-install.log
Example which enables only WakeUp client
Example Windows 1E Client installer command-line with only WakeUp client module enabled, and Tachyon features disabled (by setting SWITCH and BACKGROUNDCHANNELURL to none).
msiexec /i 1E.Client-x64.msi SWITCH=none BACKGROUNDCHANNELURL=none MODULE.WAKEUP.ENABLED=true MODULE.WAKEUP.REPORTINGSERVER="nwmserver.acme.local" /qn /l*vx C:\Windows\temp\1EClient-install.log
Export all responses feature
This step is optional, only if you require this feature. Please refer to Tachyon Server post-installation tasks: Configure the Tachyon Server to support the Export all responses feature for more details.
Configure
Set security roles
After installation you will only be able to log onto the Tachyon Explorer using the installation account. This account is purposefully restricted to just allowing the configuration of security roles. So the first step must be to add other users to access the other capabilities of Tachyon.
Users for administration
We suggest that you add a user or group to handle the administration tasks for your evaluation environment.
Users for performing actions
To perform actions you will need at least two other users. One an actioner and the other an approver, otherwise you won't be able to perform actions.
A Tachyon AD group tutorial
For this quick start guide we use two specific accounts and a security group to assign to the roles we need. You may want to use AD groups to define Tachyon access and we have provided a complete tutorial on adding users and roles via AD groups, on the Configuring Access Rights: tutorial page, which you may find useful.
Use
Using Tachyon
Having configured the users who will access Tachyon we can now go on to demonstrate the basic functionality of Tachyon including: viewing connected devices, asking a question and seeing the responses, requesting to perform an action and the associated approval process.
In conclusion
In this quick start guide we've shown how to configure an example environment, how to implement the Tachyon Server and Tachyon clients onto the environment, how to configure the Tachyon users and import product packs. Finally we've shown those users accessing the Tachyon Explorer to investigate the devices that are currently connected and then asking a question and performing and approving an action.
Next Steps
Using applications that are installed by default
The following applications are always installed by Tachyon Setup, although you may have limited access to features depending on your Tachyon license.
- Settings - please refer to Using Settings
- Inventory - please refer to Using Inventory
- Tachyon Explorer - please refer to Tachyon Explorer 8.0 - Using Tachyon Explorer
- Guaranteed State - please refer to Guaranteed State 8.0 - Using Guaranteed State
- Experience - please refer Tachyon Experience 8.0 - Implementing Experience.
Please refer to Tachyon Platform 8.0 - Using consumer applications for a summary of these and other optional applications.
Use the Connectors page in the Inventory application to configure connectors and populate the inventory repository. Using Inventory describes how to view the normalized inventory data, which can then be used by the following applications that adepend on inventory.
- AppClarity
- Application Migration
- Patch Success.
Installing and Using AppClarity
You can use Tachyon Setup install AppClarity during or after you install or upgrade Tachyon using Tachyon Setup. Please refer to AppClarity 8.0 - Implementing AppClarity.
Installing and Using Application Migration
You can install Application Migration during or after you install or upgrade Tachyon using Tachyon Setup. Please refer to Application Migration 8.0 - Implementing Application Migration.
Installing and Using Patch Success
Use must use Tachyon Setup to install and configure Patch Success when you install or upgrade Tachyon Platform. Further configuration is then required as described in 1E Patch Success 8.0 - Implementing Patch Success
Installing and Using Nomad
You can install Nomad during or after you install or upgrade Tachyon using Tachyon Setup. Please refer to Nomad 8.0 - Implementing Nomad.
Using Configuration Manager Console Extensions
If you have Microsoft System Center Configuration Manager (SCCM, ConfigMgr) then you can install the Tachyon toolkit on each computer that has Configuration Manager Console installed, in order to add right-click tools. Please refer to The 1E Tachyon Toolkit.
Creating your own instructions
You will need your own code signing certificate, and have it registered in your Tachyon license, if you want to develop your own custom Tachyon instructions, or modify those of other authors. Instructions that are provided in the Tachyon Platform zip or downloaded from the Tachyon Exchange have already been code signed using the Platform and Exchange certificates from 1E. Your Tachyon license controls whether you can use these instructions.
Ideally, all of your Tachyon instruction developers should share a single code signing certificate between them. Each code signing certificate must be registered in your Tachyon license and associated with your organization's instruction name prefix. When you have chosen your prefix and have your code signing certificate(s) you then need to send details of these to 1E, who will update your Tachyon license. This will then automatically activate on your Tachyon Server (assuming it has connection to the Internet).
For a detailed step-by-step process, please refer to Setting up custom Tachyon Instructions for the first time.
The Tachyon SDK is where you can find comprehensive resources for using Tachyon Instruction Management Studio (TIMS) and authoring your instructions.