JOSSO.orgCommunity Documentation


Reference Guide

1. Introduction
1.1. Enter Point-and-Click Internet Single Sign On (SSO)
1.2. First or Second Generation ?
2. JOSSO2 Rollout
2.1. Install JOSSO
2.2. The JOSSO2 Layout
3. The Building Blocks
3.1. Architecture
3.1.1. OSGi background
3.1.2. Identity Appliances
3.2. JOSSO2 Building Blocks
3.2.1. Providers
3.2.2. Identity Sources
3.2.3. Execution Environments
3.2.4. Authentication Servers
3.2.5. Connections
4. Atricore Console and Model Driven Identity
4.1. Model-Driven Identity
4.2. Modeling vs. Implementing
4.3. What is Model-Driven Development?
4.4. The Identity Architect Role
4.5. Identity Appliance Modeler Overview
4.6. Identity Appliance Life Cycle Management Overview
4.7. Account and Entitlement Management Overview
4.7.1. Accounts Overview
4.7.2. Groups Overview
4.7.3. Schema Overview
5. Identity Appliance Creation
5.1. Starting from Scratch
5.2. Scaffolding
6. Identity Source Setup
6.1. Setup of an Identity Vault
6.2. Setup of an LDAP Directory Identity Source
6.3. Set Up an RDBMS Identity Source
6.4. Set Up an XML Identity Source
7. Authentication Setup
7.1. Set Up Directory-based Authentication
7.2. Set Up Integrated Windows Authentication
7.3. Set Up Two-Factor Authentication
8. Identity Provider Setup
8.1. Add an IdP to the Identity Appliance
8.2. Set Up the Identity Store of the Identity Provider
8.2.1. Using an Identity Vault as the Authoritative Source for the Identity Provider
8.2.2. Using an LDAP Directory as Authoritative Source for the Identity Provider
8.2.3. Using an RDBMS as Authoritative Source for the Identity Provider
8.2.4. Using XML files as the Authoritative source for the Identity Provider
9. Service Provider Setup
9.1. Set Up the Identity Source of the Service Provider
9.1.1. Using an Identity Vault as the Authoritative Source for the Service Provider
9.1.2. Using an LDAP Directory as the Authoritative Source for the Service Provider
9.1.3. Using an RDBMS as the Authoritative Source for the Service Provider
9.1.4. Using XML files as the Authoritative Source for the Service Provider
9.2. Set Up the Execution Environment of the Service Provider
9.2.1. Using an Alfresco Execution Environment
9.2.2. Using an Apache Web Server Execution Environment
9.2.3. Using a JavaEE Execution Environment
9.2.4. Using a JBoss Portal Execution Environment
9.2.5. Using a Liferay Portal Execution Environment
9.2.6. Using a phpBB Execution Environment
9.2.7. Using a Webserver Execution Environment
9.2.8. Using an Oracle Weblogic Execution Environment
9.2.9. Using a Websphere Community Edition (WASCE) Execution Environment
9.2.10. Using a Windows IIS Execution Environment
9.2.11. Using an Apache Tomcat Execution Environment
9.2.12. Using a JBoss Execution Environment
10. Circle of Trust Establishment
10.1. Connecting Identity Providers with Service Providers
11. Identity Appliance Lifecycle Management
11.1. Build an Identity Appliance
11.2. Deploy an Identity Appliance
11.3. Managing Identity Appliance Execution
11.3.1. Start an Identity Appliance
11.3.2. Stop an Identity Appliance
11.4. Undeploy an Identity Appliance
11.5. Dispose an Identity Appliance
11.6. Remove an Identity Appliance
12. Execution Environment Activation
12.1. Bringing SSO-Readiness to Execution Environments
13. Account and Entitlement Management
13.1. User Accounts
13.1.1. General User Information
13.1.2. User Language Preferences
13.1.3. User Groups
13.1.4. User Account Security
13.1.5. Account Password
13.1.6. Provision a User Account
13.1.7. Update User Details
13.1.8. Search Users
13.1.9. Deprovision a User Account
13.2. Groups
14. Profile Operations
14.1. Change Administrator Password
14.2. Close Console Session
15. High-availability and Scalability
15.1. About High Availability
15.1.1. System Failover
15.1.2. Session Failover
15.1.3. Exploring a Reference Architecture
15.1.4. Enabling Clustering
15.1.5. Replicating the Configuration
16. Security Setup
16.1. Configuring Secure Sockets Layer
16.1.1. What Is Secure Socket Layer Technology?
16.1.2. Security Identity and Access Management Services