JOSSO.orgCommunity Documentation

JOSSO 2.3

Reference Guide


1. Introduction
1.1. Enter Point-and-Click Internet Single Sign On (SSO)
1.2. First or Second Generation ?
2. JOSSO2 Rollout
2.1. Install JOSSO
2.2. The JOSSO2 Layout
3. The Building Blocks
3.1. Architecture
3.1.1. OSGi background
3.1.2. Identity Appliances
3.2. JOSSO2 Building Blocks
3.2.1. Providers
3.2.2. Identity Sources
3.2.3. Execution Environments
3.2.4. Authentication Servers
3.2.5. Connections
4. Atricore Console and Model Driven Identity
4.1. Model-Driven Identity
4.2. Modeling vs. Implementing
4.3. What is Model-Driven Development?
4.4. The Identity Architect Role
4.5. Identity Appliance Modeler Overview
4.6. Identity Appliance Life Cycle Management Overview
4.7. Account and Entitlement Management Overview
4.7.1. Accounts Overview
4.7.2. Groups Overview
4.7.3. Schema Overview
5. Identity Appliance Creation
5.1. Starting from Scratch
5.2. Scaffolding
6. Identity Source Setup
6.1. Setup of an Identity Vault
6.2. Setup of an LDAP Directory Identity Source
6.3. Set Up an RDBMS Identity Source
6.4. Set Up an XML Identity Source
7. Authentication Setup
7.1. Set Up Directory-based Authentication
7.2. Set Up Integrated Windows Authentication
7.3. Set Up Two-Factor Authentication
8. Identity Provider Setup
8.1. Add an IdP to the Identity Appliance
8.2. Set Up the Identity Store of the Identity Provider
8.2.1. Using an Identity Vault as the Authoritative Source for the Identity Provider
8.2.2. Using an LDAP Directory as Authoritative Source for the Identity Provider
8.2.3. Using an RDBMS as Authoritative Source for the Identity Provider
8.2.4. Using XML files as the Authoritative source for the Identity Provider
9. Service Provider Setup
9.1. Set Up the Identity Source of the Service Provider
9.1.1. Using an Identity Vault as the Authoritative Source for the Service Provider
9.1.2. Using an LDAP Directory as the Authoritative Source for the Service Provider
9.1.3. Using an RDBMS as the Authoritative Source for the Service Provider
9.1.4. Using XML files as the Authoritative Source for the Service Provider
9.2. Set Up the Execution Environment of the Service Provider
9.2.1. Using an Alfresco Execution Environment
9.2.2. Using an Apache Web Server Execution Environment
9.2.3. Using a JavaEE Execution Environment
9.2.4. Using a JBoss Portal Execution Environment
9.2.5. Using a Liferay Portal Execution Environment
9.2.6. Using a phpBB Execution Environment
9.2.7. Using a Webserver Execution Environment
9.2.8. Using an Oracle Weblogic Execution Environment
9.2.9. Using a Websphere Community Edition (WASCE) Execution Environment
9.2.10. Using a Windows IIS Execution Environment
9.2.11. Using an Apache Tomcat Execution Environment
9.2.12. Using a JBoss Execution Environment
10. Circle of Trust Establishment
10.1. Connecting Identity Providers with Service Providers
11. Identity Appliance Lifecycle Management
11.1. Build an Identity Appliance
11.2. Deploy an Identity Appliance
11.3. Managing Identity Appliance Execution
11.3.1. Start an Identity Appliance
11.3.2. Stop an Identity Appliance
11.4. Undeploy an Identity Appliance
11.5. Dispose an Identity Appliance
11.6. Remove an Identity Appliance
12. Execution Environment Activation
12.1. Bringing SSO-Readiness to Execution Environments
13. Account and Entitlement Management
13.1. User Accounts
13.1.1. General User Information
13.1.2. User Language Preferences
13.1.3. User Groups
13.1.4. User Account Security
13.1.5. Account Password
13.1.6. Provision a User Account
13.1.7. Update User Details
13.1.8. Search Users
13.1.9. Deprovision a User Account
13.2. Groups
14. Profile Operations
14.1. Change Administrator Password
14.2. Close Console Session
15. System Settings
15.1. Platform Settings
15.1.1. Controlling Web Settings
15.1.2. Controlling SSH Settings
15.1.3. Controlling Persistence Settings
15.1.4. Controlling Monitoring and Management Settings
15.1.5. Controlling Message Bus Settings
15.1.6. Controlling Logging Settings
15.1.7. Controlling Branding Settings
15.2. Live Services
15.3. Licensing
16. High-availability and Scalability
16.1. About High Availability
16.1.1. System Failover
16.1.2. Session Failover
16.1.3. Exploring a Reference Architecture
16.1.4. Enabling Clustering
16.1.5. Replicating the Configuration
17. Security Setup
17.1. Configuring Secure Sockets Layer
17.1.1. What Is Secure Socket Layer Technology?
17.1.2. Security Identity and Access Management Services