June 25, 2020 0 Comments

Auditing is a key security aspect of identity solutions. The JOSSO’s auditing module provides a systematic way of collecting information related. This tutorial focuses on the scenario that requires JOSSO to play the IP role. We will go through the process of modeling and configuring a. This tutorial describes how to implement RESTful services authentication and authorization using JOSSO. In this case we are using Java.

Author: Zolojar Kigashura
Country: Russian Federation
Language: English (Spanish)
Genre: History
Published (Last): 5 February 2018
Pages: 282
PDF File Size: 4.4 Mb
ePub File Size: 12.62 Mb
ISBN: 974-8-86469-753-3
Downloads: 96159
Price: Free* [*Free Regsitration Required]
Uploader: Goltikus

Both two-factor authentication and single sign-on have historically been expensive and complex affairs. Atricore and WiKID have both been addressing these issues by releasing easy-to-use, open-source software. In this tutorial you will see how easy it is to add two-factor authentication to JOSSO, creating a secure, easy-to-use solution for organizations needing SSO. The rest is all done via the Atricore console.

I highly recommend that you watch the Atricore Configuration video.

Then, I recommend you come back here and use the steps I have here to create your 2-factor authentication SSO demo appliance. I also recommend that you start with a new empty appliance rather than using the wizard, you will learn more and it is cleaner, in my opinion. To start, in the Appliance Modeler screen, with the drop down kosso “Empty Identity Appliance, click the New button.


Here are the detail for mine:. Next, highlight tjtorial Identity Provider icon on the right hand palette and click on the Diagram Canvas. A new Identity Provider icon should appear on the appliance model. Here are the detail for my identity provider:. Next, we need to add a place to store the users. On the palette, open the Identity Sources and select the Identity Vault. Now we need to connect these.

Single Sign On Integration with Portofino – JOSSO

Under the Connections panel of the palette, select Identity Lookup. Then drag the mouse from your Identity Provider to the Identity Vault. The Service provider will need a User Store. Again, I used the defaults, just giving it a name:. Atricore recommends using the Tomcat Execution Environment for simple proof-of-concepts like this. JOSSO is smart enough to install the sample app for you. Click the Tomcat option in the Execution Environments on the palette and position it below the Uttorial Provider.

You will also need tutoriaal click on the Activation button on the Properties pane to install the Demo Application. Also, if you make changes you need to select Reactivate to push the changes.


Then you need to restart Tomcat. Please note that the Connector is using port !

JOSSO : Java API for RESTful Services (JAX-RS) Tutorial

This is tomcat’s default port. If you change the port here, you must also change it in tomcat. Before we add in the WiKID Two-factor authentication, we should test to see if everything works without two-factor authentication. To do that, we need to add some users into the ID vault.

JOSSO 2.4 : Open ID Connect Tutorial

And we need the users anyway. WiKID only does the authentication, not the authorization. Click on the Account and Entitlements tab and then on Create User. A dialog box will prompt you to add a user:. This feature is only available to subscribers. Get your subscription here.

Log in or Sign up. Reduce your monitoring cost, not your coverage. Comprehensive, affordable, and easy-to-use APM and infrastructure monitoring. Your name or email address: Do you already have an account?

No, create an account now. Yes, my password is: