Repository: stratos
Updated Branches:
  refs/heads/master e615fb82f -> 4c8ba95d1


http://git-wip-us.apache.org/repos/asf/stratos/blob/4c8ba95d/tools/stratos-installer/templates/identity.xml
----------------------------------------------------------------------
diff --git a/tools/stratos-installer/templates/identity.xml 
b/tools/stratos-installer/templates/identity.xml
new file mode 100755
index 0000000..b4b3c41
--- /dev/null
+++ b/tools/stratos-installer/templates/identity.xml
@@ -0,0 +1,252 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!-- ~ Copyright (c) 2005-2011, WSO2 Inc. (http://www.wso2.org) All Rights 
+       Reserved. ~ ~ WSO2 Inc. licenses this file to you under the Apache 
License, 
+       ~ Version 2.0 (the "License"); you may not use this file except ~ in 
compliance 
+       with the License. ~ You may obtain a copy of the License at ~ ~ 
http://www.apache.org/licenses/LICENSE-2.0 
+       ~ ~ Unless required by applicable law or agreed to in writing, ~ 
software 
+       distributed under the License is distributed on an ~ "AS IS" BASIS, 
WITHOUT 
+       WARRANTIES OR CONDITIONS OF ANY ~ KIND, either express or implied. See 
the 
+       License for the ~ specific language governing permissions and 
limitations 
+       ~ under the License. -->
+
+<Server xmlns="http://wso2.org/projects/carbon/carbon.xml";>
+
+       <JDBCPersistenceManager>
+               <DataSource>
+                       <!-- Include a data source name (jndiConfigName) from 
the set of data 
+                               sources defined in master-datasources.xml -->
+                       <Name>jdbc/WSO2CarbonDB</Name>
+               </DataSource>
+               <!-- If the identity database is created from another place and 
if it is 
+                       required to skip schema initialization during the 
server start up, set the 
+                       following property to "true". -->
+               <!-- <SkipDBSchemaCreation>false</SkipDBSchemaCreation> -->
+       </JDBCPersistenceManager>
+
+       <!-- Security configurations -->
+       <Security>
+               <UserTrustedRPStore>
+                       
<Location>${carbon.home}/repository/resources/security/userRP.jks
+                       </Location>
+                       <!-- Keystore type (JKS/PKCS12 etc.) -->
+                       <Type>JKS</Type>
+                       <!-- Keystore password -->
+                       <Password>wso2carbon</Password>
+                       <!-- Private Key password -->
+                       <KeyPassword>wso2carbon</KeyPassword>
+               </UserTrustedRPStore>
+
+               <!-- The directory under which all other KeyStore files will be 
stored -->
+               <KeyStoresDir>${carbon.home}/conf/keystores</KeyStoresDir>
+       </Security>
+
+       <Identity>
+               <IssuerPolicy>SelfAndManaged</IssuerPolicy>
+               <TokenValidationPolicy>CertValidate</TokenValidationPolicy>
+               <BlackList></BlackList>
+               <WhiteList></WhiteList>
+               <System>
+                       <KeyStore></KeyStore>
+                       <StorePass></StorePass>
+               </System>
+       </Identity>
+
+       <OpenID>
+               
<OpenIDServerUrl>https://localhost:9443/openidserver</OpenIDServerUrl>
+               
<OpenIDUserPattern>https://localhost:9443/openid/</OpenIDUserPattern>
+               <!-- If the users must be prompted for approval -->
+               <OpenIDSkipUserConsent>false</OpenIDSkipUserConsent>
+               <!-- Expiry time of the OpenID RememberMe token in minutes -->
+               <OpenIDRememberMeExpiry>7200</OpenIDRememberMeExpiry>
+               <!-- Multifactor Authentication configuration -->
+               
<UseMultifactorAuthentication>false</UseMultifactorAuthentication>      
+               <!-- To enable or disable openid dumb mode -->
+               <DisableOpenIDDumbMode>false</DisableOpenIDDumbMode>
+               <!-- remember me session timeout in seconds -->
+               <SessionTimeout>36000</SessionTimeout>
+               <!-- skips authentication if valid SAML2 Web SSO browser 
session available -->
+               <AcceptSAMLSSOLogin>false</AcceptSAMLSSOLogin>
+               
<ClaimsRetrieverImplClass>org.wso2.carbon.identity.provider.openid.claims.DefaultClaimsRetriever</ClaimsRetrieverImplClass>
+       </OpenID>
+
+       <OAuth>
+               
<RequestTokenUrl>https://localhost:9443/oauth/request-token</RequestTokenUrl>
+               
<AccessTokenUrl>https://localhost:9443/oauth/access-token</AccessTokenUrl>
+               
<AuthorizeUrl>https://localhost:9443/oauth/authorize-url</AuthorizeUrl>
+               <!-- Default validity period for Authorization Code in seconds 
-->
+               
<AuthorizationCodeDefaultValidityPeriod>300</AuthorizationCodeDefaultValidityPeriod>
+               <!-- Default validity period for user access tokens in seconds 
-->
+               
<AccessTokenDefaultValidityPeriod>3600</AccessTokenDefaultValidityPeriod>
+               <!-- Default validity period for application access tokens in 
seconds -->
+               
<UserAccessTokenDefaultValidityPeriod>3600</UserAccessTokenDefaultValidityPeriod>
+               <!-- Validity period for refresh token -->              
+               <RefreshTokenValidityPeriod>84600</RefreshTokenValidityPeriod>
+               <!-- Timestamp skew in seconds -->
+               <TimestampSkew>300</TimestampSkew>
+               <!-- Enable OAuth caching -->
+               <EnableOAuthCache>true</EnableOAuthCache>
+               <!-- Enable renewal of refresh token for refresh_token grant -->
+               
<RenewRefreshTokenForRefreshGrant>true</RenewRefreshTokenForRefreshGrant>
+               <!-- Process the token before storing it in database, e.g. 
encrypting -->
+               
<TokenPersistenceProcessor>org.wso2.carbon.identity.oauth.tokenprocessor.PlainTextPersistenceProcessor</TokenPersistenceProcessor>
+               <!-- Supported Client Autnetication Methods -->
+               <ClientAuthHandlers>
+                   
<ClientAuthHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.clientauth.BasicAuthClientAuthHandler</ClientAuthHandlerImplClass>
+               </ClientAuthHandlers>           
+               <!-- Supported Response Types -->
+               <SupportedResponseTypes>
+                   <SupportedResponseType>
+                       <ResponseTypeName>token</ResponseTypeName>
+                       
<ResponseTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.authz.handlers.TokenResponseTypeHandler</ResponseTypeHandlerImplClass>
+                   </SupportedResponseType>
+                   <SupportedResponseType>
+                       <ResponseTypeName>code</ResponseTypeName>
+                       
<ResponseTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.authz.handlers.CodeResponseTypeHandler</ResponseTypeHandlerImplClass>
+                   </SupportedResponseType>
+               </SupportedResponseTypes>
+               <!-- Supported Grant Types -->
+               <SupportedGrantTypes>
+                   <SupportedGrantType>
+                       <GrantTypeName>authorization_code</GrantTypeName>
+                       
<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.AuthorizationCodeGrantHandler</GrantTypeHandlerImplClass>
+                   </SupportedGrantType>
+                   <SupportedGrantType>
+                       <GrantTypeName>password</GrantTypeName>
+                       
<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.PasswordGrantHandler</GrantTypeHandlerImplClass>
+                   </SupportedGrantType>
+                   <SupportedGrantType>
+                       <GrantTypeName>refresh_token</GrantTypeName>
+                       
<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.RefreshGrantHandler</GrantTypeHandlerImplClass>
+                   </SupportedGrantType>
+                   <SupportedGrantType>
+                       <GrantTypeName>client_credentials</GrantTypeName>
+                       
<!--<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.ClientCredentialsGrantHandler</GrantTypeHandlerImplClass>-->
+                       
<GrantTypeHandlerImplClass>org.apache.stratos.custom.handlers.granttype.ClientCredentialsGrantHandler</GrantTypeHandlerImplClass>
+                   </SupportedGrantType>
+                   <SupportedGrantType>
+                       
<GrantTypeName>urn:ietf:params:oauth:grant-type:saml2-bearer</GrantTypeName>
+                       
<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.saml.SAML2BearerGrantHandler</GrantTypeHandlerImplClass>
+                   </SupportedGrantType>
+                   <SupportedGrantType>
+                        <GrantTypeName>iwa:ntlm</GrantTypeName>
+                        
<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.iwa.ntlm.NTLMAuthenticationGrantHandler</GrantTypeHandlerImplClass>
+                    </SupportedGrantType>
+               </SupportedGrantTypes>
+               <OAuthCallbackHandlers>
+                       <OAuthCallbackHandler 
Class="org.wso2.carbon.identity.oauth.callback.DefaultCallbackHandler" />
+               </OAuthCallbackHandlers>
+               <!--TokenValidators>
+                       <TokenValidator type="bearer" 
class="org.wso2.carbon.identity.oauth2.validators.DefaultOAuth2TokenValidator"/>
+               </TokenValidators-->
+               <!-- Assertions can be used to embedd parameters into access 
token. -->
+               <EnableAssertions>
+                       <UserName>false</UserName>
+               </EnableAssertions>
+
+               <!-- This should be set to true when using multiple user stores 
and keys 
+                       should saved into different tables according to the 
user store. By default 
+                       all the application keys are saved in to the same 
table. UserName Assertion 
+                       should be 'true' to use this. -->
+               
<EnableAccessTokenPartitioning>false</EnableAccessTokenPartitioning>
+               <!-- user store domain names and mapping to new table name. eg: 
if you 
+                       provide 'A:foo.com', foo.com should be the user store 
domain name and 'A' 
+                       represent the relavant mapping of token store table, 
i.e. tokens will be 
+                       added to a table called IDN_OAUTH2_ACCESS_TOKEN_A. -->
+               <AccessTokenPartitioningDomains><!-- A:foo.com, B:bar.com -->
+               </AccessTokenPartitioningDomains>
+               <AuthorizationContextTokenGeneration>           
+                       <Enabled>false</Enabled>
+                       
<TokenGeneratorImplClass>org.wso2.carbon.identity.oauth2.authcontext.JWTTokenGenerator</TokenGeneratorImplClass>
+                       
<ClaimsRetrieverImplClass>org.wso2.carbon.identity.oauth2.authcontext.DefaultClaimsRetriever</ClaimsRetrieverImplClass>
+                       
<ConsumerDialectURI>http://wso2.org/claims</ConsumerDialectURI>
+                       <SignatureAlgorithm>SHA256withRSA</SignatureAlgorithm>
+                       <AuthorizationContextTTL>15</AuthorizationContextTTL>
+               </AuthorizationContextTokenGeneration>
+               <SAML2Grant>
+                       <!--SAML2TokenHandler></SAML2TokenHandler-->
+               </SAML2Grant>
+                <OpenIDConnect>
+                         
<IDTokenBuilder>org.wso2.carbon.identity.openidconnect.DefaultIDTokenBuilder</IDTokenBuilder>
+                         
<IDTokenIssuerID>https://localhost:9443/oauth2endpoints/token</IDTokenIssuerID>
+                         
<IDTokenSubjectClaim>http://wso2.org/claims/givenname</IDTokenSubjectClaim>
+                         
<IDTokenCustomClaimsCallBackHandler>org.wso2.carbon.identity.openidconnect.SAMLAssertionClaimsCallback</IDTokenCustomClaimsCallBackHandler>
+                         <IDTokenExpiration>3600</IDTokenExpiration>
+                         
<UserInfoEndpointClaimDialect>http://wso2.org/claims</UserInfoEndpointClaimDialect>
+                         
<UserInfoEndpointClaimRetriever>org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoUserStoreClaimRetriever</UserInfoEndpointClaimRetriever>
+                         
<UserInfoEndpointRequestValidator>org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInforRequestDefaultValidator</UserInfoEndpointRequestValidator>
+                         
<UserInfoEndpointAccessTokenValidator>org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoISAccessTokenValidator</UserInfoEndpointAccessTokenValidator>
+                         
<UserInfoEndpointResponseBuilder>org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoJSONResponseBuilder</UserInfoEndpointResponseBuilder>
+                         <SkipUserConsent>false</SkipUserConsent>
+                </OpenIDConnect>
+       </OAuth>
+
+
+       <MultifactorAuthentication>
+               <XMPPSettings>
+                       <XMPPConfig>
+                               <XMPPProvider>gtalk</XMPPProvider>
+                               <XMPPServer>talk.google.com</XMPPServer>
+                               <XMPPPort>5222</XMPPPort>
+                               <XMPPExt>gmail.com</XMPPExt>
+                               
<XMPPUserName>[email protected]</XMPPUserName>
+                               <XMPPPassword>wso2carbon</XMPPPassword>
+                       </XMPPConfig>
+               </XMPPSettings>
+       </MultifactorAuthentication>
+
+       <SSOService>
+               <EntityId>localhost</EntityId>
+               
<IdentityProviderURL>https://localhost:9443/samlsso</IdentityProviderURL>
+               <SingleLogoutRetryCount>5</SingleLogoutRetryCount>
+               <SingleLogoutRetryInterval>60000</SingleLogoutRetryInterval> 
<!-- in milli seconds -->
+               <TenantPartitioningEnabled>false</TenantPartitioningEnabled>
+               <SessionTimeout>36000</SessionTimeout> <!-- remember me session 
timeout in seconds -->
+               <!-- skips authentication if valid SAML2 Web SSO browser 
session available -->
+               
<AttributeStatementBuilder>org.wso2.carbon.identity.sso.saml.attributes.UserAttributeStatementBuilder</AttributeStatementBuilder>
+                
<AttributesClaimDialect>http://wso2.org/claims</AttributesClaimDialect>
+               <AcceptOpenIDLogin>false</AcceptOpenIDLogin>
+               
<ClaimsRetrieverImplClass>org.wso2.carbon.identity.sso.saml.builders.claims.DefaultClaimsRetriever</ClaimsRetrieverImplClass>
+               
<SAMLSSOEncrypter>org.wso2.carbon.identity.sso.saml.builders.encryption.DefaultSSOEncrypter</SAMLSSOEncrypter>
+                
<SAMLSSOSigner>org.wso2.carbon.identity.sso.saml.builders.signature.DefaultSSOSigner</SAMLSSOSigner>
+                
<SAML2HTTPRedirectSignatureValidator>org.wso2.carbon.identity.sso.saml.validators.SAML2HTTPRedirectDeflateSignatureValidator</SAML2HTTPRedirectSignatureValidator>
+                
<!--SAMLSSOResponseBuilder>org.wso2.carbon.identity.sso.saml.builders.DefaultResponseBuilder</SAMLSSOResponseBuilder-->
+
+               <!-- SAML Token validity period in minutes -->
+                <SAMLResponseValidityPeriod>5</SAMLResponseValidityPeriod>
+               <UseAuthenticatedUserDomain>false</UseAuthenticatedUserDomain>
+       </SSOService>
+
+       <EntitlementSettings>
+               <!-- Uncomment this to enable on-demand policy loading -->
+               <!--OnDemandPolicyLoading> <Enable>true</Enable> 
<MaxInMemoryPolicies>100</MaxInMemoryPolicies> 
+                       </OnDemandPolicyLoading -->
+               <DecisionCaching>
+                       <Enable>true</Enable>
+                       <CachingInterval>36000</CachingInterval>
+               </DecisionCaching>
+               <AttributeCaching>
+                       <Enable>true</Enable>
+               </AttributeCaching>
+               <ThirftBasedEntitlementConfig>
+                       <EnableThriftService>true</EnableThriftService>
+                       
<ReceivePort>${Ports.ThriftEntitlementReceivePort}</ReceivePort>
+                       <ClientTimeout>10000</ClientTimeout>
+                       <KeyStore>
+                               
<Location>${carbon.home}/repository/resources/security/wso2carbon.jks</Location>
+                               <Password>wso2carbon</Password>
+                       </KeyStore>
+               </ThirftBasedEntitlementConfig>
+       </EntitlementSettings>
+       <SCIMAuthenticators>
+               <Authenticator 
class="org.wso2.carbon.identity.scim.provider.auth.BasicAuthHandler">
+                       <Property name="Priority">5</Property>
+               </Authenticator>
+               <Authenticator 
class="org.wso2.carbon.identity.scim.provider.auth.OAuthHandler">
+                       <Property name="Priority">10</Property>
+                       <Property 
name="AuthorizationServer">local://services</Property>
+                       <!--Property 
name="AuthorizationServer">https://localhost:9443/services</Property>
+                       <Property name="UserName">admin</Property>
+                       <Property name="Password">admin</Property-->
+               </Authenticator>
+       </SCIMAuthenticators>
+</Server>

http://git-wip-us.apache.org/repos/asf/stratos/blob/4c8ba95d/tools/stratos-installer/templates/jndi.properties
----------------------------------------------------------------------
diff --git a/tools/stratos-installer/templates/jndi.properties 
b/tools/stratos-installer/templates/jndi.properties
new file mode 100644
index 0000000..f9c29c4
--- /dev/null
+++ b/tools/stratos-installer/templates/jndi.properties
@@ -0,0 +1,33 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements.  See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership.  The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License.  You may obtain a copy of the License at
+# 
+#   http://www.apache.org/licenses/LICENSE-2.0
+# 
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied.  See the License for the
+# specific language governing permissions and limitations
+# under the License.
+
+# register some connection factories
+# connectionfactory.[jndiname]=[ConnectionURL]
+
+java.naming.factory.initial=org.wso2.andes.jndi.PropertiesFileInitialContextFactory
+
+# use the following property to configure the default connector
+connectionfactory.topicConnectionfactory=amqp://admin:admin@clientID/carbon?brokerlist='tcp://MB_HOSTNAME:MB_LISTEN_PORT'&reconnect='true'
+
+# use the following property to specify the JNDI name of the connection 
factory 
+connectionfactoryName=connectionfactory,topicConnectionfactory
+
+# register some topics in JNDI using the form
+# topic.[jndiName]=[physicalName]
+topic.lb-stats=lb-stats
+topic.instance-stats=instance-stats
+topic.summarized-health-stats=summarized-health-stats

http://git-wip-us.apache.org/repos/asf/stratos/blob/4c8ba95d/tools/stratos-installer/templates/security/application-authentication.xml
----------------------------------------------------------------------
diff --git 
a/tools/stratos-installer/templates/security/application-authentication.xml 
b/tools/stratos-installer/templates/security/application-authentication.xml
new file mode 100644
index 0000000..695711c
--- /dev/null
+++ b/tools/stratos-installer/templates/security/application-authentication.xml
@@ -0,0 +1,123 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!-- ~ Copyright (c) 2005-2014, WSO2 Inc. (http://www.wso2.org) All Rights 
+       Reserved. ~ ~ WSO2 Inc. licenses this file to you under the Apache 
License, 
+       ~ Version 2.0 (the "License"); you may not use this file except ~ in 
compliance 
+       with the License. ~ You may obtain a copy of the License at ~ ~ 
http://www.apache.org/licenses/LICENSE-2.0 
+       ~ ~ Unless required by applicable law or agreed to in writing, ~ 
software 
+       distributed under the License is distributed on an ~ "AS IS" BASIS, 
WITHOUT 
+       WARRANTIES OR CONDITIONS OF ANY ~ KIND, either express or implied. See 
the 
+       License for the ~ specific language governing permissions and 
limitations 
+       ~ under the License. -->
+
+<ApplicationAuthentication 
xmlns="http://wso2.org/projects/carbon/application-authentication.xml";>
+
+       <JDBCPersistenceManager>
+               <DataSource>
+                       <!-- Include a data source name (jndiConfigName) from 
the set of data 
+                               sources defined in master-datasources.xml -->
+                       <!--Name>jdbc/WSO2_IDP_DB</Name-->
+                       <Name>jdbc/WSO2CarbonDB</Name>
+               </DataSource>
+       </JDBCPersistenceManager>
+       
+       <!-- 
+               ProxyMode allows framework to operate in either 'smart' mode 
+               or 'dumb' mode.
+               smart = both local and federated authentication is supported
+               dumb = only federated authentication is supported
+       -->
+       <ProxyMode>smart</ProxyMode>    
+        
+       <!-- 
+               AuthenticationEndpointURL is location of the web app containing 
+               the authentication related pages 
+       --> 
+       
<AuthenticationEndpointURL>/authenticationendpoint/login.do</AuthenticationEndpointURL>
+       
+       <!--
+               Extensions allow extending the default behaviour of the 
authentication
+               process.        
+       -->
+       <Extensions> 
+               
<RequestCoordinator>org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator</RequestCoordinator>
+               
<AuthenticationRequestHandler>org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler</AuthenticationRequestHandler>
+               
<LogoutRequestHandler>org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultLogoutRequestHandler</LogoutRequestHandler>
+               
<StepBasedSequenceHandler>org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultStepBasedSequenceHandler</StepBasedSequenceHandler>
+               
<RequestPathBasedSequenceHandler>org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler</RequestPathBasedSequenceHandler>
+               
<StepHandler>org.wso2.carbon.identity.application.authentication.framework.handler.step.impl.DefaultStepHandler</StepHandler>
+               
<HomeRealmDiscoverer>org.wso2.carbon.identity.application.authentication.framework.handler.hrd.impl.DefaultHomeRealmDiscoverer</HomeRealmDiscoverer>
+               
<ClaimHandler>org.wso2.carbon.identity.application.authentication.framework.handler.claims.impl.DefaultClaimHandler</ClaimHandler>
+               
<ProvisioningHandler>org.wso2.carbon.identity.application.authentication.framework.handler.provisioning.impl.DefaultProvisioningHandler</ProvisioningHandler>
+       </Extensions>
+
+       <!--
+               AuthenticatorNameMappings allow specifying an authenticator
+               against a pre-defined alias (which will be used by other 
components. 
+               E.g. Application Mgt component). This enables the usage of a 
custom 
+               authenticator in place of an authenticator that gets packed 
with the 
+               distribution.   
+       -->
+    <AuthenticatorNameMappings>
+        <AuthenticatorNameMapping name="BasicAuthenticator" alias="basic" />
+        <AuthenticatorNameMapping name="OAuthRequestPathAuthenticator" 
alias="oauth-bearer" />
+        <AuthenticatorNameMapping name="BasicAuthRequestPathAuthenticator" 
alias="basic-auth" />
+        <AuthenticatorNameMapping name="IWAAuthenticator" alias="iwa" />
+        <AuthenticatorNameMapping name="SAMLSSOAuthenticator" alias="samlsso" 
/>
+        <AuthenticatorNameMapping name="OpenIDConnectAuthenticator" 
alias="openidconnect" />
+        <AuthenticatorNameMapping name="OpenIDAuthenticator" alias="openid" />
+        <AuthenticatorNameMapping name="PassiveSTSAuthenticator" 
alias="passive-sts" />
+    </AuthenticatorNameMappings>
+
+    <!-- 
+               AuthenticatorConfigs allow specifying various configurations 
needed 
+               by the authenticators by using any number of \'Parameter\' 
elements  
+               E.g.
+               <AuthenticatorConfig name="CustomAuthenticator" enabled="true" 
/>
+                       <Parameter name="paramName1">paramValue</Parameter>
+                       <Parameter name="paramName2">paramValue</Parameter>
+               </AuthenticatorConfig>
+    -->
+       <AuthenticatorConfigs>
+               <AuthenticatorConfig name="BasicAuthenticator" enabled="true" />
+               <AuthenticatorConfig name="OAuthRequestPathAuthenticator" 
enabled="true" />
+               <AuthenticatorConfig name="BasicAuthRequestPathAuthenticator" 
enabled="true" />
+               <AuthenticatorConfig name="SAMLSSOAuthenticator" enabled="true">
+                       <!--Parameter 
name="SAMLSSOManager">org.wso2.carbon.identity.application.authenticator.samlsso.manager.DefaultSAMLSSOManager</Parameter-->
+               </AuthenticatorConfig>
+               <AuthenticatorConfig name="OpenIDConnectAuthenticator" 
enabled="true">
+                       <!--Parameter 
name="IDTokenHandler">org.wso2.carbon.identity.application.authenticator.oidc.DefaultIDTokenHandler</Parameter-->
+                       <!--Parameter 
name="ClaimsRetriever">org.wso2.carbon.identity.application.authenticator.oidc.OIDCUserInfoClaimsRetriever</Parameter-->
  
+               </AuthenticatorConfig>
+               <AuthenticatorConfig name="OpenIDAuthenticator" enabled="true">
+                       <Parameter 
name="LoginPage">/authenticationendpoint/login.do</Parameter>
+                       <Parameter 
name="TrustStorePath">/repository/resources/security/client-truststore.jks</Parameter>
+                       <Parameter 
name="TrustStorePassword">wso2carbon</Parameter>
+                       <!--Parameter 
name="OpenIDManager">org.wso2.carbon.identity.application.authenticator.openid.manager.DefaultOpenIDManager</Parameter>
+                       <Parameter 
name="AttributesRequestor">org.wso2.carbon.identity.application.authenticator.openid.manager.SampleAttributesRequestor</Parameter-->
+               </AuthenticatorConfig>  
+       </AuthenticatorConfigs> 
+
+    <!--
+               Sequences allow specifying authentication flows for different
+               registered applications. \'default\' sequence is taken if an
+               application specific sequence doesn't exist in this file or
+               in the Application Mgt module.
+    -->        
+       <Sequences>
+               <!-- Default Sequence. This is mandatory -->
+               <Sequence appId="default">
+                       <Step order="1">
+                               <Authenticator name="BasicAuthenticator"/>
+                       </Step>
+               </Sequence>
+       </Sequences>
+
+       <ServiceProvidersManagement>
+                
<ApplicationDAO>org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl</ApplicationDAO>
+                
<OAuthOIDCClientDAO>org.wso2.carbon.identity.application.mgt.dao.impl.OAuthApplicationDAOImpl</OAuthOIDCClientDAO>
+                
<SAMLClientDAO>org.wso2.carbon.identity.application.mgt.dao.impl.SAMLApplicationDAOImpl</SAMLClientDAO>
+                
<SystemIDPDAO>org.wso2.carbon.identity.application.mgt.dao.impl.IdentityProviderDAOImpl</SystemIDPDAO>
+                <ClaimDialect>http://wso2.org/claims</ClaimDialect>
+        </ServiceProvidersManagement>
+
+</ApplicationAuthentication>

http://git-wip-us.apache.org/repos/asf/stratos/blob/4c8ba95d/tools/stratos-installer/templates/wso2mb/jndi.properties
----------------------------------------------------------------------
diff --git a/tools/stratos-installer/templates/wso2mb/jndi.properties 
b/tools/stratos-installer/templates/wso2mb/jndi.properties
new file mode 100755
index 0000000..6da76bf
--- /dev/null
+++ b/tools/stratos-installer/templates/wso2mb/jndi.properties
@@ -0,0 +1,20 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements.  See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership.  The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License.  You may obtain a copy of the License at
+# 
+#   http://www.apache.org/licenses/LICENSE-2.0
+# 
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied.  See the License for the
+# specific language governing permissions and limitations
+# under the License.
+
+connectionfactoryName=topicConnectionfactory
+connectionfactory.topicConnectionfactory=amqp://admin:admin@clientID/carbon?brokerlist='tcp://MB_HOSTNAME:MB_LISTEN_PORT'&reconnect='true'
+java.naming.factory.initial=org.wso2.andes.jndi.PropertiesFileInitialContextFactory

Reply via email to