Repository: stratos Updated Branches: refs/heads/master e615fb82f -> 4c8ba95d1
http://git-wip-us.apache.org/repos/asf/stratos/blob/4c8ba95d/tools/stratos-installer/templates/identity.xml ---------------------------------------------------------------------- diff --git a/tools/stratos-installer/templates/identity.xml b/tools/stratos-installer/templates/identity.xml new file mode 100755 index 0000000..b4b3c41 --- /dev/null +++ b/tools/stratos-installer/templates/identity.xml @@ -0,0 +1,252 @@ +<?xml version="1.0" encoding="ISO-8859-1"?> +<!-- ~ Copyright (c) 2005-2011, WSO2 Inc. (http://www.wso2.org) All Rights + Reserved. ~ ~ WSO2 Inc. licenses this file to you under the Apache License, + ~ Version 2.0 (the "License"); you may not use this file except ~ in compliance + with the License. ~ You may obtain a copy of the License at ~ ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ ~ Unless required by applicable law or agreed to in writing, ~ software + distributed under the License is distributed on an ~ "AS IS" BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY ~ KIND, either express or implied. See the + License for the ~ specific language governing permissions and limitations + ~ under the License. --> + +<Server xmlns="http://wso2.org/projects/carbon/carbon.xml"> + + <JDBCPersistenceManager> + <DataSource> + <!-- Include a data source name (jndiConfigName) from the set of data + sources defined in master-datasources.xml --> + <Name>jdbc/WSO2CarbonDB</Name> + </DataSource> + <!-- If the identity database is created from another place and if it is + required to skip schema initialization during the server start up, set the + following property to "true". --> + <!-- <SkipDBSchemaCreation>false</SkipDBSchemaCreation> --> + </JDBCPersistenceManager> + + <!-- Security configurations --> + <Security> + <UserTrustedRPStore> + <Location>${carbon.home}/repository/resources/security/userRP.jks + </Location> + <!-- Keystore type (JKS/PKCS12 etc.) --> + <Type>JKS</Type> + <!-- Keystore password --> + <Password>wso2carbon</Password> + <!-- Private Key password --> + <KeyPassword>wso2carbon</KeyPassword> + </UserTrustedRPStore> + + <!-- The directory under which all other KeyStore files will be stored --> + <KeyStoresDir>${carbon.home}/conf/keystores</KeyStoresDir> + </Security> + + <Identity> + <IssuerPolicy>SelfAndManaged</IssuerPolicy> + <TokenValidationPolicy>CertValidate</TokenValidationPolicy> + <BlackList></BlackList> + <WhiteList></WhiteList> + <System> + <KeyStore></KeyStore> + <StorePass></StorePass> + </System> + </Identity> + + <OpenID> + <OpenIDServerUrl>https://localhost:9443/openidserver</OpenIDServerUrl> + <OpenIDUserPattern>https://localhost:9443/openid/</OpenIDUserPattern> + <!-- If the users must be prompted for approval --> + <OpenIDSkipUserConsent>false</OpenIDSkipUserConsent> + <!-- Expiry time of the OpenID RememberMe token in minutes --> + <OpenIDRememberMeExpiry>7200</OpenIDRememberMeExpiry> + <!-- Multifactor Authentication configuration --> + <UseMultifactorAuthentication>false</UseMultifactorAuthentication> + <!-- To enable or disable openid dumb mode --> + <DisableOpenIDDumbMode>false</DisableOpenIDDumbMode> + <!-- remember me session timeout in seconds --> + <SessionTimeout>36000</SessionTimeout> + <!-- skips authentication if valid SAML2 Web SSO browser session available --> + <AcceptSAMLSSOLogin>false</AcceptSAMLSSOLogin> + <ClaimsRetrieverImplClass>org.wso2.carbon.identity.provider.openid.claims.DefaultClaimsRetriever</ClaimsRetrieverImplClass> + </OpenID> + + <OAuth> + <RequestTokenUrl>https://localhost:9443/oauth/request-token</RequestTokenUrl> + <AccessTokenUrl>https://localhost:9443/oauth/access-token</AccessTokenUrl> + <AuthorizeUrl>https://localhost:9443/oauth/authorize-url</AuthorizeUrl> + <!-- Default validity period for Authorization Code in seconds --> + <AuthorizationCodeDefaultValidityPeriod>300</AuthorizationCodeDefaultValidityPeriod> + <!-- Default validity period for user access tokens in seconds --> + <AccessTokenDefaultValidityPeriod>3600</AccessTokenDefaultValidityPeriod> + <!-- Default validity period for application access tokens in seconds --> + <UserAccessTokenDefaultValidityPeriod>3600</UserAccessTokenDefaultValidityPeriod> + <!-- Validity period for refresh token --> + <RefreshTokenValidityPeriod>84600</RefreshTokenValidityPeriod> + <!-- Timestamp skew in seconds --> + <TimestampSkew>300</TimestampSkew> + <!-- Enable OAuth caching --> + <EnableOAuthCache>true</EnableOAuthCache> + <!-- Enable renewal of refresh token for refresh_token grant --> + <RenewRefreshTokenForRefreshGrant>true</RenewRefreshTokenForRefreshGrant> + <!-- Process the token before storing it in database, e.g. encrypting --> + <TokenPersistenceProcessor>org.wso2.carbon.identity.oauth.tokenprocessor.PlainTextPersistenceProcessor</TokenPersistenceProcessor> + <!-- Supported Client Autnetication Methods --> + <ClientAuthHandlers> + <ClientAuthHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.clientauth.BasicAuthClientAuthHandler</ClientAuthHandlerImplClass> + </ClientAuthHandlers> + <!-- Supported Response Types --> + <SupportedResponseTypes> + <SupportedResponseType> + <ResponseTypeName>token</ResponseTypeName> + <ResponseTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.authz.handlers.TokenResponseTypeHandler</ResponseTypeHandlerImplClass> + </SupportedResponseType> + <SupportedResponseType> + <ResponseTypeName>code</ResponseTypeName> + <ResponseTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.authz.handlers.CodeResponseTypeHandler</ResponseTypeHandlerImplClass> + </SupportedResponseType> + </SupportedResponseTypes> + <!-- Supported Grant Types --> + <SupportedGrantTypes> + <SupportedGrantType> + <GrantTypeName>authorization_code</GrantTypeName> + <GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.AuthorizationCodeGrantHandler</GrantTypeHandlerImplClass> + </SupportedGrantType> + <SupportedGrantType> + <GrantTypeName>password</GrantTypeName> + <GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.PasswordGrantHandler</GrantTypeHandlerImplClass> + </SupportedGrantType> + <SupportedGrantType> + <GrantTypeName>refresh_token</GrantTypeName> + <GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.RefreshGrantHandler</GrantTypeHandlerImplClass> + </SupportedGrantType> + <SupportedGrantType> + <GrantTypeName>client_credentials</GrantTypeName> + <!--<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.ClientCredentialsGrantHandler</GrantTypeHandlerImplClass>--> + <GrantTypeHandlerImplClass>org.apache.stratos.custom.handlers.granttype.ClientCredentialsGrantHandler</GrantTypeHandlerImplClass> + </SupportedGrantType> + <SupportedGrantType> + <GrantTypeName>urn:ietf:params:oauth:grant-type:saml2-bearer</GrantTypeName> + <GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.saml.SAML2BearerGrantHandler</GrantTypeHandlerImplClass> + </SupportedGrantType> + <SupportedGrantType> + <GrantTypeName>iwa:ntlm</GrantTypeName> + <GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.iwa.ntlm.NTLMAuthenticationGrantHandler</GrantTypeHandlerImplClass> + </SupportedGrantType> + </SupportedGrantTypes> + <OAuthCallbackHandlers> + <OAuthCallbackHandler Class="org.wso2.carbon.identity.oauth.callback.DefaultCallbackHandler" /> + </OAuthCallbackHandlers> + <!--TokenValidators> + <TokenValidator type="bearer" class="org.wso2.carbon.identity.oauth2.validators.DefaultOAuth2TokenValidator"/> + </TokenValidators--> + <!-- Assertions can be used to embedd parameters into access token. --> + <EnableAssertions> + <UserName>false</UserName> + </EnableAssertions> + + <!-- This should be set to true when using multiple user stores and keys + should saved into different tables according to the user store. By default + all the application keys are saved in to the same table. UserName Assertion + should be 'true' to use this. --> + <EnableAccessTokenPartitioning>false</EnableAccessTokenPartitioning> + <!-- user store domain names and mapping to new table name. eg: if you + provide 'A:foo.com', foo.com should be the user store domain name and 'A' + represent the relavant mapping of token store table, i.e. tokens will be + added to a table called IDN_OAUTH2_ACCESS_TOKEN_A. --> + <AccessTokenPartitioningDomains><!-- A:foo.com, B:bar.com --> + </AccessTokenPartitioningDomains> + <AuthorizationContextTokenGeneration> + <Enabled>false</Enabled> + <TokenGeneratorImplClass>org.wso2.carbon.identity.oauth2.authcontext.JWTTokenGenerator</TokenGeneratorImplClass> + <ClaimsRetrieverImplClass>org.wso2.carbon.identity.oauth2.authcontext.DefaultClaimsRetriever</ClaimsRetrieverImplClass> + <ConsumerDialectURI>http://wso2.org/claims</ConsumerDialectURI> + <SignatureAlgorithm>SHA256withRSA</SignatureAlgorithm> + <AuthorizationContextTTL>15</AuthorizationContextTTL> + </AuthorizationContextTokenGeneration> + <SAML2Grant> + <!--SAML2TokenHandler></SAML2TokenHandler--> + </SAML2Grant> + <OpenIDConnect> + <IDTokenBuilder>org.wso2.carbon.identity.openidconnect.DefaultIDTokenBuilder</IDTokenBuilder> + <IDTokenIssuerID>https://localhost:9443/oauth2endpoints/token</IDTokenIssuerID> + <IDTokenSubjectClaim>http://wso2.org/claims/givenname</IDTokenSubjectClaim> + <IDTokenCustomClaimsCallBackHandler>org.wso2.carbon.identity.openidconnect.SAMLAssertionClaimsCallback</IDTokenCustomClaimsCallBackHandler> + <IDTokenExpiration>3600</IDTokenExpiration> + <UserInfoEndpointClaimDialect>http://wso2.org/claims</UserInfoEndpointClaimDialect> + <UserInfoEndpointClaimRetriever>org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoUserStoreClaimRetriever</UserInfoEndpointClaimRetriever> + <UserInfoEndpointRequestValidator>org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInforRequestDefaultValidator</UserInfoEndpointRequestValidator> + <UserInfoEndpointAccessTokenValidator>org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoISAccessTokenValidator</UserInfoEndpointAccessTokenValidator> + <UserInfoEndpointResponseBuilder>org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoJSONResponseBuilder</UserInfoEndpointResponseBuilder> + <SkipUserConsent>false</SkipUserConsent> + </OpenIDConnect> + </OAuth> + + + <MultifactorAuthentication> + <XMPPSettings> + <XMPPConfig> + <XMPPProvider>gtalk</XMPPProvider> + <XMPPServer>talk.google.com</XMPPServer> + <XMPPPort>5222</XMPPPort> + <XMPPExt>gmail.com</XMPPExt> + <XMPPUserName>[email protected]</XMPPUserName> + <XMPPPassword>wso2carbon</XMPPPassword> + </XMPPConfig> + </XMPPSettings> + </MultifactorAuthentication> + + <SSOService> + <EntityId>localhost</EntityId> + <IdentityProviderURL>https://localhost:9443/samlsso</IdentityProviderURL> + <SingleLogoutRetryCount>5</SingleLogoutRetryCount> + <SingleLogoutRetryInterval>60000</SingleLogoutRetryInterval> <!-- in milli seconds --> + <TenantPartitioningEnabled>false</TenantPartitioningEnabled> + <SessionTimeout>36000</SessionTimeout> <!-- remember me session timeout in seconds --> + <!-- skips authentication if valid SAML2 Web SSO browser session available --> + <AttributeStatementBuilder>org.wso2.carbon.identity.sso.saml.attributes.UserAttributeStatementBuilder</AttributeStatementBuilder> + <AttributesClaimDialect>http://wso2.org/claims</AttributesClaimDialect> + <AcceptOpenIDLogin>false</AcceptOpenIDLogin> + <ClaimsRetrieverImplClass>org.wso2.carbon.identity.sso.saml.builders.claims.DefaultClaimsRetriever</ClaimsRetrieverImplClass> + <SAMLSSOEncrypter>org.wso2.carbon.identity.sso.saml.builders.encryption.DefaultSSOEncrypter</SAMLSSOEncrypter> + <SAMLSSOSigner>org.wso2.carbon.identity.sso.saml.builders.signature.DefaultSSOSigner</SAMLSSOSigner> + <SAML2HTTPRedirectSignatureValidator>org.wso2.carbon.identity.sso.saml.validators.SAML2HTTPRedirectDeflateSignatureValidator</SAML2HTTPRedirectSignatureValidator> + <!--SAMLSSOResponseBuilder>org.wso2.carbon.identity.sso.saml.builders.DefaultResponseBuilder</SAMLSSOResponseBuilder--> + + <!-- SAML Token validity period in minutes --> + <SAMLResponseValidityPeriod>5</SAMLResponseValidityPeriod> + <UseAuthenticatedUserDomain>false</UseAuthenticatedUserDomain> + </SSOService> + + <EntitlementSettings> + <!-- Uncomment this to enable on-demand policy loading --> + <!--OnDemandPolicyLoading> <Enable>true</Enable> <MaxInMemoryPolicies>100</MaxInMemoryPolicies> + </OnDemandPolicyLoading --> + <DecisionCaching> + <Enable>true</Enable> + <CachingInterval>36000</CachingInterval> + </DecisionCaching> + <AttributeCaching> + <Enable>true</Enable> + </AttributeCaching> + <ThirftBasedEntitlementConfig> + <EnableThriftService>true</EnableThriftService> + <ReceivePort>${Ports.ThriftEntitlementReceivePort}</ReceivePort> + <ClientTimeout>10000</ClientTimeout> + <KeyStore> + <Location>${carbon.home}/repository/resources/security/wso2carbon.jks</Location> + <Password>wso2carbon</Password> + </KeyStore> + </ThirftBasedEntitlementConfig> + </EntitlementSettings> + <SCIMAuthenticators> + <Authenticator class="org.wso2.carbon.identity.scim.provider.auth.BasicAuthHandler"> + <Property name="Priority">5</Property> + </Authenticator> + <Authenticator class="org.wso2.carbon.identity.scim.provider.auth.OAuthHandler"> + <Property name="Priority">10</Property> + <Property name="AuthorizationServer">local://services</Property> + <!--Property name="AuthorizationServer">https://localhost:9443/services</Property> + <Property name="UserName">admin</Property> + <Property name="Password">admin</Property--> + </Authenticator> + </SCIMAuthenticators> +</Server> http://git-wip-us.apache.org/repos/asf/stratos/blob/4c8ba95d/tools/stratos-installer/templates/jndi.properties ---------------------------------------------------------------------- diff --git a/tools/stratos-installer/templates/jndi.properties b/tools/stratos-installer/templates/jndi.properties new file mode 100644 index 0000000..f9c29c4 --- /dev/null +++ b/tools/stratos-installer/templates/jndi.properties @@ -0,0 +1,33 @@ +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. + +# register some connection factories +# connectionfactory.[jndiname]=[ConnectionURL] + +java.naming.factory.initial=org.wso2.andes.jndi.PropertiesFileInitialContextFactory + +# use the following property to configure the default connector +connectionfactory.topicConnectionfactory=amqp://admin:admin@clientID/carbon?brokerlist='tcp://MB_HOSTNAME:MB_LISTEN_PORT'&reconnect='true' + +# use the following property to specify the JNDI name of the connection factory +connectionfactoryName=connectionfactory,topicConnectionfactory + +# register some topics in JNDI using the form +# topic.[jndiName]=[physicalName] +topic.lb-stats=lb-stats +topic.instance-stats=instance-stats +topic.summarized-health-stats=summarized-health-stats http://git-wip-us.apache.org/repos/asf/stratos/blob/4c8ba95d/tools/stratos-installer/templates/security/application-authentication.xml ---------------------------------------------------------------------- diff --git a/tools/stratos-installer/templates/security/application-authentication.xml b/tools/stratos-installer/templates/security/application-authentication.xml new file mode 100644 index 0000000..695711c --- /dev/null +++ b/tools/stratos-installer/templates/security/application-authentication.xml @@ -0,0 +1,123 @@ +<?xml version="1.0" encoding="ISO-8859-1"?> +<!-- ~ Copyright (c) 2005-2014, WSO2 Inc. (http://www.wso2.org) All Rights + Reserved. ~ ~ WSO2 Inc. licenses this file to you under the Apache License, + ~ Version 2.0 (the "License"); you may not use this file except ~ in compliance + with the License. ~ You may obtain a copy of the License at ~ ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ ~ Unless required by applicable law or agreed to in writing, ~ software + distributed under the License is distributed on an ~ "AS IS" BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY ~ KIND, either express or implied. See the + License for the ~ specific language governing permissions and limitations + ~ under the License. --> + +<ApplicationAuthentication xmlns="http://wso2.org/projects/carbon/application-authentication.xml"> + + <JDBCPersistenceManager> + <DataSource> + <!-- Include a data source name (jndiConfigName) from the set of data + sources defined in master-datasources.xml --> + <!--Name>jdbc/WSO2_IDP_DB</Name--> + <Name>jdbc/WSO2CarbonDB</Name> + </DataSource> + </JDBCPersistenceManager> + + <!-- + ProxyMode allows framework to operate in either 'smart' mode + or 'dumb' mode. + smart = both local and federated authentication is supported + dumb = only federated authentication is supported + --> + <ProxyMode>smart</ProxyMode> + + <!-- + AuthenticationEndpointURL is location of the web app containing + the authentication related pages + --> + <AuthenticationEndpointURL>/authenticationendpoint/login.do</AuthenticationEndpointURL> + + <!-- + Extensions allow extending the default behaviour of the authentication + process. + --> + <Extensions> + <RequestCoordinator>org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator</RequestCoordinator> + <AuthenticationRequestHandler>org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler</AuthenticationRequestHandler> + <LogoutRequestHandler>org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultLogoutRequestHandler</LogoutRequestHandler> + <StepBasedSequenceHandler>org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultStepBasedSequenceHandler</StepBasedSequenceHandler> + <RequestPathBasedSequenceHandler>org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler</RequestPathBasedSequenceHandler> + <StepHandler>org.wso2.carbon.identity.application.authentication.framework.handler.step.impl.DefaultStepHandler</StepHandler> + <HomeRealmDiscoverer>org.wso2.carbon.identity.application.authentication.framework.handler.hrd.impl.DefaultHomeRealmDiscoverer</HomeRealmDiscoverer> + <ClaimHandler>org.wso2.carbon.identity.application.authentication.framework.handler.claims.impl.DefaultClaimHandler</ClaimHandler> + <ProvisioningHandler>org.wso2.carbon.identity.application.authentication.framework.handler.provisioning.impl.DefaultProvisioningHandler</ProvisioningHandler> + </Extensions> + + <!-- + AuthenticatorNameMappings allow specifying an authenticator + against a pre-defined alias (which will be used by other components. + E.g. Application Mgt component). This enables the usage of a custom + authenticator in place of an authenticator that gets packed with the + distribution. + --> + <AuthenticatorNameMappings> + <AuthenticatorNameMapping name="BasicAuthenticator" alias="basic" /> + <AuthenticatorNameMapping name="OAuthRequestPathAuthenticator" alias="oauth-bearer" /> + <AuthenticatorNameMapping name="BasicAuthRequestPathAuthenticator" alias="basic-auth" /> + <AuthenticatorNameMapping name="IWAAuthenticator" alias="iwa" /> + <AuthenticatorNameMapping name="SAMLSSOAuthenticator" alias="samlsso" /> + <AuthenticatorNameMapping name="OpenIDConnectAuthenticator" alias="openidconnect" /> + <AuthenticatorNameMapping name="OpenIDAuthenticator" alias="openid" /> + <AuthenticatorNameMapping name="PassiveSTSAuthenticator" alias="passive-sts" /> + </AuthenticatorNameMappings> + + <!-- + AuthenticatorConfigs allow specifying various configurations needed + by the authenticators by using any number of \'Parameter\' elements + E.g. + <AuthenticatorConfig name="CustomAuthenticator" enabled="true" /> + <Parameter name="paramName1">paramValue</Parameter> + <Parameter name="paramName2">paramValue</Parameter> + </AuthenticatorConfig> + --> + <AuthenticatorConfigs> + <AuthenticatorConfig name="BasicAuthenticator" enabled="true" /> + <AuthenticatorConfig name="OAuthRequestPathAuthenticator" enabled="true" /> + <AuthenticatorConfig name="BasicAuthRequestPathAuthenticator" enabled="true" /> + <AuthenticatorConfig name="SAMLSSOAuthenticator" enabled="true"> + <!--Parameter name="SAMLSSOManager">org.wso2.carbon.identity.application.authenticator.samlsso.manager.DefaultSAMLSSOManager</Parameter--> + </AuthenticatorConfig> + <AuthenticatorConfig name="OpenIDConnectAuthenticator" enabled="true"> + <!--Parameter name="IDTokenHandler">org.wso2.carbon.identity.application.authenticator.oidc.DefaultIDTokenHandler</Parameter--> + <!--Parameter name="ClaimsRetriever">org.wso2.carbon.identity.application.authenticator.oidc.OIDCUserInfoClaimsRetriever</Parameter--> + </AuthenticatorConfig> + <AuthenticatorConfig name="OpenIDAuthenticator" enabled="true"> + <Parameter name="LoginPage">/authenticationendpoint/login.do</Parameter> + <Parameter name="TrustStorePath">/repository/resources/security/client-truststore.jks</Parameter> + <Parameter name="TrustStorePassword">wso2carbon</Parameter> + <!--Parameter name="OpenIDManager">org.wso2.carbon.identity.application.authenticator.openid.manager.DefaultOpenIDManager</Parameter> + <Parameter name="AttributesRequestor">org.wso2.carbon.identity.application.authenticator.openid.manager.SampleAttributesRequestor</Parameter--> + </AuthenticatorConfig> + </AuthenticatorConfigs> + + <!-- + Sequences allow specifying authentication flows for different + registered applications. \'default\' sequence is taken if an + application specific sequence doesn't exist in this file or + in the Application Mgt module. + --> + <Sequences> + <!-- Default Sequence. This is mandatory --> + <Sequence appId="default"> + <Step order="1"> + <Authenticator name="BasicAuthenticator"/> + </Step> + </Sequence> + </Sequences> + + <ServiceProvidersManagement> + <ApplicationDAO>org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl</ApplicationDAO> + <OAuthOIDCClientDAO>org.wso2.carbon.identity.application.mgt.dao.impl.OAuthApplicationDAOImpl</OAuthOIDCClientDAO> + <SAMLClientDAO>org.wso2.carbon.identity.application.mgt.dao.impl.SAMLApplicationDAOImpl</SAMLClientDAO> + <SystemIDPDAO>org.wso2.carbon.identity.application.mgt.dao.impl.IdentityProviderDAOImpl</SystemIDPDAO> + <ClaimDialect>http://wso2.org/claims</ClaimDialect> + </ServiceProvidersManagement> + +</ApplicationAuthentication> http://git-wip-us.apache.org/repos/asf/stratos/blob/4c8ba95d/tools/stratos-installer/templates/wso2mb/jndi.properties ---------------------------------------------------------------------- diff --git a/tools/stratos-installer/templates/wso2mb/jndi.properties b/tools/stratos-installer/templates/wso2mb/jndi.properties new file mode 100755 index 0000000..6da76bf --- /dev/null +++ b/tools/stratos-installer/templates/wso2mb/jndi.properties @@ -0,0 +1,20 @@ +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. + +connectionfactoryName=topicConnectionfactory +connectionfactory.topicConnectionfactory=amqp://admin:admin@clientID/carbon?brokerlist='tcp://MB_HOSTNAME:MB_LISTEN_PORT'&reconnect='true' +java.naming.factory.initial=org.wso2.andes.jndi.PropertiesFileInitialContextFactory
