Author: ruchith
Date: Sun Dec  9 18:58:02 2007
New Revision: 10740

Log:

Updated documentation

Modified:
   trunk/solutions/identity/modules/documentation/src/site/xdoc/ac_sample.xml
   trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_sample.xml

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/ac_sample.xml
==============================================================================
--- trunk/solutions/identity/modules/documentation/src/site/xdoc/ac_sample.xml  
(original)
+++ trunk/solutions/identity/modules/documentation/src/site/xdoc/ac_sample.xml  
Sun Dec  9 18:58:02 2007
@@ -12,43 +12,81 @@
 <p>The Identity Provider of WSO2 Identty Solution is based on 
 <a href="http://wso2.org/projects/wsas/java";>WSO2 Web Services Application 
 Server (WSAS)</a>. The WSAS instance used by the Identity Provider can be 
-accessed using the <a href="../wsas">wsas</a> context.</p>
+accessed using the "wsas" context.</p>
 
-<p>First log into  <a href="../wsas">WSAS</a> management console (default admin
- user name is "admin" and password is "admin") and create a user account with 
-the role "user".
+<p>https://localhost:12443/wsas</p>
 
+<p>First log into WSAS management console (default admin
+user name is "admin" and password is "admin") and create a user account with 
+the role "user".
 
+Now use the "Security" option in WSAS to create a user ("alice") with the role
+"user".
 
  </p>
 
 
 <h3>Step 2 : Change user store</h3>
  <p>
- Now log into the <a  href="../admin">Identity Provider management console 
</a> 
+ Now log into the "Identity Provider management console" 
  (default admin user name is "admin" and password is "admin") and set 
  "wsasRealmForAccessControlSample" user store configuration as the default user
- store.
+ store in "User Stores" configuration.
  </p>
  
 <h3>Step 3 : Define claims</h3>
 
+<p>
+Now since we changed the user store the enabled claims and claim mappings will 
+have to be set.
+</p>
+
+<p>Enable "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname";
+claim.</p>
+<p>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier
+claim is enabled by default.</p>
+
+<p>Now in the "WSO2 Claims" add a new claim with following details :</p>
+
+<ul>
+<li>Claim URI : http://identity.wso2.org/claims/roles</li>
+<li>Display Tag : Roles</li>
+<li>Description : WSAS user roles</li>
+</ul>
+
+<p>Enable "http://identity.wso2.org/claims/roles"; claim</p>
 
 <h3>Step 4 : Map claims</h3>
 
+<p>Use the "Claim Mappings" configuration to map claims to user properties as 
+listed below : </p>
+
+<ul>
+<li>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname : 
username</li>
+<li>http://identity.wso2.org/claims/roles : roles</li>
+</ul>
+
+
 <h3>Step 5 : Login to the user application and obtain a card</h3>
 
+<p>Log into the "Identity Provider" with the user credentials created in "Step 
1"
+, download an information card and install it in your identity selector. 
+</p>
+
 <h3>Step 6 : Try the access control application</h3>
 <p>
-Point the browser to the sample access control demo relying party available 
-<a href="../ac/">here</a>.
-
+Point the browser to the sample access control demo relying party available in 
+the "ac" context of the identity provider container.
+</p>
+<p>https://localhost:12443/ac/</p>
+.
+<p>
 Use the information card "alice" obtained earlier to log into this application.
-The web app will display the following output :</p>
+The web app will display that the user is not an admin user.</p>
 
-<p>Now add "admin" role to "alice" using <a href="../wsas">WSAS management 
-console</a></p> and log into the application again. Now since "alice" has the 
-"admin" role the application will recognize "alice" as an admin user.
+<p>Now add "admin" role to "alice" using "WSAS management 
+console" and log into the application again. Now since "alice" has the 
+"admin" role the application will recognize "alice" as an admin user.</p>
 
 </body>
 </html>
\ No newline at end of file

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_sample.xml
==============================================================================
--- trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_sample.xml 
(original)
+++ trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_sample.xml 
Sun Dec  9 18:58:02 2007
@@ -23,9 +23,36 @@
 
 <h2>Sample Identity Provider</h2>
 
+<h3>Set up</h3>
+
+<p><strong>IMPORTANT:</strong> Set sampleRealm as the default user store 
+using "Set as default" option in the "User Stores" configuration.</p>
+
+<p>
+Now since we changed the user store the enabled claims and claim mappings will 
+have to be set.
+</p>
+
+<p>Enable following claims : </p>
+<ul>
+<li>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname</li>
+<li>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname</li>
+<li>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress</li>
+</ul>
+<p>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier
+claim is enabled by default.</p>
+
+<p>Use the "Claim Mappings" configuration to map claims to user properties as 
+listed below : </p>
+
+<ul>
+<li>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname : 
FIRSTNAME</li>
+<li>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname : 
LASTNAME</li>
+<li>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress : 
EMAIL</li>
+</ul>
 <p>WSO2 Identity Solution has a in-build sample Identity Provider (IdP), which 
has the full functionality</p>
 
-Sample IdP is configured to,
+<P>Now, the identity provider is configured to,</P>
 <ul>
   <li>Trust users with following username and passwords</li>
        <table>

_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev

Reply via email to