Author: prabath Date: Fri Apr 4 01:03:05 2008 New Revision: 15547 Log:
documentation changes for the release 1.5 Added: trunk/solutions/identity/modules/documentation/src/site/xdoc/op_administratorguide.xml Modified: trunk/solutions/identity/modules/documentation/src/site/site.xml trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_administratorguide.xml trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_production.xml Modified: trunk/solutions/identity/modules/documentation/src/site/site.xml ============================================================================== --- trunk/solutions/identity/modules/documentation/src/site/site.xml (original) +++ trunk/solutions/identity/modules/documentation/src/site/site.xml Fri Apr 4 01:03:05 2008 @@ -1,59 +1,60 @@ -<?xml version="1.0" encoding="ISO-8859-1"?> -<project name="WSO2 Identity Solution"> - <!-- TODO deal with banners--> - <!--<bannerLeft> - <name>Apache Axis2</name> - <src>http://www.apache.org/images/asf_logo_wide.png</src> - <href>http://ws.apache.org/axis2/</href> - </bannerLeft> - <bannerRight> - <src>http://ws.apache.org/axis2/images/axis.jpg</src> - </bannerRight>--> - <body> - <links> - <item name="Apache Rampart/Java" href="http://ws.apache.org/rampart" /> - <item name="WSO2 WSAS" href="http://www.wso2.org/projects/wsas/java" /> - <item name="Apache WS" href="http://ws.apache.org" /> - <item name="Apache" href="http://www.apache.org" /> - </links> - - <menu name="WSO2 Identity Solution"> - <item name="Content" href="index_docs.html"/> - <item name="Home" href="index.html"/> - </menu> - <menu name="Downloads"> - <item name="Releases" - href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@"/> - </menu> - <menu name="Documentation" href="index_docs.html"> - <item name="Adminstrator Guide" href="idp_administratorguide.html"/> - <item name="Installation Guide" href="installation_guide.html"/> - <item name="Identity Provider in Production Environment" href="idp_production.html"/> - <item name="mod_cspace Configuration Guide" href="mod_cspace_config.html"/> - <item name="Relying Party Developer Guide" href="rp_developer_guide.html"/> - <item name="Idp User Guide" href="idp_userguide.html"/> - </menu> - - <menu name="Samples"> - <item name="Identity Provider" href="idp_sample.html"/> - <item name="PHP Relying Party" href="php.html"/> - <item name="Java Relying Party" href="rp_sample.html"/> - <item name="Access Control" href="ac_sample.html"/> - </menu> - - <menu name="API Documentation"> - <item name="Java Docs" href="apidocs/index.html"/> - </menu> - - <menu name="Get Involved" href="overview.html"> - <item name="Mailing Lists" href="mail-lists.html"/> - </menu> - <menu name="Project Information"> - <item name="Project Team" href="team-list.html"/> - <item name="Issue Tracking" href="issue-tracking.html"/> - <item name="License" - href="http://www.apache.org/licenses/LICENSE-2.0.html"/> - </menu> - - </body> -</project> +<?xml version="1.0" encoding="ISO-8859-1"?> +<project name="WSO2 Identity Solution"> + <!-- TODO deal with banners--> + <!--<bannerLeft> + <name>Apache Axis2</name> + <src>http://www.apache.org/images/asf_logo_wide.png</src> + <href>http://ws.apache.org/axis2/</href> + </bannerLeft> + <bannerRight> + <src>http://ws.apache.org/axis2/images/axis.jpg</src> + </bannerRight>--> + <body> + <links> + <item name="Apache Rampart/Java" href="http://ws.apache.org/rampart" /> + <item name="WSO2 WSAS" href="http://www.wso2.org/projects/wsas/java" /> + <item name="Apache WS" href="http://ws.apache.org" /> + <item name="Apache" href="http://www.apache.org" /> + </links> + + <menu name="WSO2 Identity Solution"> + <item name="Content" href="index_docs.html"/> + <item name="Home" href="index.html"/> + </menu> + <menu name="Downloads"> + <item name="Releases" + href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@"/> + </menu> + <menu name="Documentation" href="index_docs.html"> + <item name="Idnetity Provider Adminstrator Guide" href="idp_administratorguide.html"/> + <item name="OpenID Provider Adminstrator Guide" href="op_administratorguide.html"/> + <item name="Installation Guide" href="installation_guide.html"/> + <item name="Idetity Solution in Production Environment" href="idp_production.html"/> + <item name="mod_cspace Configuration Guide" href="mod_cspace_config.html"/> + <item name="Relying Party Developer Guide" href="rp_developer_guide.html"/> + <item name="Idp User Guide" href="idp_userguide.html"/> + </menu> + + <menu name="Samples"> + <item name="Identity Provider" href="idp_sample.html"/> + <item name="PHP Relying Party" href="php.html"/> + <item name="Java Relying Party" href="rp_sample.html"/> + <item name="Access Control" href="ac_sample.html"/> + </menu> + + <menu name="API Documentation"> + <item name="Java Docs" href="apidocs/index.html"/> + </menu> + + <menu name="Get Involved" href="overview.html"> + <item name="Mailing Lists" href="mail-lists.html"/> + </menu> + <menu name="Project Information"> + <item name="Project Team" href="team-list.html"/> + <item name="Issue Tracking" href="issue-tracking.html"/> + <item name="License" + href="http://www.apache.org/licenses/LICENSE-2.0.html"/> + </menu> + + </body> +</project> Modified: trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_administratorguide.xml ============================================================================== --- trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_administratorguide.xml (original) +++ trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_administratorguide.xml Fri Apr 4 01:03:05 2008 @@ -1,151 +1,156 @@ -<!-- - ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com) - ~ - ~ Licensed under the Apache License, Version 2.0 (the "License"); - ~ you may not use this file except in compliance with the License. - ~ You may obtain a copy of the License at - ~ - ~ http://www.apache.org/licenses/LICENSE-2.0 - ~ - ~ Unless required by applicable law or agreed to in writing, software - ~ distributed under the License is distributed on an "AS IS" BASIS, - ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - ~ See the License for the specific language governing permissions and - ~ limitations under the License. - --> - -<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" - "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> -<html xmlns="http://www.w3.org/1999/xhtml"> -<body> -<p>[<a -href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@">Download</a>] -| [<a href="index_docs.html">Documentation Index</a>] | [<a -href="release-notes.html">Release Note</a>]</p> - -<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@-Administrator's Guide</h1> - -<p>This document provides information and instructions on the functionality -of the Management Console of WSO2 Identity Solution .</p> - -<p>Your feedback on WSO2 Identity Solution is most appreciated. Please send them to our <a -href="index.html#mail">mailing lists</a>.</p> - -<h2>Content</h2> - -<div class="toc"> -<ul> - <li><a href="#start">Loging to Admin Console</a></li> - <li><a href="#configure">Intial Configuration</a></li> - <ul> - <li><a href="#userstore">User Stores</a></li> - <li><a href="#claims">Defining Claims</a></li> - <li><a href="#claim_mapping">Mapping Claims</a></li> - </ul> - <li><a href="#manage">Manage IdP</a></li> - <ul> - <li><a href="#users">Manage Users</a></li> - <li><a href="#relying_parties">Trusted Relying Parties</a></li> - <li><a href="#issued_cards">Issued Cards</a></li> - </ul> - <li><a href="#stats">Statics</a></li> -</ul> -</div> - -<h2 id="start">Loging to Admin Console</h2> -<p>Download and install Identity Provider as in -<a href="installation_guide.html">here</a>.</p> -<br/> - -<p>Point your browser to https://host:port/admin. If you haven't changed -the default settings then you should be able to login to -https://localhost:12443/admin/ using username "admin" and passowrd "admin".</p> - -<h2 id="configure">Configure Identity Provider</h2> -<h3><a name="userstore"></a>User Stores</h3> -<p>WSO2 Identity Solution can access users from existing user stores. Identity Provider will -issue Managed Cards and Tokens for the users in configured user store. You can have several user -stores but only one can be active at a time. User store can be an LDAP or JDBC.</p> -<br/> -<strong>LDAP - org.wso2.usermanager.custom.ldap.LDAPRealm</strong> -<table> - <tr><td>Parameter Name</td><td>Description</td></tr> - <tr><td>ConnectionUrl</td><td>LDAP connection url - e.g. ldap://localhost:389</td></tr> - <tr><td>ConnectionName</td><td>LDAP connection username. This must be a root user who can read attribute IDs</td></tr> - <tr><td>ConnectionPass</td><td>LDAP connection password.</td></tr> - <tr><td>UserPattern</td><td>User search pattern must be given - e.g. uid={0},ou=People,dc=wso2,dc=com </td></tr> - <tr><td>UserContextName</td><td>Name of the context, where user objects are stored</td></tr> - <tr><td>AttributeIds</td><td>User Attribute IDs that will be read by the IdP. - Column names must be comma seperated - e.g. email_address, telephone. These attributes - will be included in the issued SAML tokens. </td></tr> -</table> - -<strong>JDBC - org.wso2.usermanager.custom.jdbc.JDBCRealm</strong> -<table> - <tr><td>Parameter Name</td><td>Description</td></tr> - <tr><td>DriverName</td><td>JDBC Driver's class name. It must be present in the classpath - e.g. org.apache.derby.jdbc.EmbeddedDriver</td></tr> - <tr><td>ConnectionURL</td><td>Connection URL to the database - e.g. jdbc:derby:home/identity/database/SAMPLE_DB</td></tr> - <tr><td>ConnectionUserName</td><td>Connection username to the database</td></tr> - <tr><td>ConnectionPassword</td><td>Connection password of the username</td></tr> - <tr><td>UserTable</td><td>User table name in the database.</td></tr> - <tr><td>UserNameColumn</td><td>User name column in the User table</td></tr> - <tr><td>UserCredentialColumn</td><td>User credential column in the User table</td></tr> - <tr><td>ColumnNames</td><td>Column names of the user table from where the user properties will be read. - Column names must be comma seperated - e.g. email_address, telephone. These attributes - will be included in the issued SAML tokens. - </td></tr> -</table> - -<h3><a name="claims"></a>Defining Claims</h3> - -<p>The standard set of claims of the http://schemas.xmlsoap.org/ws/2005/05/identity -dialect and another set of sample claims are available in this view. Use -the "add new dialect" option and "add new claim" option to add diatects and -claims. -</p> - -<p>Click the "switch" icon in the claim detail section of each claim to enable/disable -a claim.</p> - -<h3><a name="claim_mapping"></a>Mapping Claims</h3> - -<p>This view allows mapping a claim to a user attribute in the user store. The -available attibute identifiers will be shown in the claim edit view, when the -display name of a claim is selected.</p> - -<h2 id="manage">Manage Identity Provider</h2> - -<h3><a name="users"></a>Manage Users</h3> - -<p>The user management currectly allows the administrator to view the -list of users who can use the identity provider.</p> - -<h3><a name="relying_parties"></a>Trusted Relying Parties</h3> - -<p>Administrator can specify a list of relying parties trusted globally by the -identity provider. To add a new relying party to this list, click on the -"Add new trusted relying party" link and provide the certificate of the -relying party. This certificate must be in DER format (When you export a -cerificate using java keytool the certificate will be in DER format). -The "Common Name" (CN) of this certificate will be used to identify -the host name of the trusted relying party.</p> - -<h3><a name="issued_cards"></a>Issued Cards</h3> - -<p>Administator can view issued and revoked information cards using this view. -A card can be revoked using the "Revoke Card" option.</p> - -<h2 id="stats">Statistics</h2> -<p>Statistics provides information on user behavior, card downloads and token issuance. These are the reports that it generates.</p> -<ul> -<li>View All users</li> -<li>User Behavior Report</li> -<li>Failed Card Issuences</li> -<li>Failed Token Issuences</li> -<li>Tokens by User - Clicking on details will give you a descriptive view of the summery</li> -<li>Tokens by Card - Clicking on details will give you a descriptive view of the summery</li> -<li>Tokens by User and Card - Clicking on details will give you a descriptive view of the summery</li> -<li>Info Cards by User - Clicking on details will give you a descriptive view of the summery</li> -</ul> -</body> -</html> +<!-- + ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com) + ~ + ~ Licensed under the Apache License, Version 2.0 (the "License"); + ~ you may not use this file except in compliance with the License. + ~ You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> + +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" + "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml"> +<body> +<p>[<a +href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@">Download</a>] +| [<a href="index_docs.html">Documentation Index</a>] | [<a +href="release-notes.html">Release Note</a>]</p> + +<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@-Identity Provider Administrator's Guide</h1> + +<p>This document provides information and instructions on the functionality +of the Management Console of WSO2 Identity Solution .</p> + +<p>Your feedback on WSO2 Identity Solution is most appreciated. Please send them to our <a +href="index.html#mail">mailing lists</a>.</p> + +<h2>Content</h2> + +<div class="toc"> +<ul> + <li><a href="#start">Loging to Admin Console</a></li> + <li><a href="#configure">Intial Configuration</a></li> + <ul> + <li><a href="#userstore">User Stores</a></li> + <li><a href="#claims">Defining Claims</a></li> + <li><a href="#claim_mapping">Mapping Claims</a></li> + </ul> + <li><a href="#manage">Manage IdP</a></li> + <ul> + <li><a href="#users">Manage Users</a></li> + <li><a href="#relying_parties">Trusted Relying Parties</a></li> + <li><a href="#issued_cards">Issued Cards</a></li> + </ul> + <li><a href="#stats">Statics</a></li> +</ul> +</div> + +<h2 id="start">Loging to Admin Console</h2> +<p>Download and install Identity Provider as in +<a href="installation_guide.html">here</a>.</p> +<br/> + +<p>Point your browser to https://host:port/admin. If you haven't changed +the default settings then you should be able to login to +https://localhost:12443/admin/ using username "admin" and passowrd "admin".</p> + +<h2 id="configure">Configure Identity Provider</h2> +<h3><a name="userstore"></a>User Stores</h3> +<p>WSO2 Identity Solution can access users from existing user stores. Identity Provider will +issue Managed Cards and Tokens for the users in configured user store. You can have several user +stores but only one can be active at a time. User store can be an LDAP or JDBC.</p> +<br/> +<strong>LDAP - org.wso2.usermanager.custom.ldap.LDAPRealm</strong> +<table> + <tr><td>Parameter Name</td><td>Description</td></tr> + <tr><td>ConnectionUrl</td><td>LDAP connection url - e.g. ldap://localhost:389</td></tr> + <tr><td>ConnectionName</td><td>LDAP connection username. This must be a root user who can read attribute IDs</td></tr> + <tr><td>ConnectionPass</td><td>LDAP connection password.</td></tr> + <tr><td>UserPattern</td><td>User search pattern must be given - e.g. uid={0},ou=People,dc=wso2,dc=com </td></tr> + <tr><td>UserContextName</td><td>Name of the context, where user objects are stored</td></tr> + <tr><td>AttributeIds</td><td>User Attribute IDs that will be read by the IdP. + Column names must be comma seperated - e.g. email_address, telephone. These attributes + will be included in the issued SAML tokens. </td></tr> +</table> + +<strong>JDBC - org.wso2.usermanager.custom.jdbc.JDBCRealm</strong> +<table> + <tr><td>Parameter Name</td><td>Description</td></tr> + <tr><td>DriverName</td><td>JDBC Driver's class name. It must be present in the classpath - e.g. org.apache.derby.jdbc.EmbeddedDriver</td></tr> + <tr><td>ConnectionURL</td><td>Connection URL to the database - e.g. jdbc:derby:home/identity/database/SAMPLE_DB</td></tr> + <tr><td>ConnectionUserName</td><td>Connection username to the database</td></tr> + <tr><td>ConnectionPassword</td><td>Connection password of the username</td></tr> + <tr><td>UserTable</td><td>User table name in the database.</td></tr> + <tr><td>UserNameColumn</td><td>User name column in the User table</td></tr> + <tr><td>UserCredentialColumn</td><td>User credential column in the User table</td></tr> + <tr><td>ColumnNames</td><td>Column names of the user table from where the user properties will be read. + Column names must be comma seperated - e.g. email_address, telephone. These attributes + will be included in the issued SAML tokens. + </td></tr> +</table> + +<h3><a name="claims"></a>Defining Claims</h3> + +<p>The standard set of claims of the http://schemas.xmlsoap.org/ws/2005/05/identity +dialect and another set of sample claims are available in this view. Use +the "add new dialect" option and "add new claim" option to add diatects and +claims. +</p> + +<p>Click the "switch" icon in the claim detail section of each claim to enable/disable +a claim.</p> + +<br/> + +<p>A detailed guide on defining claims realted to OpenID is available <a href="op_administratorguide.xml">here</a>.</p> + +<h3><a name="claim_mapping"></a>Mapping Claims</h3> + +<p>This view allows mapping a claim to a user attribute in the user store. The +available attibute identifiers will be shown in the claim edit view, when the +display name of a claim is selected.</p> + +<h2 id="manage">Manage Identity Provider</h2> + +<h3><a name="users"></a>Manage Users</h3> + +<p>The user management currectly allows the administrator to view the +list of users who can use the identity provider.</p> + +<h3><a name="relying_parties"></a>Trusted Relying Parties</h3> + +<p>Administrator can specify a list of relying parties trusted globally by the +identity provider. To add a new relying party to this list, click on the +"Add new trusted relying party" link and provide the certificate of the +relying party. This certificate must be in DER format (When you export a +cerificate using java keytool the certificate will be in DER format). +The "Common Name" (CN) of this certificate will be used to identify +the host name of the trusted relying party.</p> + +<h3><a name="issued_cards"></a>Issued Cards</h3> + +<p>Administator can view issued and revoked information cards using this view. +A card can be revoked using the "Revoke Card" option.</p> + +<h2 id="stats">Statistics</h2> +<p>Statistics provides information on user behavior, card downloads and token issuance. These are the reports that it generates.</p> +<ul> +<li>View All users</li> +<li>User Behavior Report</li> +<li>Failed Card Issuences</li> +<li>Failed Token Issuences</li> +<li>Tokens by User - Clicking on details will give you a descriptive view of the summary</li> +<li>Tokens by Card - Clicking on details will give you a descriptive view of the summary</li> +<li>Tokens by User and Card - Clicking on details will give you a descriptive view of the summary</li> +<li>Info Cards by User - Clicking on details will give you a descriptive view of the summary</li> +<li>OpenIDs by User</li> +</ul> +</body> +</html> Modified: trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_production.xml ============================================================================== --- trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_production.xml (original) +++ trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_production.xml Fri Apr 4 01:03:05 2008 @@ -1,135 +1,145 @@ -<!-- - ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com) - ~ - ~ Licensed under the Apache License, Version 2.0 (the "License"); - ~ you may not use this file except in compliance with the License. - ~ You may obtain a copy of the License at - ~ - ~ http://www.apache.org/licenses/LICENSE-2.0 - ~ - ~ Unless required by applicable law or agreed to in writing, software - ~ distributed under the License is distributed on an "AS IS" BASIS, - ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - ~ See the License for the specific language governing permissions and - ~ limitations under the License. - --> -<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" - "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> -<html xmlns="http://www.w3.org/1999/xhtml"> -<body> -<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@ : Deploying Identity Provider in Production</h1> - -<p>The identity provider by default comes configured with a simple sample and -can be used in the localhost to try all the samples. There are a set of -configuration changes that one has to follow in deploying the Identity Provider -application in production.</p> -<p>These changes should be applied on a fresh identity provider instance. (i.e. -Do not start the identity provider until the configurations are finalized)</p> - - -<h2>Step 1: Edit server configuration file</h2> - -<p>Open [EMAIL PROTECTED]@/conf/server.xml file</p> - -<p> This private key is used for the HTTPS channel and for the token issuer to -sign the issued tokens. This information has to be changed in two files. -</p> - -<p>Following section of the server.xml should be updated to match your privete key -information. The private key must be available in a keystore of type -"JKS" or "PKCS12". For more information on keystores please see -<a href="http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/keytool.html">here -</a>.</p> -<pre><![CDATA[ - - <!-- - Security configurations - --> - <Security> - <!-- - KeyStore which will be used for encrypting/decrypting passwords - and other sensitive information. - --> - <KeyStore> - <!-- Keystore file location--> - <Location>${wso2wsas.home}/conf/wso2is.jks</Location> - <!-- Keystore type (JKS/PKCS12 etc.)--> - <Type>JKS</Type> - <!-- Keystore password--> - <Password>wso2is</Password> - <!-- Private Key alias--> - <KeyAlias>localhost</KeyAlias> - <!-- Private Key password--> - <KeyPassword>wso2is</KeyPassword> - </KeyStore> - - -]]></pre> - -<p>Also note that the host name of the Identity Provider must be changed to match -the "Common Name" of the certificate of the private key.</p> - -<pre><![CDATA[ - - <!-- - Host name of the machine hosting this server - e.g. www.wso2.org - --> - - <HostName>www.foo.com</HostName> - - -]]></pre> - -<p>The HTTP and HTTPS port also can be changed by chnaging the following -configuration elements.</p> - -<pre><![CDATA[ - - <Ports> - <HTTP>12080</HTTP> - <HTTPS>12443</HTTPS> - </Ports> - -]]></pre> - -<h2>Step 2 : [EMAIL PROTECTED]@/conf/axis2.xml file</h2> - -<p>The "transportReceiver" configurations of axis2.xml will have to be updated -to match the keystore and ports setting changes.</p> - - -<pre><![CDATA[ - - <transportReceiver name="http" - class="org.wso2.wsas.transport.http.HttpTransportListener"> - <parameter name="port">12080</parameter> - </transportReceiver> - - <transportReceiver name="https" - class="org.wso2.wsas.transport.http.HttpsTransportListener"> - <parameter name="port">12443</parameter> - <parameter name="sslProtocol">TLS</parameter> - <parameter name="maxHttpHeaderSize">8192</parameter> - <parameter name="maxThreads">150</parameter> - <parameter name="minSpareThreads">25</parameter> - <parameter name="maxSpareThreads">75</parameter> - <parameter name="enableLookups">false</parameter> - <parameter name="disableUploadTimeout">false</parameter> - <parameter name="clientAuth">false</parameter> - <parameter name="acceptCount">100</parameter> - <parameter name="keystore"> - <wso2wsas:KeyStore xmlns:wso2wsas="http://www.wso2.org/products/wsas"> - <!-- Keystore file location--> - <wso2wsas:Location>conf/wso2is.jks</wso2wsas:Location> - <!-- Keystore type (JKS/PKCS12 etc.)--> - <wso2wsas:Type>JKS</wso2wsas:Type> - <!-- Keystore password--> - <wso2wsas:Password>wso2is</wso2wsas:Password> - </wso2wsas:KeyStore> - </parameter> - </transportReceiver> -]]></pre> - -</body> +<!-- + ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com) + ~ + ~ Licensed under the Apache License, Version 2.0 (the "License"); + ~ you may not use this file except in compliance with the License. + ~ You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" + "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml"> +<body> +<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@ : Deploying Identity Provider in Production</h1> + +<p>The identity provider by default comes configured with a simple sample and +can be used in the localhost to try all the samples. There are a set of +configuration changes that one has to follow in deploying the Identity Provider +application in production.</p> +<p>These changes should be applied on a fresh identity provider instance. (i.e. +Do not start the identity provider until the configurations are finalized)</p> + + +<h2>Step 1: Edit server configuration file</h2> + +<p>Open [EMAIL PROTECTED]@/conf/server.xml file</p> + +<p> This private key is used for the HTTPS channel and for the token issuer to +sign the issued tokens. This information has to be changed in two files. +</p> + +<p>Following section of the server.xml should be updated to match your privete key +information. The private key must be available in a keystore of type +"JKS" or "PKCS12". For more information on keystores please see +<a href="http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/keytool.html">here +</a>.</p> +<pre><![CDATA[ + + <!-- + Security configurations + --> + <Security> + <!-- + KeyStore which will be used for encrypting/decrypting passwords + and other sensitive information. + --> + <KeyStore> + <!-- Keystore file location--> + <Location>${wso2wsas.home}/conf/wso2is.jks</Location> + <!-- Keystore type (JKS/PKCS12 etc.)--> + <Type>JKS</Type> + <!-- Keystore password--> + <Password>wso2is</Password> + <!-- Private Key alias--> + <KeyAlias>localhost</KeyAlias> + <!-- Private Key password--> + <KeyPassword>wso2is</KeyPassword> + </KeyStore> + + +]]></pre> + +<p>Also note that the host name of the Identity Provider must be changed to match +the "Common Name" of the certificate of the private key.</p> + +<pre><![CDATA[ + + <!-- + Host name of the machine hosting this server + e.g. www.wso2.org + --> + + <HostName>www.foo.com</HostName> + + +]]></pre> + +<p>The HTTP and HTTPS port also can be changed by chnaging the following +configuration elements.</p> + +<pre><![CDATA[ + + <Ports> + <HTTP>12080</HTTP> + <HTTPS>12443</HTTPS> + </Ports> + +]]></pre> + +<p>OpenID provider server url can be changed by changing the following +configuration element.Once this is set, OpenIDs will be generated in the +following format [OpenIDServerUrl]/user/[User Name].</p> +<p>e.g: http://localhost:12080/user/bob</p> +<pre><![CDATA[ + + <OpenIDServerUrl>http://localhost:12080</OpenIDServerUrl> + +]]></pre> + +<h2>Step 2 : [EMAIL PROTECTED]@/conf/axis2.xml file</h2> + +<p>The "transportReceiver" configurations of axis2.xml will have to be updated +to match the keystore and ports setting changes.</p> + + +<pre><![CDATA[ + + <transportReceiver name="http" + class="org.wso2.wsas.transport.http.HttpTransportListener"> + <parameter name="port">12080</parameter> + </transportReceiver> + + <transportReceiver name="https" + class="org.wso2.wsas.transport.http.HttpsTransportListener"> + <parameter name="port">12443</parameter> + <parameter name="sslProtocol">TLS</parameter> + <parameter name="maxHttpHeaderSize">8192</parameter> + <parameter name="maxThreads">150</parameter> + <parameter name="minSpareThreads">25</parameter> + <parameter name="maxSpareThreads">75</parameter> + <parameter name="enableLookups">false</parameter> + <parameter name="disableUploadTimeout">false</parameter> + <parameter name="clientAuth">false</parameter> + <parameter name="acceptCount">100</parameter> + <parameter name="keystore"> + <wso2wsas:KeyStore xmlns:wso2wsas="http://www.wso2.org/products/wsas"> + <!-- Keystore file location--> + <wso2wsas:Location>conf/wso2is.jks</wso2wsas:Location> + <!-- Keystore type (JKS/PKCS12 etc.)--> + <wso2wsas:Type>JKS</wso2wsas:Type> + <!-- Keystore password--> + <wso2wsas:Password>wso2is</wso2wsas:Password> + </wso2wsas:KeyStore> + </parameter> + </transportReceiver> +]]></pre> + +</body> </html> \ No newline at end of file Added: trunk/solutions/identity/modules/documentation/src/site/xdoc/op_administratorguide.xml ============================================================================== --- (empty file) +++ trunk/solutions/identity/modules/documentation/src/site/xdoc/op_administratorguide.xml Fri Apr 4 01:03:05 2008 @@ -0,0 +1,136 @@ +<!-- + ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com) + ~ + ~ Licensed under the Apache License, Version 2.0 (the "License"); + ~ you may not use this file except in compliance with the License. + ~ You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> + +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" + "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml"> +<body> +<p>[<a +href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@">Download</a>] +| [<a href="index_docs.html">Documentation Index</a>] | [<a +href="release-notes.html">Release Note</a>]</p> + +<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@-OpenID Provider Administrator's Guide</h1> + +<p>This document provides information and instructions on the functionality +of the Management Console of WSO2 Identity Solution related to OpenID Provider.</p> + +<p>Your feedback on WSO2 Identity Solution is most appreciated. Please send them to our <a +href="index.html#mail">mailing lists</a>.</p> + +<h2>Content</h2> + +<div class="toc"> +<ul> + <li><a href="#start">Configuring WSO2 Identity Provider</a></li> + <li><a href="#configure">Initial OpenID Provider Configurations</a></li> + <ul> + <li><a href="#enableOpenID">Enable OpenID Registration</a></li> + <li><a href="#claims">Defining Claims</a></li> + <li><a href="#claim_mapping">Mapping Claims</a></li> + </ul> +</ul> +</div> + +<h2 id="start">Configuring WSO2 Identity Provider</h2> +<p>Please configure WSO2 Identity Provider as in +<a href="idp_administratorguide.html">here</a>.</p> +<br/> + +<p>Point your browser to https://host:port/admin. If you haven't changed +the default settings then you should be able to login to +https://localhost:12443/admin/ using username "admin" and passowrd "admin".</p> + +<h2 id="configure">Initial OpenID Provider Configurations</h2> + +<p>WSO2 OpenID Provider supports following OpenID related specifications</p> + +<ul> +<li>OpenID Simple Registration Extension 1.1</li> +<li>OpenID Attribute Exchange 1.0</li> +<li>OpenID Provider Authentication Policy Extension 1.0, draft 1</li> +<li>OpenID Information Cards 1.0 - Draft 01</li> +</ul> + +<p>Please refer <a href="idp_production.html">this</a> for configuring WSO2 OpenID Provider in a production environment</p> + + +<h3><a name="enableOpenID"></a>Enable OpenID Registration</h3> +<p>By default OpenID registration is enabled in WSO2 Identity Solution. To change the setting, switch off the "Enable OpenID Registration" +check box under "User Management" [Manage --> Users]. +</p> + +<h3><a name="claims"></a>Defining Claims</h3> + +<p>By default claims related to OpenID are defined under two dialects.</p> + +<ul> +<li>OpenID Simple Registration 1.1: http://schema.openid.net/2007/05/claims</li> +<li>OpenID Attribute Exchange 1.0: http://axschema.org</li> +</ul> + +<p>Click the "switch" icon in the claim detail section of each claim to enable/disable +a claim.</p> +<br/> +<p>The same claim is identified by different namespaces under different contexts. For example,email address is identified by +<b>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress</b> for Information Cards and for OpenID Simple Registration by +<b>http://schema.openid.net/2007/05/claims/email</b> and <b>http://axschema.org/contact/email</b> is used by OpenID Attribute Exchange. +Even under OpenID Attribute Exchange, there can be different namespaces - another widely used one is <b>http://schema.openid.net/contact/email</b>. +</p> +<br/> +<p> +If you want to suppport all of these. simply we have +to enable all these claiims as supported claims - but this will give a bad user experince since he has to enter his email 4 time at the time of registration. +To avoid this we use an internal claim mapper - which can map one namespace under one context to another namespace under a different context, using an XML configuration +file [EMAIL PROTECTED]@/conf/openid-claim-mapper.xml file].</p> + +<br/> +<p>To add a new claim as an OpenID claim, make sure you set a non-empty value for the OpenID Tag field. You can't set the same OpenID Tag for two supported claims +at the same time</p> + +<br/> +<p>With default installation WSO2 OpenID Provider supports following claims under OpenID Attribute Exchange 1.0 and all are mapped to the respective +OpenID Simple Registration claims</p> + +<ul> +<li>http://schema.openid.net/namePerson/friendly</li> +<li>http://schema.openid.net/contact/email</li> +<li>http://schema.openid.net/namePerson</li> +<li>http://schema.openid.net/birthDate</li> +<li>http://schema.openid.net/person/gender</li> +<li>http://schema.openid.net/contact/postalCode/home</li> +<li>http://schema.openid.net/contact/country/home</li> +<li>http://schema.openid.net/pref/language</li> +<li>http://schema.openid.net/pref/timezone</li> +<li>http://axschema.org/namePerson/friendly</li> +<li>http://axschema.org/contact/email</li> +<li>http://axschema.org/namePerson</li> +<li>http://axschema.org/birthDate</li> +<li>http://axschema.org/person/gender</li> +<li>http://axschema.org/contact/postalCode/home</li> +<li>http://axschema.org/contact/country/home</li> +<li>http://axschema.org/pref/language</li> +<li>http://axschema.org/pref/timezone</li> +</ul> + +<h3><a name="claim_mapping"></a>Mapping Claims</h3> + +<p>This view allows mapping a claim to a user attribute in the user store. The +available attibute identifiers will be shown in the claim edit view, when the +display name of a claim is selected.</p> + +</body> +</html> _______________________________________________ Identity-dev mailing list [email protected] http://wso2.org/cgi-bin/mailman/listinfo/identity-dev
