N.s.Karthik wrote:
Hi
Thx for the Conversation
but still i am not convinced
How Do I achieve SSO + LDAP for the setup as define below,
I absolutely do not have any Idea, I am confused with lot's URL's
Apache 2.2x (httpd-ssl) Tomcat DB
why SSL between Apache2 and tomcat ? is it
Hi
Thx for Quick reply
Single-Sign-On Valve, which will alllow a user to
login once to the first application running on Tomcat, and then the login
will be valid if
he calls other applications on the same Tomcat, and for these other
applications running
on the same Tomcat he will not have to
We have 2 Apps on tomcat with each having independent DB
the credentials in both apps are in synch with the list of authorized users
as per LDAP.
What does that mean? Where is the source of the credentials? When a
user changes a password, where do they change it? You say in synch,
so do the
Hey Cris
So you want to configure the login process to work once per day, e.g.
the users are prompted once per day for either app, but once prompted,
they won't be prompted again for either app for the rest of the day.
Presumably if the login is without a prompt, then this requirement
disappears,
Is this possible, Is there any material available for me
The links already provided cover all that you request
I have read some where that Apache HTTPD ( ) can do this SSO process,
then the same could be at Httpd instead of Tomcat end .
If so yes plz let me know the process.
I have
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/29/13 6:53 PM, André Warnier wrote:
I believe that you both are close to the correct understanding, but
that it helps to clearly distinguish the various parts of the
process, and be very clear about the terminology (which
Hi
Thx for the Conversation
but still i am not convinced
How Do I achieve SSO + LDAP for the setup as define below,
I absolutely do not have any Idea, I am confused with lot's URL's
Apache 2.2x (httpd-ssl) Tomcat DB
Traffic expected on system is 300+ using IE, FFOX, Safari ,
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/28/13 12:32 PM, André Warnier wrote:
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications are browser
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/29/13 4:19 AM, André Warnier wrote:
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256
André,
On 1/28/13 12:32 PM, André Warnier wrote:
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Does that mean that Tomcat treats WIA similar to HTTP BASIC (or maybe
DIGEST) unless you've approved a particular domain/host? That's
interesting. Can you just enter anything you'd like? For instance, can
I authenticate to a server that is expecting WIA from a Linux
workstation just by
chris derham wrote:
Does that mean that Tomcat treats WIA similar to HTTP BASIC (or maybe
DIGEST) unless you've approved a particular domain/host? That's
interesting. Can you just enter anything you'd like? For instance, can
I authenticate to a server that is expecting WIA from a Linux
N.s.Karthik wrote:
Hi
Spec : JDK1.6,
Tomcat 7.0.30,
Linux 64 bit Suse
So far we have been using 3 killer Ajax web based applications
with each app provided with separate DB schema.
The Requirement is to provide a SSO Single Sign On Logic with existing
On 28/01/2013 09:06, André Warnier wrote:
N.s.Karthik wrote:
Hi
Spec : JDK1.6, Tomcat 7.0.30, Linux 64
bit Suse
So far we have been using 3 killer Ajax web based applications with
each app provided with separate DB schema.
The Requirement is to provide a
Hi
Thx for the Quick reply
1) All 3 applications are browser compatible and users may use other then
IE
hence IE alone can be ruled out
What about the other (2 3) options
with regards
karthik
--
View this message in context:
1) All 3 applications are browser compatible and users may use other then
IE
hence IE alone can be ruled out
Do you mean multiple browsers access these web applications, so we
can't use anything that is IE specific? Assuming that you do, I don't
believe that anybody suggested anything that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications are browser compatible and users may use
other then IE hence IE alone can be ruled out
Do you mean multiple browsers access these web applications, so
we can't use
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications are browser compatible and users may use
other then IE hence IE alone can be ruled out
Do you mean multiple browsers access these web
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/28/13 12:32 PM, André Warnier wrote:
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications are browser compatible and users may
use
On 1/28/2013 1:07 PM, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/28/13 12:32 PM, André Warnier wrote:
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
David,
On 1/28/13 1:18 PM, David kerber wrote:
On 1/28/2013 1:07 PM, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256
André,
On 1/28/13 12:32 PM, André Warnier wrote:
Christopher Schultz wrote:
-BEGIN PGP
Do you need a plug-in or anything like that? Does it need to be
specifically enabled?
No, we use it all the time with IE, Firefox, and I believe Chrome
as well.
Last time I was working in this area a few years ago, it worked by
default in IE and had to be turned on in FF. A rogue website
Hi
Spec : JDK1.6,
Tomcat 7.0.30,
Linux 64 bit Suse
So far we have been using 3 killer Ajax web based applications
with each app provided with separate DB schema.
The Requirement is to provide a SSO Single Sign On Logic with existing
LDAP Server.
The AAA has
22 matches
Mail list logo