Changes between Version 44 and Version 45 of idpiam2018
- Timestamp:
- Sep 14, 2018, 6:01:44 AM (6 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
idpiam2018
v44 v45 517 517 }}} 518 518 519 This will add additional security to your database engine. For the tutorial purposes we will use '''Iam@2018''' as passwords. Remember the capital '''I'''. 519 520 520 521 {{{ … … 539 540 Please set the password for root here. 540 541 541 New password: 542 543 Re-enter new password: 542 New password:Iam@2018 543 544 Re-enter new password:Iam@2018 544 545 545 546 Estimated strength of the password: 50 … … 583 584 All done! 584 585 }}} 585 * log in to your MySQL Server with `mysql -u root -p` and continue. Make sure to replace `##ROOT-DB-PASSWORD##`, `##USERNAME##`, `##PASSWORD##` with your own586 * log in to your MySQL Server with `mysql -u root -p` and continue.For your production servers, Make sure to replace passwords `Iam@2018`. When creating passwords you should consider your password policy selected above. 586 587 {{{#!mysql 587 588 SET NAMES 'utf8'; … … 591 592 CREATE DATABASE IF NOT EXISTS shibboleth CHARACTER SET=utf8; 592 593 593 GRANT ALL PRIVILEGES ON shibboleth.* TO root@localhost IDENTIFIED BY ' ##ROOT-DB-PASSWORD##';594 GRANT ALL PRIVILEGES ON shibboleth.* TO ##USERNAME##@localhost IDENTIFIED BY '##PASSWORD##';594 GRANT ALL PRIVILEGES ON shibboleth.* TO root@localhost IDENTIFIED BY 'Iam@2018'; 595 GRANT ALL PRIVILEGES ON shibboleth.* TO shibbo@localhost IDENTIFIED BY 'Iam@2018'; 595 596 596 597 FLUSH PRIVILEGES; … … 627 628 26. Enable the generation of the `persistent-id` : 628 629 629 * Copy the output of the following for the next step.630 * First you need to generate a password salt. Keep a copy of the output of following as your '''idp.persistentId.salt''' 630 631 {{{ 631 632 openssl rand -base64 36 632 633 }}} 633 634 634 * 635 * Edit the following file and modify the lines containing below variables. 635 636 {{{ 636 637 vim /opt/shibboleth-idp/conf/saml-nameid.properties 637 638 }}} 638 (the //sourceAttribute// MUST BE anattribute, or a list of comma-separated attributes, that uniquely identify the subject of the generated `persistent-id`. It MUST BE: '''Stable''', '''Permanent''' and '''Not-reassignable''')639 (the //sourceAttribute// used in the configuration MUST BE an ldap attribute, or a list of comma-separated attributes, that uniquely identify the subject of the generated `persistent-id`. It MUST BE: '''Stable''', '''Permanent''' and '''Not-reassignable''') 639 640 640 641 {{{ 641 642 idp.persistentId.sourceAttribute = uid 642 643 ... 643 idp.persistentId.salt = ### result of 'openssl rand -base64 36'###644 idp.persistentId.salt = Replace_these_with_your_salt_generated_earlier 644 645 ... 645 646 idp.persistentId.generator = shibboleth.StoredPersistentIdGenerator … … 674 675 p:driverClassName="com.mysql.jdbc.Driver" 675 676 p:url="jdbc:mysql://localhost:3306/shibboleth?autoReconnect=true" 676 p:username=" ##USER_DB_NAME##"677 p:password=" ##PASSWORD##"677 p:username="shibbo" 678 p:password="Iam@2018" 678 679 p:maxActive="10" 679 680 p:maxIdle="5" … … 701 702 </bean> 702 703 }}} 703 (and modify the "'''USER_DB_NAME'''" and "'''PASSWORD'''" for your "'''shibboleth'''" DB)704 > You may need to change the '''password''' for your "'''shibboleth'''" DB in production servers) 704 705 705 706 * Modify the IdP configuration file: … … 729 730 vim /opt/shibboleth-idp/conf/ldap.properties 730 731 }}} 731 * Solution 1: LDAP + STARTTLS: 732 * Solution 1: LDAP + STARTTLS: (We recommend continuing with this option) 732 733 733 734 {{{ … … 777 778 </resolver:DataConnector> 778 779 }}} 779 '''UTILITY FOR OPENLDAP ADMINISTRATOR:''' 780 `ldapsearch -H ldap:// -x -b "dc=instXY,dc=ac,dc=lk" -LLL dn` 780 * utility to ldap searching: `ldapsearch -H ldap:// -x -b "dc=instXY,dc=ac,dc=lk" -LLL dn` 781 781 * the baseDN ==> `ou=people, dc=instXY,dc=ac,dc=lk` (branch containing the registered users) 782 782 * the bindDN ==> `cn=admin,dc=instXY,dc=ac,dc=lk` (distinguished name for the user that can made queries on the LDAP) … … 808 808 <value>%{idp.home}/conf/attribute-resolver-v1-LEARN.xml</value> 809 809 }}} 810 * Configure the LDAP Data Connector to be compliant to the values put on `ldap.properties`. (See above suggestions)811 810 812 811 * Restart Tomcat8: `service tomcat8 restart` 812 813 813 31. Enable the SAML2 support by changing the `idp-metadata.xml` and disabling the SAML v1.x deprecated support: 814 814 *