3.5.2. eXo Platform as SAML2 IDP

In JBoss only

  1. Install the SAML2 add-on in the eXo Platform package named $PLATFORM_IDP, as in Step 1 of eXo Platform as SAML2 SP.

  2. Edit the $PLATFORM_IDP/standalone/configuration/gatein/exo.properties file to have the following SSO configurations (see Configuration overview for details):

    # SSO
    gatein.sso.enabled=false
    gatein.sso.valve.enabled=true
    gatein.sso.valve.class=org.gatein.sso.saml.plugin.valve.PortalIDPWebBrowserSSOValve
    gatein.sso.saml.config.file=/WEB-INF/conf/sso/saml/picketlink-idp.xml
    gatein.sso.idp.url=http://www.idp.com:8080/portal/dologin
    gatein.sso.idp.listener.enabled=true
    gatein.sso.sp.domains=sp.com
    gatein.sso.sp.host=www.sp.com
    # WARNING: This bundled keystore is only for testing purposes. You should generate and use your own keystore in production!
    gatein.sso.picketlink.keystore=/sso/saml/jbid_test_keystore.jks

    In which, gatein.sso.sp.domains is a comma-separated list of domains that will be trusted by this IDP. gatein.sso.sp.host accepts only one value here. If you want more SP applications, you need to manually edit the /WEB-INF/conf/sso/saml/picketlink-idp.xml file (inside standalone/deployments/platform.ear/exo.portal.web.portal.war) and add the ValidatingAlias element for each of them:

    
    <ValidatingAlias Key="${gatein.sso.sp.host}" Value="servercert"/>
    <ValidatingAlias Key="your.host.x" Value="servercert"/>
    <ValidatingAlias Key="your.host.y" Value="servercert"/>

    You also need to install your own keystore as instructed in Generating and using your own keystore.

Copyright ©. All rights reserved. eXo Platform SAS
blog comments powered byDisqus