2.4.2. eXo Platform as SAML2 IDP

Warning

You are looking at documentation for an older release. Not what you want? See the current release documentation.

In JBoss only

  1. Install the SAML2 add-on in the eXo Platform package named $PLATFORM_IDP, as in Step 1 of eXo Platform as SAML2 SP.

  2. Edit the file $PLATFORM_IDP/standalone/configuration/gatein/exo.properties (for Jboss) and $PLATFORM_IDP/gatein/conf/exo.properties (for Tomcat) to have the following SSO configurations (see Configuration overview for details):

    # SSO
    gatein.sso.enabled=false
    gatein.sso.valve.enabled=true
    gatein.sso.valve.class=org.gatein.sso.saml.plugin.valve.PortalIDPWebBrowserSSOValve
    gatein.sso.saml.config.file=${exo.conf.dir}/saml2/picketlink-idp.xml
    gatein.sso.idp.url=http://www.idp.com:8080/portal/dologin
    gatein.sso.idp.listener.enabled=true
    gatein.sso.sp.domains=sp.com
    gatein.sso.sp.host=www.sp.com
    # WARNING: This bundled keystore is only for testing purposes. You should generate and use your own keystore in production!
    gatein.sso.picketlink.keystore=${exo.conf.dir}/saml2/jbid_test_keystore.jks

    In which, gatein.sso.sp.domains is a comma-separated list of domains that will be trusted by this IDP. gatein.sso.sp.host accepts only one value here. If you want more SP applications, you need to manually edit the file $PLATFORM_IDP/standalone/configuration/gatein/saml2/picketlink-idp.xml (for Jboss) and $PLATFORM_IDP/gatein/conf/saml2/picketlink-idp.xml (for Tomcat) and add the ValidatingAlias element for each of them:

    
    <ValidatingAlias Key="${gatein.sso.sp.host}" Value="servercert"/>
    <ValidatingAlias Key="your.host.x" Value="servercert"/>
    <ValidatingAlias Key="your.host.y" Value="servercert"/>

    You also need to install your own keystore as instructed in Generating and using your own keystore.

Copyright ©. All rights reserved. eXo Platform SAS
blog comments powered byDisqus