diff --git a/Gazelle-STS/installation.md b/Gazelle-STS/installation.md index f59159a869de5d7c423e268389e44279ade3ca48..146edebc60839250c35a3920a46e81fb58d49fb1 100755 --- a/Gazelle-STS/installation.md +++ b/Gazelle-STS/installation.md @@ -73,12 +73,19 @@ _Port could also be different whether you have modified the JBoss configuration. ## Configuration -By default, the project is configured for working in **gazelle.ihe.net** environment. The keystore used to sign assertions must be located at `/opt/sts/keystore.jks`, the privateKeyEntry must have the alias `tomcat`, and the certificate validator webservice must be reachable at [https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator](https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator). - -This configuration can be overridden. Download the config archive from our Nexus repository [gazelle-sts releases](https://gazelle.ihe.net/nexus/index.html#nexus-search;quick~gazelle-sts-service) (search for **gazelle-sts-service-X.X.X-config.zip**). Then unzip the archive, copy the file picketlink-sts.xml under `/opt/sts/` and edit its content. -As well, the zip archive contains 2 property files named 'ihe.assertion.properties' and 'sequoia.assertion.properties' containing properties related to assertions such as namespaces, roles, organization, etc. - -Note: The property `X509CERTIFICATE` of the `KeyProvider` must stay equals to the `SigningKeyAlias` property, otherwise the public key declared as issuer will be inconsistant with the private key used to sign the assertion. +By default, the project is configured for working in **gazelle.ihe.net** environment. The keystore used to sign assertions must be located at +`/opt/sts/keystore.jks`, the privateKeyEntry must have the alias `tomcat`, and the certificate validator webservice must be reachable at +[https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator](https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator). + +This configuration can be overridden. Download the config archive from our Nexus repository +[gazelle-sts releases](https://gazelle.ihe.net/nexus/index.html#nexus-search;quick~gazelle-sts-service) (search for **gazelle-sts-service-X.X.X-config.zip**). +Then unzip the archive, copy the file picketlink-sts.xml under `/opt/sts/` and edit its content. +As well, the zip archive contains 2 property files named 'ihe.assertion.properties' and 'sequoia.assertion.properties' containing properties related +to assertions such as namespaces, roles, organization, etc. These properties files shall also be copied in `/opt/sts/`. The content may also be edited +to adjust values for defined properties. + +Note: The property `X509CERTIFICATE` of the `KeyProvider` must stay equals to the `SigningKeyAlias` property, otherwise the public key declared as +issuer will be inconsistant with the private key used to sign the assertion. ## Sequoia configurations Some special configurations have defined in the source code for the Sequoia project.