Mentions légales du service

Skip to content
Snippets Groups Projects
Commit c1502773 authored by Wylem Bars's avatar Wylem Bars
Browse files

Add clarification to properties

parent d163329e
No related branches found
No related tags found
No related merge requests found
......@@ -73,12 +73,19 @@ _Port could also be different whether you have modified the JBoss configuration.
## Configuration
By default, the project is configured for working in **gazelle.ihe.net** environment. The keystore used to sign assertions must be located at `/opt/sts/keystore.jks`, the privateKeyEntry must have the alias `tomcat`, and the certificate validator webservice must be reachable at [https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator](https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator).
This configuration can be overridden. Download the config archive from our Nexus repository [gazelle-sts releases](https://gazelle.ihe.net/nexus/index.html#nexus-search;quick~gazelle-sts-service) (search for **gazelle-sts-service-X.X.X-config.zip**). Then unzip the archive, copy the file picketlink-sts.xml under `/opt/sts/` and edit its content.
As well, the zip archive contains 2 property files named 'ihe.assertion.properties' and 'sequoia.assertion.properties' containing properties related to assertions such as namespaces, roles, organization, etc.
Note: The property `X509CERTIFICATE` of the `KeyProvider` must stay equals to the `SigningKeyAlias` property, otherwise the public key declared as issuer will be inconsistant with the private key used to sign the assertion.
By default, the project is configured for working in **gazelle.ihe.net** environment. The keystore used to sign assertions must be located at
`/opt/sts/keystore.jks`, the privateKeyEntry must have the alias `tomcat`, and the certificate validator webservice must be reachable at
[https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator](https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator).
This configuration can be overridden. Download the config archive from our Nexus repository
[gazelle-sts releases](https://gazelle.ihe.net/nexus/index.html#nexus-search;quick~gazelle-sts-service) (search for **gazelle-sts-service-X.X.X-config.zip**).
Then unzip the archive, copy the file picketlink-sts.xml under `/opt/sts/` and edit its content.
As well, the zip archive contains 2 property files named 'ihe.assertion.properties' and 'sequoia.assertion.properties' containing properties related
to assertions such as namespaces, roles, organization, etc. These properties files shall also be copied in `/opt/sts/`. The content may also be edited
to adjust values for defined properties.
Note: The property `X509CERTIFICATE` of the `KeyProvider` must stay equals to the `SigningKeyAlias` property, otherwise the public key declared as
issuer will be inconsistant with the private key used to sign the assertion.
## Sequoia configurations
Some special configurations have defined in the source code for the Sequoia project.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment