Difference between revisions of "WISE-PaaS/Single Sign-On(SSO)"
Dylan.chang (talk | contribs) |
Dylan.chang (talk | contribs) |
||
Line 1: | Line 1: | ||
− | <font color="#000000">WISE-PaaS/OpenID is part of Advantech WISE-PaaS cloud solution and & | + | <p><font color="#000000">WISE-PaaS/OpenID is part of Advantech WISE-PaaS cloud solution and  </font>plays an important role in the interoperability of Internet identity<font color="#000000">.</font> It provides a central login mechanism. |
− | + | </p><p><font color="#000000">WISE-PaaS/OpenID Connect utilizes Keycloak which is an open source identity and access management for modern applications and services.</font> | |
− | <font color="#000000">WISE-PaaS/OpenID Connect utilizes Keycloak which is& | + | </p><p> |
− | + | </p> | |
− | + | <h2> Features Overview </h2> | |
− | + | <p>Single-Sign On : Login once to multiple applications | |
− | + | </p><p>Standard Protocols : OpenID Connect, OAuth 2.0 and SAML 2.0 | |
− | + | </p><p>Centralized Management : For admins and users | |
− | Single-Sign On& | + | </p><p>Adapters : Secure applications and services easily |
− | + | </p><p>High Performance : Lightweight, fast and scalable | |
− | Standard Protocols& | + | </p><p>Clustering : For scalability and availability |
− | + | </p><p>Themes : Customize look and feel | |
− | Centralized Management& | + | </p><p>Extensible : Customize through code |
− | + | </p><p>Password Policies : Customize password policies | |
− | Adapters& | + | </p><p> |
− | + | </p> | |
− | High Performance& | + | <h2> Implementation </h2> |
− | + | <h3> Apply a manager account for OpenID Central Server </h3> | |
− | Clustering& | + | <p><i>Please sen a request to <a href="WISE-Paas%2FOpenID%20Connect%20service%20manager">WISE-Paas/OpenID Connect service manager</a> by E-mail. And provide the following information</i> |
− | + | </p> | |
− | Themes& | + | <ul><li>Service name : [<i>RMM</i>] as your realm. |
− | + | </li> | |
− | Extensible& | + | <li>Client name : [<i>RMMClient</i>] a client definition for a app to login in. |
− | + | </li> | |
− | Password Policies& | + | <li>User registration : [<i>True/False</i>] Enable/Disable user registeration. |
− | + | </li> | |
− | + | <li>Administrator account : [<i>RMMAdmin</i>] Use this account to manage this realm. The default password is same as account name. Change password after first login. | |
− | + | </li></ul><h3> Setting your service on OpenID server </h3> | |
− | + | <p>Open the <a href="https://openidserver.redirectme.net:8443/auth/admin/" alt="https://openidserver.redirectme.net:8443/auth/admin/" title="https://openidserver.redirectme.net:8443/auth/admin/">https://openidserver.redirectme.net:8443/auth/admin/</a> and login with applied administrator account to config your realm before implement your client app. | |
− | + | </p> | |
− | + | <ul><li>(Essential) Public key : OpenID server generate a unique key for client app identification. Copy the public key to json setting file include in the client app . | |
− | + | </li> | |
− | + | <li>(Essential) Valid Redirect URIs & Web Origins : Provide valid uri pattern for your client app. OpenID server would redirect to your client page while a successful login or logout. Your client page must be publicly accessible. | |
− | + | </li> | |
− | + | <li>(Optional) User registration :  | |
− | + | </li></ul><h3> Implement client codes </h3> | |
− | + | <p><i>....</i> | |
− | + | </p> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
<h2> Sample code </h2> | <h2> Sample code </h2> | ||
<p>OpenID.json | <p>OpenID.json | ||
− | <pre class="fck_mw_syntaxhighlight"> | + | <pre class="fck_mw_syntaxhighlight"><syntaxhighlight lang="C">int JSON_Validator(const char *json);</syntaxhighlight></pre> |
</p> | </p> |
Revision as of 06:18, 10 January 2017
WISE-PaaS/OpenID is part of Advantech WISE-PaaS cloud solution and plays an important role in the interoperability of Internet identity. It provides a central login mechanism.
WISE-PaaS/OpenID Connect utilizes Keycloak which is an open source identity and access management for modern applications and services.
Contents
Features Overview
Single-Sign On : Login once to multiple applications
Standard Protocols : OpenID Connect, OAuth 2.0 and SAML 2.0
Centralized Management : For admins and users
Adapters : Secure applications and services easily
High Performance : Lightweight, fast and scalable
Clustering : For scalability and availability
Themes : Customize look and feel
Extensible : Customize through code
Password Policies : Customize password policies
Implementation
Apply a manager account for OpenID Central Server
Please sen a request to <a href="WISE-Paas%2FOpenID%20Connect%20service%20manager">WISE-Paas/OpenID Connect service manager</a> by E-mail. And provide the following information
- Service name : [RMM] as your realm.
- Client name : [RMMClient] a client definition for a app to login in.
- User registration : [True/False] Enable/Disable user registeration.
- Administrator account : [RMMAdmin] Use this account to manage this realm. The default password is same as account name. Change password after first login.
Setting your service on OpenID server
Open the <a href="https://openidserver.redirectme.net:8443/auth/admin/" alt="https://openidserver.redirectme.net:8443/auth/admin/" title="https://openidserver.redirectme.net:8443/auth/admin/">https://openidserver.redirectme.net:8443/auth/admin/</a> and login with applied administrator account to config your realm before implement your client app.
- (Essential) Public key : OpenID server generate a unique key for client app identification. Copy the public key to json setting file include in the client app .
- (Essential) Valid Redirect URIs & Web Origins : Provide valid uri pattern for your client app. OpenID server would redirect to your client page while a successful login or logout. Your client page must be publicly accessible.
- (Optional) User registration :
Implement client codes
....
Sample code
OpenID.json
<syntaxhighlight lang="C">int JSON_Validator(const char *json);</syntaxhighlight>