Deployment Example: Single Sign-On, Load Balancing and Failover Using Sun OpenSSO Enterprise 8.0

ProcedureTo Configure OpenSSO Enterprise Properties for the J2EE Policy Agent 1 Sample Application

  1. Access https://osso-1.example.com:1081/opensso/console from a web browser.

  2. Log in to the OpenSSO Enterprise console as the administrator.

    Username

    amadmin

    Password

    ossoadmin

  3. Under the Access Control tab, click / (Top Level Realm).

  4. Click the Agents tab.

  5. Click the J2EE tab.

    j2eeagent-1 is displayed under the Agent table.

  6. Click j2eeagent-1.

    The j2eeagent-1 properties page is displayed.

  7. Click the Application tab.

    The Application properties page is displayed.

  8. Provide the following information.

    Login Form URI:

    Enter the following and click Add.

    /agentsample/authentication/login.html

    Not Enforced URI Processing:

    Enter each of the following and click Add.

    /agentsample/public/*

    /agentsample/images/*

    /agentsample/styles/*

    /agentsample/index.html

    /agentsample

    Resource Access Denied URI:

    Enter each of the following and click Add.

    Map Key: agentsample

    Corresponding Map Value: /agentsample/authentication/accessdenied.html

  9. Click Save.

    The j2eeagent-1 properties page is displayed.

  10. Map the attributes from the OpenSSO Enterprise embedded data store to those used by the Application Server with the following sub procedure.

    1. From the j2eeagent-1 properties page, click Back to Main Page.

    2. Click the Subjects tab.

    3. Click the Group tab.

    4. Click Employee-Group in the list of Groups.

    5. Copy and save id=Employee-Group,ou=group,dc=opensso,dc=java,dc=net, the value of the Universal ID attribute.

    6. Click Back to Subjects.

      You are returned to the Group tab.

    7. Click Manager-Group in the list of Groups.

    8. Copy and save id=Manager-Group,ou=group,dc=opensso,dc=java,dc=net, the value of the Universal ID attribute.

    9. Click Back to Subjects.

    10. Click the Agents tab.

    11. Click the J2EE tab.

      j2eeagent-1 is displayed under the Agent table.

    12. Click j2eeagent-1.

      The j2eeagent-1 properties page is displayed.

    13. Click the Application tab.

      The Application properties page is displayed.

    14. Provide the identifiers previously saved as the manager and employee map keys and corresponding map values for Privileged Attribute Mapping and click Save.


      Map Key: [id=Manager-Group,ou=group,dc=opensso,dc=java,dc=net]
      Corresponding Map Value: am_manager_role
      

      Map Key: [id=Employee-Group,ou=group,dc=opensso,dc=java,dc=net]
      Corresponding Map Value: am_employee_role
      
  11. Log out of the OpenSSO Enterprise console.