Documentation Home
> Deployment Example: Single Sign-On, Load Balancing and Failover Using Sun OpenSSO Enterprise 8.0
Deployment Example: Single Sign-On, Load Balancing and Failover Using Sun OpenSSO Enterprise 8.0
Book Information
Preface
Part I About This Deployment
Chapter 1 Components and Features
1.1 Deployment Architecture and Components
1.2 Key Features of Deployment
1.3 Sequential Component Interactions
Chapter 2 Technical Overview
2.1 Host Machines
2.2 Software
2.3 Main Service URLs
2.4 Intercomponent Communication
2.5 Firewall Rules
2.6 Viewing Replicated Entries
Chapter 3 Before You Begin
3.1 Technical Reference
3.2 Setting Up the Load Balancers
3.3 Obtaining Secure Socket Layer Certificates
3.4 Resolving Host Names
3.5 Known Issues and Limitations
Part II Building the Environment
Chapter 4 Installing Sun Java System Directory Server and Creating Instances for Sun OpenSSO Enterprise User Data
4.1 Installing and Configuring Directory Server 1 and Directory Server 2
To Download the Directory Server Bits and Required Patches to the Directory Server Host Machines
To Patch the Directory Server Host Machines
To Install Directory Server 1
To Create an OpenSSO Enterprise User Data Instance on Directory Server 1
To Create a Base Suffix for the User Data Instance on Directory Server 1
To Install Directory Server 2
To Create an OpenSSO Enterprise User Data Instance on Directory Server 2
To Create a Base Suffix for the User Data Instance on Directory Server 2
4.2 Enabling Multi-Master Replication of the User Data Instances
To Enable Multi-Master Replication for User Data Instance on Directory Server 1
To Enable Multi-Master Replication for User Data Instance on Directory Server 2
To Change the Default Replication Manager Password for Each User Data Instance
To Create Replication Agreements for Each User Data Instance
To Initialize the Replication Agreements
To Verify Successful User Data Replication
4.3 Enabling Secure Communication for the Directory Server User Data Instances
To Install a Root Certificate and a Server Certificate on Directory Server 1
To Install a Root Certificate and a Server Certificate on Directory Server 2
4.4 Configuring Load Balancer 1 for the User Data Instances
To Request a Certificate for the User Data Load Balancer
To Import the Root Certificate to the User Data Load Balancer
To Install the Server Certificate to the User Data Load Balancer
To Configure the User Data Load Balancer 1
To Create an SSL Proxy for SSL Termination at the User Data Load Balancer 1
4.5 Importing Test Users
To Import Test User Data into the Replicated Directory Server Instances
Chapter 5 Deploying and Configuring OpenSSO Enterprise
5.1 Installing the Application Server Web Containers
To Create a Non-Root User on the OpenSSO Enterprise 1 Host Machine
To Install Application Server on the OpenSSO Enterprise 1 Host Machine
To Create a Non-Root User on the OpenSSO Enterprise 2 Host Machine
To Install Application Server on the OpenSSO Enterprise 2 Host Machine
5.2 Configuring Load Balancer 2 for OpenSSO Enterprise
To Request a Certificate for the OpenSSO Enterprise Load Balancer
To Install a CA Root Certificate to the OpenSSO Enterprise Load Balancer
To Install the Server Certificate to the OpenSSO Enterprise Load Balancer
To Configure the OpenSSO Enterprise Load Balancer
To Create an SSL Proxy for SSL Termination at the OpenSSO Enterprise Load Balancer
5.3 Deploying and Configuring OpenSSO Enterprise 1 and OpenSSO Enterprise 2
To Generate an OpenSSO Enterprise WAR on the OpenSSO Enterprise 1 Host Machine
To Deploy the OpenSSO Enterprise WAR as OpenSSO Enterprise 1
To Copy the OpenSSO Enterprise WAR to the OpenSSO Enterprise 2 Host Machine
To Deploy the OpenSSO Enterprise WAR File as OpenSSO Enterprise 2
To Configure OpenSSO Enterprise 1
To Configure OpenSSO Enterprise 2
5.4 Configuring the OpenSSO Enterprise Platform Service
To Create a Site on OpenSSO Enterprise 1
To Verify that the OpenSSO Enterprise Site was Configured Properly
Chapter 6 Configuring OpenSSO Enterprise Realms for User Authentication
6.1 Modifying the Top-Level Realm for Test Users
To Modify the Top-Level Realm for User Authentication
To Verify that a User Can Successfully Authenticate
6.2 Creating and Configuring a Sub Realm for Test Users
To Create a Sub Realm
To Change the User Profile Configuration for the Sub Realm
To Modify the Sub Realm for User Authentication
To Verify That the Sub Realm Can Access the External User Data Store
To Verify That the Sub Realm Subjects Can Successfully Authenticate
Chapter 7 Installing and Configuring the Distributed Authentication User Interface
7.1 Installing the Distributed Authentication User Interface Web Containers
To Create a Non-Root User on the Distributed Authentication User Interface 1 Host Machine
To Install the Web Server for Distributed Authentication User Interface 1
To Create a Non-Root User on the Distributed Authentication User Interface 2 Host Machine
To Install Sun Java System Web Server for Distributed Authentication User Interface 2
7.2 Enabling Secure Communications Between the Web Server Instances and the Load Balancer
To Request and Install a Server Certificate and a Root Certificate for Web Server 1
To Create an SSL Enabled HTTP Listener Port on Web Server 1
To Request and Install a Server Certificate and a Root Certificate for Web Server 2
To Create an SSL Enabled HTTP Listener Port on Web Server 2
To Import the Root Certificate to the Web Server 1 JDK Certificate Store
To Import the Root Certificate to the Web Server 2 JDK Certificate Store
7.3 Configuring the Distributed Authentication User Interface Load Balancer
To Request a Certificate for the Distributed Authentication User Interface Load Balancer
To Import a Root Certificate to the Distributed Authentication User Interface Load Balancer
To Import a Certificate to the Distributed Authentication User Interface Load Balancer
To Configure the Distributed Authentication User Interface Load Balancer
To Configure a Proxy for SSL Termination at the Distributed Authentication User Interface Load Balancer
7.4 Creating an Agent Profile with Custom User for the Distributed Authentication User Interface
To Create an Agent Profile with Custom User for the Distributed Authentication User Interface
To Verify that authuiadmin Was Created in Directory Server
7.5 Generating and Deploying the Distributed Authentication User Interface WAR
To Generate the Distributed Authentication User Interface WAR
To Deploy the Generated WAR as Distributed Authentication User Interface 1
To Configure Distributed Authentication User Interface 1
To Deploy the Generated WAR as Distributed Authentication User Interface 2
To Configure Distributed Authentication User Interface 2
To Configure Load Balancer Cookies for the Distributed Authentication User Interface
To Verify That Authentication Using the Distributed Authentication User Interface Load Balancer is Successful
Chapter 8 Configuring the Protected Resource Host Machines
8.1 Configuring the Protected Resource Host Machines with a J2EE Policy Agent
8.1.1 Installing and Configuring the J2EE Container and J2EE Policy Agent on Protected Resource 1
To Install BEA WebLogic Server as J2EE Container 1 on Protected Resource 1
To Configure BEA WebLogic Server as J2EE Container 1 on Protected Resource 1
To Import the Certificate Authority Root Certificate into Application Server 1
To Install the J2EE Policy Agent 1 on Application Server 1
To Deploy the J2EE Policy Agent 1 Application
To Start the J2EE Policy Agent 1 Application
To Set Up the J2EE Policy Agent 1 Authentication Provider
To Deploy the J2EE Policy Agent 1 Sample Application
To Modify the J2EE Policy Agent 1 Configuration
8.1.2 Installing and Configuring the J2EE Container and J2EE Policy Agent on Protected Resource 2
To Install BEA WebLogic Server as J2EE Container 2 on Protected Resource 2
To Configure BEA WebLogic Server as J2EE Container 2 on Protected Resource 2
To Import the Certificate Authority Root Certificate into Application Server 2
To Install the J2EE Policy Agent 2 on Application Server 2
To Deploy the J2EE Policy Agent 2 Application
To Start the J2EE Policy Agent 2 Application
To Set Up the J2EE Policy Agent 2 Authentication Provider
To Deploy the J2EE Policy Agent 2 Sample Application
To Modify the J2EE Policy Agent 2 Configuration
8.1.3 Creating Groups Using the OpenSSO Enterprise Console
To Create Manager and Employee Groups with OpenSSO Enterprise
8.1.4 Setting Up a Test for the J2EE Policy Agent 1
To Create a Test Policy in the OpenSSO Enterprise Root Realm
To Configure OpenSSO Enterprise Properties for the J2EE Policy Agent 1 Sample Application
To Verify that J2EE Policy Agent 1 is Configured Properly
8.1.5 Setting Up a Test for the J2EE Policy Agent 2
To Create a Test Policy in the OpenSSO Enterprise Root Realm
To Configure OpenSSO Enterprise Properties for the J2EE Policy Agent 2 Sample Application
To Verify that J2EE Policy Agent 2 is Configured Properly
8.1.6 Configuring the J2EE Policy Agents to Access the Distributed Authentication User Interface
To Configure the J2EE Policy Agent 1 to Access the Distributed Authentication User Interface
To Configure the J2EE Policy Agent 2 to Access the Distributed Authentication User Interface
8.2 Configuring the Protected Resource Host Machines with a Web Policy Agent
8.2.1 Installing and Configuring the Web Container and Web Policy Agent on Protected Resource 1
To Install and Configure Sun Java System Web Server as Web Container 1 on Protected Resource 1
To Import the Certificate Authority Root Certificate into Web Server 1
To Install and Configure Web Policy Agent 1 on Protected Resource 1
To Configure Policy for Web Policy Agent 1 on Protected Resource 1
To Verify that Web Policy Agent 1 is Working Properly
8.2.2 Installing Web Server and a Web Policy Agent on Protected Resource 2
To Install Web Server as Web Container 2 on Protected Resource 2
To Import the Certificate Authority Root Certificate into Web Server 2
To Install and Configure Web Policy Agent 2 on Protected Resource 2
To Configure Policy for Web Policy Agent 2 on Protected Resource 2
To Verify that Web Policy Agent 2 is Working Properly
8.2.3 Configuring the Web Policy Agents to Access the Distributed Authentication User Interface
To Configure the Web Policy Agent 1 to Access the Distributed Authentication User Interface
To Configure the Web Policy Agent 2 to Access the Distributed Authentication User Interface
Chapter 9 Setting Up Load Balancers for the Policy Agents
9.1 Configuring the Web Policy Agents Load Balancer
To Configure the Web Policy Agents Load Balancer
To Create a Monitoring File on Each Host Machine for Load Balancer 4
To Add Load Balancer 4 as a Virtual Host by Modifying the Web Policy Agent Properties
To Configure Policy for the Web Policy Agents
To Verify the Web Policy Agents Load Balancer Configuration is Working Properly
9.2 Configuring the J2EE Policy Agents Load Balancer
To Configure the J2EE Policy Agents Load Balancer
To Add Load Balancer 5 as a Virtual Host by Modifying the J2EE Policy Agent Properties
To Configure Policy for the J2EE Policy Agents
To Verify the J2EE Policy Agent Load Balancer Configuration is Working Properly
Chapter 10 Implementing Session Failover
10.1 Session Failover Architecture
10.2 Installing the Session Failover Components
To Install Session Failover Components on Message Queue 1
To Install Session Failover Components on Message Queue 2
10.3 Configuring and Verifying Session Failover
To Configure OpenSSO Enterprise for Session Failover
To Verify That the Administrator Session Fails Over
To Verify that the User Session Fails Over
Part III Reference: Summaries of Server and Component Configurations
Appendix A Directory Server Host Machines, Test Users and Load Balancer
Appendix B OpenSSO Enterprise Host Machines and Load Balancer
Appendix C OpenSSO Enterprise Distributed Authentication User Interface Host Machines and Load Balancer
Appendix D Protected Resource Host Machine Web Containers, Policy Agents and Load Balancers
Appendix E Message Queue Servers
Appendix F Known Issues and Limitations
© 2010, Oracle Corporation and/or its affiliates