If you are deploying a Distributed Authentication UI server WAR file, see Creating a Distributed Authentication UI Server WAR File.
Deploy the specialized WAR file into your web container.
Access the specialized WAR deployment URL from your browser. For example, for a console only WAR: http://console-host.example.com:8080/console
When the configurator page is displayed, enter the configuration information for the specialized WAR.
The OpenSSO Configurator creates configuration data as follows:
OpenSSO Administration Console only: AMConfig.properties file in the home directory of the user running the web container where the specialized WAR file is deployed
Distributed Authentication UI server: /FAMDistAuth/AMDistAuthConfig.properties file in the home directory of the user running the web container where the specialized WAR file is deployed
OpenSSO server only:
Default configuration directory, which is opensso in the home directory of the user running the Configurator. For example, if the Configurator is run by super user (root), the configuration directory is /opensso.
user-home-directory.openssocfg, where user-home-directory is the home directory of the user who deployed the WAR file. For example, if the user is super user (root), the directory is /.openssocfg.
IDP Discovery Service: libIDPDiscoveryConfig.properties file in the home directory of the user running the web container where the specialized WAR file is deployed
It is highly recommended that you change the permissions of a configuration file to limit access to sensitive configuration information, such as the administrator password.
Next Steps
Access the specialized OpenSSO WAR from your browser for its specific function, using the same URL from Step 3.
For example: http://console-host.example.com:8080/console
Before you configure a Distributed Authentication UI server WAR file, on the OpenSSO Enterprise sserver, create a user who has the “Read and write access to all realm and policy properties” privilege. You will specify this user (and password) when you run the Configurator (distAuthConfigurator.jsp) to configure the WAR file.
Log in to the OpenSSO server administration console as amadmin.
Click Access Control, the default realm, and then Subjects.
Create a new user. For example: dauser
Create a new group. For example: dagroup
Add the new user to the new group.
Click Privileges and then the link for the new group.
Select the "Read and write access to all realm and policy properties" privilege and click Save.