diff --git a/docbook/auth-server-docs/pom.xml b/docbook/auth-server-docs/pom.xml index a7c2ddd33f..546b18d5e6 100755 --- a/docbook/auth-server-docs/pom.xml +++ b/docbook/auth-server-docs/pom.xml @@ -114,6 +114,10 @@ picketlink.version ${picketlink.version} + + wildfly.version + ${wildfly.version} + saxon diff --git a/docbook/auth-server-docs/reference/en/en-US/modules/server-installation.xml b/docbook/auth-server-docs/reference/en/en-US/modules/server-installation.xml index 558f943f12..549bc84bc8 100755 --- a/docbook/auth-server-docs/reference/en/en-US/modules/server-installation.xml +++ b/docbook/auth-server-docs/reference/en/en-US/modules/server-installation.xml @@ -43,9 +43,9 @@
- Install on existing WildFly 9.0.1.Final + Install on existing WildFly &wildfly.version; - Keycloak can be installed into an existing WildFly 9.0.0.Final server. To do this download + Keycloak can be installed into an existing WildFly &wildfly.version; server. To do this download keycloak-overlay-&project.version;.zip or keycloak-overlay-&project.version;.tar.gz. Once downloaded extract into the root directory of your WildFly installation. To start WildFly with Keycloak run: @@ -62,11 +62,15 @@ To add Keycloak to other sever configurations (standalone.xml, standalone-ha.xml, etc.) start the server with the desired server-config. If you are running the server in standalone mode run: - cd <WILDFLY_HOME>/bin - ./jboss-cli.sh -c --file=keycloak-install.cli + +cd <WILDFLY_HOME>/bin +./jboss-cli.sh -c --file=keycloak-install.cli + Or if you are running in clustering (HA) mode (by having used -c standalone-ha.xml) then run: - cd <WILDFLY_HOME>/bin - ./jboss-cli.sh -c --file=keycloak-install-ha.cli + +cd <WILDFLY_HOME>/bin +./jboss-cli.sh -c --file=keycloak-install-ha.cli + You may see exceptions in the server log, but after restarting the server they should be gone. You can restart the server with: <WILDFLY_HOME>/bin/jboss-cli.sh -c :reload @@ -75,7 +79,7 @@
Install on existing JBoss EAP 6.4.0.GA - Same procedure as WildFly 9.0.1.Final, but download keycloak-overlay-eap6-&project.version;.zip or keycloak-overlay-eap6-&project.version;.tar.gz. + Same procedure as WildFly &wildfly.version;, but download keycloak-overlay-eap6-&project.version;.zip or keycloak-overlay-eap6-&project.version;.tar.gz.
@@ -85,7 +89,7 @@ To install it first download keycloak-demo-&project.version;.zip or keycloak-demo-&project.version;.tar.gz. Once downloaded extract it inside keycloak-demo-&project.version; you'll find keycloak which contains - a full WildFly 9.0.0.Final server with Keycloak Server and Adapters included. You'll also find docs + a full WildFly &wildfly.version; server with Keycloak Server and Adapters included. You'll also find docs and examples which contains everything you need to get started developing applications that use Keycloak. @@ -437,12 +441,12 @@ All configuration options are optional. Default value for directory is settings you can specify before boot time. This is configured in the standalone/configuration/keycloak-server.json. By default the setting is like this: - Possible configuration options are: @@ -659,25 +663,25 @@ All configuration options are optional. Default value for directory is to do with the keytool utility that comes with the Java jdk. - - $ keytool -genkey -alias localhost -keyalg RSA -keystore keycloak.jks -validity 10950 - Enter keystore password: secret - Re-enter new password: secret - What is your first and last name? - [Unknown]: localhost - What is the name of your organizational unit? - [Unknown]: Keycloak - What is the name of your organization? - [Unknown]: Red Hat - What is the name of your City or Locality? - [Unknown]: Westford - What is the name of your State or Province? - [Unknown]: MA - What is the two-letter country code for this unit? - [Unknown]: US - Is CN=localhost, OU=Keycloak, O=Test, L=Westford, ST=MA, C=US correct? - [no]: yes - + +$ keytool -genkey -alias localhost -keyalg RSA -keystore keycloak.jks -validity 10950 + Enter keystore password: secret + Re-enter new password: secret + What is your first and last name? + [Unknown]: localhost + What is the name of your organizational unit? + [Unknown]: Keycloak + What is the name of your organization? + [Unknown]: Red Hat + What is the name of your City or Locality? + [Unknown]: Westford + What is the name of your State or Province? + [Unknown]: MA + What is the two-letter country code for this unit? + [Unknown]: US + Is CN=localhost, OU=Keycloak, O=Test, L=Westford, ST=MA, C=US correct? + [no]: yes + You should answer What is your first and last name ? question with @@ -693,44 +697,44 @@ All configuration options are optional. Default value for directory is The first thing to do is generate a Certificate Request: - - $ keytool -certreq -alias yourdomain -keystore keycloak.jks > keycloak.careq - + +$ keytool -certreq -alias yourdomain -keystore keycloak.jks > keycloak.careq + Where yourdomain is a DNS name for which this certificate is generated for. Keytool generates the request: - - -----BEGIN NEW CERTIFICATE REQUEST----- - MIIC2jCCAcICAQAwZTELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAk1BMREwDwYDVQQHEwhXZXN0Zm9y - ZDEQMA4GA1UEChMHUmVkIEhhdDEQMA4GA1UECxMHUmVkIEhhdDESMBAGA1UEAxMJbG9jYWxob3N0 - MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr7kck2TaavlEOGbcpi9c0rncY4HhdzmY - Ax2nZfq1eZEaIPqI5aTxwQZzzLDK9qbeAd8Ji79HzSqnRDxNYaZu7mAYhFKHgixsolE3o5Yfzbw1 - 29Rvy+eUVe+WZxv5oo9wolVVpdSINIMEL2LaFhtX/c1dqiqYVpfnvFshZQaIg2nL8juzZcBjj4as - H98gIS7khql/dkZKsw9NLvyxgJvp7PaXurX29fNf3ihG+oFrL22oFyV54BWWxXCKU/GPn61EGZGw - Ft2qSIGLdctpMD1aJR2bcnlhEjZKDksjQZoQ5YMXaAGkcYkG6QkgrocDE2YXDbi7GIdf9MegVJ35 - 2DQMpwIDAQABoDAwLgYJKoZIhvcNAQkOMSEwHzAdBgNVHQ4EFgQUQwlZJBA+fjiDdiVzaO9vrE/i - n2swDQYJKoZIhvcNAQELBQADggEBAC5FRvMkhal3q86tHPBYWBuTtmcSjs4qUm6V6f63frhveWHf - PzRrI1xH272XUIeBk0gtzWo0nNZnf0mMCtUBbHhhDcG82xolikfqibZijoQZCiGiedVjHJFtniDQ - 9bMDUOXEMQ7gHZg5q6mJfNG9MbMpQaUVEEFvfGEQQxbiFK7hRWU8S23/d80e8nExgQxdJWJ6vd0X - MzzFK6j4Dj55bJVuM7GFmfdNC52pNOD5vYe47Aqh8oajHX9XTycVtPXl45rrWAH33ftbrS8SrZ2S - vqIFQeuLL3BaHwpl3t7j2lMWcK1p80laAxEASib/fAwrRHpLHBXRcq6uALUOZl4Alt8= - -----END NEW CERTIFICATE REQUEST----- - + +-----BEGIN NEW CERTIFICATE REQUEST----- +MIIC2jCCAcICAQAwZTELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAk1BMREwDwYDVQQHEwhXZXN0Zm9y +ZDEQMA4GA1UEChMHUmVkIEhhdDEQMA4GA1UECxMHUmVkIEhhdDESMBAGA1UEAxMJbG9jYWxob3N0 +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr7kck2TaavlEOGbcpi9c0rncY4HhdzmY +Ax2nZfq1eZEaIPqI5aTxwQZzzLDK9qbeAd8Ji79HzSqnRDxNYaZu7mAYhFKHgixsolE3o5Yfzbw1 +29Rvy+eUVe+WZxv5oo9wolVVpdSINIMEL2LaFhtX/c1dqiqYVpfnvFshZQaIg2nL8juzZcBjj4as +H98gIS7khql/dkZKsw9NLvyxgJvp7PaXurX29fNf3ihG+oFrL22oFyV54BWWxXCKU/GPn61EGZGw +Ft2qSIGLdctpMD1aJR2bcnlhEjZKDksjQZoQ5YMXaAGkcYkG6QkgrocDE2YXDbi7GIdf9MegVJ35 +2DQMpwIDAQABoDAwLgYJKoZIhvcNAQkOMSEwHzAdBgNVHQ4EFgQUQwlZJBA+fjiDdiVzaO9vrE/i +n2swDQYJKoZIhvcNAQELBQADggEBAC5FRvMkhal3q86tHPBYWBuTtmcSjs4qUm6V6f63frhveWHf +PzRrI1xH272XUIeBk0gtzWo0nNZnf0mMCtUBbHhhDcG82xolikfqibZijoQZCiGiedVjHJFtniDQ +9bMDUOXEMQ7gHZg5q6mJfNG9MbMpQaUVEEFvfGEQQxbiFK7hRWU8S23/d80e8nExgQxdJWJ6vd0X +MzzFK6j4Dj55bJVuM7GFmfdNC52pNOD5vYe47Aqh8oajHX9XTycVtPXl45rrWAH33ftbrS8SrZ2S +vqIFQeuLL3BaHwpl3t7j2lMWcK1p80laAxEASib/fAwrRHpLHBXRcq6uALUOZl4Alt8= +-----END NEW CERTIFICATE REQUEST----- + Send this ca request to your CA. The CA will issue you a signed certificate and send it to you. Before you import your new cert, you must obtain and import the root certificate of the CA. You can download the cert from CA (ie.: root.crt) and import as follows: - - $ keytool -import -keystore keycloak.jks -file root.crt -alias root - + +$ keytool -import -keystore keycloak.jks -file root.crt -alias root + Last step is import your new CA generated certificate to your keystore: - - $ keytool -import -alias yourdomain -keystore keycloak.jks -file your-certificate.cer - + +$ keytool -import -alias yourdomain -keystore keycloak.jks -file your-certificate.cer +
@@ -744,18 +748,19 @@ All configuration options are optional. Default value for directory is To the security-realms element add: - - - - - - - ]]> + + + + + + + +]]> Find the element <server name="default-server"> (it's a child element of <subsystem xmlns="urn:jboss:domain:undertow:1.0">) and add: - - ]]> + ]]> Check the Wildfly Undertow documentation for more information on fine tuning the socket connections. @@ -865,12 +870,12 @@ All configuration options are optional. Default value for directory is To do this, add the default-web-module attribute in the Undertow subystem in standalone.xml. - - - - - + + + + ]]> diff --git a/pom.xml b/pom.xml index 12a346e201..85409fe308 100755 --- a/pom.xml +++ b/pom.xml @@ -48,8 +48,8 @@ 1.6.1 1.4.01 1.7.7 - 9.0.1.Final - 1.0.1.Final + 9.0.2.Final + 1.0.2.Final 1.0.0.Final