Merge pull request #62 from ccopelloRH/RHSSO642_602

RH602 and 642 updates
This commit is contained in:
ccopelloRH 2016-12-01 17:18:02 -05:00 committed by GitHub
commit b17fa49ee2
17 changed files with 65 additions and 78 deletions

View file

@ -12,7 +12,7 @@
"title": "Server Administration Guide",
"project": {
"name": "Red Hat Single Sign-On",
"version": "7.0.0"
"version": "7.1.0"
},
"community": false,
"product": true,
@ -20,16 +20,16 @@
"developerguide": {
"name": "Server Developer Guide",
"link": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/7.0/server-developer-guide/"
"link": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/7.1-Beta/server-developer-guide/"
},
"installguide": {
"name": "Server Installation and Configuration Guide",
"link": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/7.0/server-installation-and-configuration-guide/"
"link": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/7.1-Beta/server-installation-and-configuration-guide/"
},
"adapterguide": {
"name": "Securing Applications and Services Guide",
"link": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/7.0/securing-applications-and-services-guide/"
"link": "https://access.redhat.com/documentation/en/red-hat-single-sign-on/7.1-Beta/securing-applications-and-services-guide/"
}
}
}

View file

@ -23,7 +23,7 @@ The QR code you see in the screen shot can be scanned into the FreeOTP or Google
.OTP Authenticator
image:../{{book.images}}/account-service-authenticator.png[]
The `Federated Identity` menu item allows the user to link their account with an <<fake/../identity-broker.adoc#_identity_broker, identity broker>> (this is usually used to link social provier
The `Federated Identity` menu item allows the user to link their account with an <<fake/../identity-broker.adoc#_identity_broker, identity broker>> (this is usually used to link social provider
accounts together). This will show the list of external identity providers you have configured for your realm.
.Federated Identity
@ -43,6 +43,3 @@ image:../{{book.images}}/account-service-apps.png[]
Like all UIs in {{book.project.name}}, the User Account Service is completely themeable and internationalizable.
See the link:{{book.developerguide.link}}[{{book.developerguide.name}}] for more details.

View file

@ -29,7 +29,7 @@ versions of {{book.project.name}} it is planned that you will be able to configu
==== TOTP Configuration Options
Hashing Algorithm::
OTP Hashing Algorithm::
Default is SHA1, more secure options are SHA256 and SHA512.
Number of Digits::
How many characters is the OTP? Short means more user friendly as it is less the user has to type. More means more security.
@ -43,7 +43,7 @@ OTP Token Period::
==== HOTP Configuration Options
Hashing Algorithm::
OTP Hashing Algorithm::
Default is SHA1, more secure options are SHA256 and SHA512.
Number of Digits::
How many characters is the OTP? Short means more user friendly as it is less the user has to type. More means more security.
@ -53,5 +53,3 @@ Look Ahead Window::
manually too many times by accident. This value really should be increased to a value of 10 or so.
Initial Counter::
What is the value of the initial counter?

View file

@ -37,11 +37,11 @@ HashAlgorithm::
the next time the user logs in.
{% endif %}
{% if book.product %}
HashAlgorithm::
Hashing Algorithm::
Passwords are not stored as clear text. Instead they are hashed using standard hashing algorithms before they are stored or validated.
The only currently supported algorithm is PBKDF2.
{% endif %}
HashIterations::
Hashing Iterations::
This value specifies the number of times a password will be hashed before it is stored or verified. The default value is 20,000.
This hashing is done in the rare case that a hacker gets access to your password database. Once they have the database
they can reverse engineer user passwords.
@ -51,20 +51,18 @@ HashIterations::
or protecting your passwords stores. There may be more cost effective ways of protecting your password stores.
Digits::
How many digits are required to be in the password string?
LowerCase::
Lowercase Characters::
How many lower case letters are required to be in the password string?
UpperCase::
Uppercase Characters::
How many upper case letters are required to be in the password string?
SpecialChars::
Special Characters::
How many special characters like '?!#%$' are required to be in the password string?
Not Username::
When set, password is not allowed to be the same as the username.
RegexPattern::
Regular Expression::
Define a Perl regular expression pattern that passwords must match.
ForceExpiredPasswordChange::
Expire Password::
How many days is a password valid for? After the number of days has expired, the user will be required to change their password.
PasswordHistory::
Not Recently Used::
This policy saves a history of previous passwords. The number of old passwords stored is configurable. When a user changes their password
they will not be able to re-use any password stored in history.

View file

@ -3,7 +3,7 @@
=== Service Accounts
Each OIDC client has a built in _service account_ which allows it to obtain an access token.
This is covered in the OAuth 2.0 specifiation under <<fake/../../../sso-protocols/oidc.adoc#_client_credentials_grant,Client Credentials Grant>>
This is covered in the OAuth 2.0 specifiation under <<fake/../../../sso-protocols/oidc.adoc#_client_credentials_grant,Client Credentials Grant>>.
To use this feature you must set the <<fake/../../../clients/client-oidc.adoc#_access-type, Access Type>> of your client to `confidential`. When you do this,
the `Service Accounts Enabled` switch will appear. You need to turn on this switch. Also make sure that you have
configured your <<fake/../../../clients/oidc/confidential.adoc#_client-credentials, client credentials>>.

View file

@ -29,7 +29,7 @@ image:../../{{book.images}}/mapper-config.png[]
The best way to learn about a config option is to hover over its tooltip. There are a few config options that
are common to all mappers:
Consent::
Consent Required::
If your client requires consent, this mapper will be displayed on the consent screen shown to the user.
Consent Text::
If your client requires consent and the `Consent` switch is on, this is the text that will be displayed by the user.
@ -47,4 +47,3 @@ image:../../{{book.images}}/add-mapper.png[]
Pick a `Mapper Type` from the list box. If you hover over the tooltip, you'll see a description of what that mapper type does.
Different config parameters will appear for different mapper types.

View file

@ -94,7 +94,7 @@ Import of most resources can be performed from the admin console.
Exporting resources will be supported in future versions.
The files created during a "startup" export can be used to import from the admin UI.
This way, you can export from one realm and import to another realm.
This way, you can export from one realm and import to another realm. Note: The admin console import allows just one realm per file.
Or, you can export from one server and import to another.
WARNING: The admin console import allows you to "overwrite" resources if you choose.

View file

@ -11,7 +11,7 @@ In order to create an identity provider click the `Identity Providers` left menu
.Identity Providers
image:../../{{book.images}}/identity-providers.png[]
In the right hand drop down list box, choose the identity provider you want to add. This will bring you to the
In the drop down list box, choose the identity provider you want to add. This will bring you to the
configuration page for that identity provider type.
.Add Identity Provider
@ -36,7 +36,7 @@ Protocol-based::
It makes it easy to configure and broker any identity provider based on these open standards.
Although each type of identity provider has its own configuration options, all of them share some very common configuration.
Regardless the identity provider you are creating, you'll see the following configuration options avaivable:
Regardless the identity provider you are creating, you'll see the following configuration options available:
.Common Configuration
[cols="1,1", options="header"]
@ -73,5 +73,3 @@ Regardless the identity provider you are creating, you'll see the following conf
|Post Login Flow
|Authentication flow that is triggered after the user finishes logging in with the external identity provider.
|===

View file

@ -58,7 +58,7 @@ was compromised, it is obviously good to update your keys, but it's also good to
<<fake/../../realms/cache.adoc#_clear-cache, Clearing the cache>> section for more details.
|Use JWKS URL
|Applicable just `Validate Signatures` is on. If the switch is on, then identity provider public keys will be downloaded from given JWKS URL.
|Applicable if `Validate Signatures` is on. If the switch is on, then identity provider public keys will be downloaded from given JWKS URL.
This allows great flexibility because new keys will be always re-downloaded again when identity provider generates new keypair. If the switch is off,
then public key (or certificate) from the {{book.project.name}} DB is used, so when identity provider keypair changes, you always need to import new key to the {{book.project.name}} DB as well.

View file

@ -21,7 +21,7 @@ roles::
user role mapping::
A user role mapping defines a mapping between a role and a user. A user can be associated with zero or more roles. This
role mapping information can be encapsulated into tokens and assertions so that applications can decide access permissions on
various resources they manage
various resources they manage.
composite roles::
A composite role is a role that can be associated with other roles. For example a `superuser` composite role could be associated with the
`sales-admin` and `order-entry-admin` roles. If a user is mapped to the `superuser` role they also inherit the `sales-admin` and `order-entry-admin` roles.
@ -44,7 +44,7 @@ consent::
information is requested of the user. User can decide whether or not to grant the request.
client templates::
When a client is registered you need to enter configuration information about that client. It is often useful to store a template
of this to make create new clients easier. {{book.project.name}} provides the concept of a client template for this.
to make create new clients easier. {{book.project.name}} provides the concept of a client template for this.
client role::
Clients can define roles that are specific to them. This is basically a role namespace dedicated to the client.
identity token::

View file

@ -1,7 +1,7 @@
=== Features
* Single-Sign On and Single-Sign Out for browser applications
* Single-Sign On and Single-Sign Out for browser applications.
* OpenID Connect support.
* OAuth 2.0 support.
* SAML support.
@ -12,12 +12,12 @@
* Admin Console for central management of users, roles, role mappings, clients and configuration.
* Account Management console that allows users to centrally manage their account.
* Theme support - Customize all user facing pages to integrate with your applications and branding.
* Two-factor Authentication - Support for TOTP/HOTP via Google Authenticator or FreeOTP
* Two-factor Authentication - Support for TOTP/HOTP via Google Authenticator or FreeOTP.
* Login flows - optional user self-registration, recover password, verify email, require password update, etc.
* Session management - Admins and users themselves can view and manage user sessions.
* Token mappers - Map user attributes, roles, etc. how you want into tokens and statements.
* Not-before revocation policies per realm, application and user.
* CORS support - Client adapters have built-in support for CORS
* CORS support - Client adapters have built-in support for CORS.
{% if book.community %}
* Service Provider Interfaces (SPI) - A number of SPIs to enable customizing various aspects of the server. Authentication flows, user federation providers,
protocol mappers and many more.
@ -26,4 +26,4 @@ protocol mappers and many more.
{% if book.product %}
* Client adapters for JavaScript applications, JBoss EAP, Fuse, etc.
{% endif %}
* Supports any platform/language that has an OpenID Connect Resource Provider library or SAML 2.0 Service Provider library
* Supports any platform/language that has an OpenID Connect Resource Provider library or SAML 2.0 Service Provider library.

View file

@ -7,7 +7,7 @@ there's a chance parts of the in-memory cache may be stale. You can clear the r
external clients or Identity providers, which {{book.project.name}} usually uses for verify signatures of particular external entity) from the Admin Console by going
to the `Realm Settings` left menu item and the `Cache` tab.
.Keys tab
.Cache tab
image:../../{{book.images}}/cache-tab.png[]
Just click the `clear` button on the cache you want to evict.

View file

@ -16,7 +16,7 @@ is only one active keypair. In the future as more signature algorithms are added
To view all available keys select `All`. This will show all active, passive and disabled keys. A keypair can have the
status `Active`, but still not be selected as the currently active keypair for the realm. The selected active pair which
is used for signatures is selected based on the the first key provider sorted by priority that is able to provide an
is used for signatures is selected based on the first key provider sorted by priority that is able to provide an
active keypair.
==== Rotating keys
@ -50,7 +50,7 @@ Click `Save` to add the new keys. This will generated a new keypair including a
Changing the priority for a provider will not cause the keys to be re-generated, but if you want to change the keysize
you can edit the provider and new keys will be generated.
==== Adding a existing keypair and certificate
==== Adding an existing keypair and certificate
To add a keypair and certificate obtained elsewhere select `Providers` and choose `rsa` from the dropdown. You can change
the priority to make sure the new keypair becomes the active keypair.

View file

@ -24,7 +24,5 @@ none::
{{book.project.name}} does not require SSL. This should really only be used in development when you are playing around with things and don't want to bother
configuring SSL on your server.
all::
all requests::
{{book.project.name}} requires SSL for all IP addresses.

View file

@ -71,11 +71,11 @@ Here's a brief summary of the protocol:
. {{book.project.name}} authenticates the user and creates an _identity_ and _access_ token. {{book.project.name}}
redirects back to the application using the callback URL provided earlier and additionally adding the _identity_ and
_access_ tokens as query parameters in the callback URL.
. The application extracts the the _identity_ and _access_ tokens from the callback URL.
. The application extracts the _identity_ and _access_ tokens from the callback URL.
===== Resource Owner Password Credentials Grant (Direct Grants)
===== Resource Owner Password Credentials Grant (Direct Access Grants)
This is referred to in the Admin Console as _Direct Grants_. This is used by REST clients that want to obtain a token on behalf of a user. It is one HTTP POST request that contains
This is referred to in the Admin Console as _Direct Access Grants_. This is used by REST clients that want to obtain a token on behalf of a user. It is one HTTP POST request that contains
the credentials of the user as well as the id of the client and the client's secret (if it is a confidential client). The user's credentials
are sent within form parameters. The HTTP response contains
_identity_, _access_, and _refresh_ tokens.
@ -103,4 +103,3 @@ _/auth_: i.e. $$https://localhost:8080/auth$$
This is the URL endpoint for the User Info service described in the OIDC specification.
In all of these replace _\{realm-name}_ with the name of the realm.

View file

@ -14,7 +14,7 @@ If the `Temporary` switch is on, this new password can only be used once and the
logged in.
Alternatively, if you have <<fake/../../realms/email.adoc#_email, email>> set up, you can send an email to the user that asks
them to reset their password. Choose `Update Password` from the `Reset Actions` list box and click the `Reset Actions Email`.
them to reset their password. Choose `Update Password` from the `Reset Actions` list box and click the `Send Email`.
The sent email contains a link that will bring the user to the update password screen.
==== Changing OTPs

View file

@ -17,7 +17,7 @@ image:../../{{book.images}}/registration-flow.png[]
Set the 'reCAPTCHA' requirement to `Required` by clicking the appropriate radio button. This will enable
reCAPTCHA on the screen. Next, you have to enter in the reCAPTCHA site key and secret that you generated at the Google reCAPTCHA Website.
Click on the 'Configure' button that is to the right of the reCAPTCHA flow entry and enter in the reCAPTCHA site key and secret on this config page.
Click on the 'Actions' button that is to the right of the reCAPTCHA flow entry, then "Config" link, and enter in the reCAPTCHA site key and secret on this config page.
.Recaptcha Config Page
image:../../{{book.images}}/recaptcha-config.png[]