Table of Contents |
---|
Configuration Template
The Ubisecure SSO software package includes a configuration application that is used to generate configuration files and scripts for required software components. The Ubisecure SSO software package contains two configuration templates in the config
directory:
...
Please use forward slashes (‘/’) in all path values in the configuration template. Do not include a trailing slash (‘/’) character in the path values.
The Macro Language
The Ubisecure SSO configuration files use a macro language, that is used to fill configuration file values (from SSO configuration files win32.config, or unix.config) when SSO is installed.
Setup, Generation of SSO Configuration Files
When you are finished editing the win32.config
or unix.config
file, you can generate the setup using the following commands
Running the setup script on Windows
Code Block | ||
---|---|---|
| ||
cd /d "C:\Program Files\Ubisecure\ubilogin-sso\ubilogin" setup.cmd |
Running the setup script on Linux
Code Block | ||
---|---|---|
| ||
cd /usr/local/ubisecure/ubilogin-sso/ubilogin sh setup.sh |
...
Note |
---|
NOTE: New LDAP passwords are generated every time the setup command is executed. For this reason, the secrets.ldif file must be imported to the LDAP directory after running the setup script. After this, the Tomcat update script must be run to have the applications use the new passwords. See Applications upgrade - SSO Applications Upgrade for more details about the update process. |
Updating the LDAP Passwords on windows
Updating the application-specific LDAP passwords on Windows
Code Block | ||
---|---|---|
| ||
ldap\adam\import.cmd ldap\secrets.ldif |
Updating the LDAP Passwords on linux
Updating the application-specific LDAP passwords on Linux
Code Block | ||
---|---|---|
| ||
./ldap/openldap/import.sh ldap/secrets.ldif |
Security Considerations
One of the generated random values is the Ubisecure Directory encryption key. This key is written to the win32.config
or unix.config
file in the root of your installation directory. The original file is copied to a backup file. The file with the encryption key is needed if regeneration of the configuration files is performed. Care should be taken to protect the configuration files from unauthorized users.
When Setup Script is needed?
The setup script needs to be run whenever there are changes to the applications managed by it. There are three cases where it is necessary to run the setup script:
...