The purpose of this lab is to:
|
|
During this training you will receive a pre-installed Ubisecure Identity Server environment for your learning purposes. However, knowing the installation process of Ubisecure Identity Server will be very useful in the future when you need to install or upgrade on your own.
In practice, Ubisecure Identity Server is built based on two main components: Ubisecure SSO and Ubisecure CustomerID. For both components, Single Node Installation is the simplest possible deployment and will be used for training purposes.
SSO is installed first, as it is a requirement for installing CustomerID.
The following graph shows an overview of the main steps of installing Ubisecure Identity Server:
Each student has access to a pre-installed IAM Academy environment consisting of the following services
Ubisecure SSO Management Console
https://login.smartplan.com:8443/ubilogin
Ubisecure CustomerID Administration Interface
https://login.smartplan.com:7443/eidm2/wf/admin
Ubisecure CustomerID Self-service Interface
https://login.smartplan.com:7443/eidm2/wf/self-service
Ubisecure CustomerID Password reset tool
https://login.smartplan.com:7443/eidm2/wf/changepwd
You will access the environment using your browser on your virtual machine
Open your browser and load the portal https://iamacademy.ubisecure.com/
Portal | https://iamacademy.ubisecure.com/ |
User name | StudentX (each student has a different username e.g. Student1) |
Password | ************ (provided by the instructor) |
Click the icon and that will launch the virtual machine on your browser tab.
Now you're ready to start the exercises!
Now it's time to get familiar with some basics about SSO management.
To minimise configuration steps, we must enable two settings - one to disable backchannel logout flows which can be prevented by incorrect firewall settings, and the second to set the metadata configuration to show the public key within an X.509 certificate.
On the main screen, add SAML 2.0 Compatibility Flags (notice the space between the two flags):
LiteNoBackChannel MetadataCertificate
Once the flag is set, press "Update" button
It's useful to get familiar with the services that Ubisecure SSO runs and how they affect the system. SSO runs two services:
These services restart automatically whenever the system reboots.
|
There are two ways of restarting the services: via Command Prompt or via "Services" GUI.
The first way is via the Command Prompt. To open it, type "cmd" in Search box, and right-click to run as Administrator.
The sequence of commands is:
net stop ubiloginserver net stop ubilogindirectory net start ubilogindirectory net start ubiloginserver |
The second way is via Windows graphical user interface. To launch "Services" GUI, type "services" in Search box.
In the following screenshot you can see the two services running:
You must replicate the four steps in the exact order.
Now choose your preferred way, and perform the following tasks in this order:
Verify that the service is running by logging in.
cd /d C:\Program Files\Ubisecure\ubilogin-sso\ubilogin\ldap adam\import.cmd system-password.ldif |
Security best practice dictates that administrators should always access the system using personally named accounts and any generic accounts should be disabled.
On Ubisecure SSO management interface, Home / System / Users and select "Administrator." The User object main view will look like this:
Uncheck the "Enabled" status and then click "Update" button. Now the system user is disabled.
Verify by trying to login with "system" user.
Right after CustomerID is installed, there are no user accounts you can log in. You must first create an administrative user account on the system. This is done with the Example user data import on Windows - CustomerID.
However, in this training environment there is an administrative user created.
Get familiar with import tool by creating a new user account, the administrative user Scott Long for SmartPlan: scott.long@smartplan.com
In %PROGRAMFILES%\Ubisecure\customerid\tools
folder, modify the provided template import file.
cd /D "%PROGRAMFILES%\Ubisecure\customerid\tools" notepad examples\importtool\example.import |
(You can use Notepad++ editor if you prefer so)
Everything with the bracket "#" in the start of a line is commented out, which means they are not enabled.
Then edit the file to include Scott's account. The import file could contain multiple users - for example for migrating users from an existing system, separated by a blank line.
entity: user organization: Users uid: scott.long firstname: Scott surname: Long email: scott.long@smartplan.com role: eIDM/eIDMMainUser password: Password2 |
Now execute the import command on the command prompt:
import.cmd examples\importtool\example.import |
ImportTool X.X.XX
Create 'scott.long@smartplan.com': OK
'Assign Role': OK
The service address of CustomerID admin interface is:
Open the address in a browser and sign in using the following credentials
In case you have problems logging in, there is an administrator account with the following credentials:
Self-service interface
Unlike SSO, CustomerID uses Wildfly instead of Tomcat.
Changes to the eidm2.properties
file require a restart of the CustomerID service to become effective. The service you must restart is Wildfly.
Execute this sequence in the command prompt:
net stop Wildfly net start Wildfly |
or via Windows graphical user interface as seen in the picture:
The installation steps are on the page Single node installation - SSO of Ubisecure Developer and Partner Portal.
The installation steps are on the page Single node installation - CustomerID of Ubisecure Developer and Partner Portal.