Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

The Bedework quickstart authenticates to the packaged ApacheDS directory server.  Most sites choose to authenticate their Bedework users against their centralized directory service.  For installations that will not be authenticating to a local domain, the Apache DS server shipped with Bedework is acceptable for a production deployment.  Add users to ApacheDS using the tools outlined in Getting started → Authentication and user accounts, and add superusers to the System tab → "Manage system preferences" page in the admin client.

...

An alternative which has been implemented is to use filter based Yale/JA-SIG CAS.

Step 1: Add a superuser

Before you switch from the quickstart's authentication to your site's authentication you need to ensure you have an administrative superuser that exists within your own authentication domain.

...

Option 1 is probably the most appropriate, and as the deployer it is probably acceptable to use your own account, at least initially. 

Option: Use LDAP for authentication

  1. Configure JBoss to point at your local LDAP server:
    1. Edit <quickstart>/jboss-5.1.0.GA /server/default/conf/login-config.xml
    2. Modify the <application-policy name="bedeworkdemo"> section found near line 110 to point to your local LDAP server. This will typically involve modifying three properties: 
      • principalDNPrefix, e.g. "uid="
      • principalDNSuffix, e.g. ",ou=accounts, dc=rpi, dc=edu"
      • java.naming.provider.url, e.g "ldap://login.myserver.edu/"
  2. Prepare your group properties by modifying /home/<userid>/bwbuild/jboss-mysql/cal.options.xml: Set the <user-ldap-group> options on or around lines 68-87
  3. Rebuild the system:
    1. stop JBoss
    2. build Bedework
    3. restart JBoss
  4. Test the web clients.  Login to the admin or user client to test Ldap auth.
Note
iconfalse

If you choose to change the name "bedeworkdemo" to something more reasonable for your site, you must update the references to "bedeworkdemo" in bwbuild/cal.options (four places) to reflect the new policy name.)

Option: Use CAS for authentication

  1. Download the CAS Java Client
  2. Unzip the file and copy the CAS client to Bedework:## unzip cas-client-3.1.10-release.zip## cd cas-client-3.1.10/modules## cp cas-client-core-3.1.10.jar <qs>/jboss-5.1.0.GA/common/lib/
  3. Add a CAS filter to each application that requires a log in (eventsubmit, ucal, caladmin).  Do caladmin last; you may want access to it while you are debugging this procedure. The files to edit are:
    Code Block
    <qs>/bedework/projects/webapps/websubmit/war/WEB-INF/web.xml
    <qs>/bedework/projects/webapps/webclient/war/WEB-INF/userweb.xml
    <qs>/bedework/projects/webapps/webadmin/war/WEB-INF/web.xml
    
    In each file, add the lines in the code box below replacing the URLs with those that work at your site.  The CAS filter must come BEFORE any other filters.  Also, delete any and all of the following elements:
    1. <security-role-ref>
    2. <security-constraint> 
    3. <security-role>
  4. (optionally) Point the logout buttons on the Bedework clients that have them (Admin Client, Personal Calendar Client, Submissions Client) at your CAS server by editing the corresponding stylesheets.   For example, in the Submissions Client  (<quickstart>/bedework/deployment/websubmit/webapp/resources/demoskins/default/default/default.xsl), change the logout "span" to look something like this:
    Code Block
    <span class="logout">
        <a href="https://yourserver:8443/cas/logout?service=http%3A%2F%2Fyourserver%2Feventsubmit%2F"
                id="bwLogoutButton">
             <xsl:copy-of select="$bwStr-Hedr-Logout"/>
       </a>
    </span>
    
  5. build Bedework

CAS Filters:

Code Block
<filter>
  <filter-name>CAS Authentication Filter</filter-name>
  <filter-class>org.jasig.cas.client.authentication.AuthenticationFilter</filter-class>
  <init-param>
    <param-name>casServerLoginUrl</param-name>
    <param-value>https://myCasServer/login</param-value>
  </init-param>
  <init-param>
    <param-name>service</param-name>
    <param-value>http://myclient/</param-value>
  </init-param>
  <init-param>
    <param-name>serverName</param-name>
    <param-value>http://myBedeworkServer</param-value>
  </init-param>
</filter>

<filter>
  <filter-name>CAS Validation Filter</filter-name>
  <filter-class>org.jasig.cas.client.validation.Cas20ProxyReceivingTicketValidationFilter</filter-class>
  <init-param>
    <param-name>casServerUrlPrefix</param-name>
    <param-value>https:/myCasServer/cas</param-value>
   </init-param>
   <init-param>
    <param-name>serverName</param-name>
    <param-value>http://myBedeworkServer</param-value>
   </init-param>
</filter>

<filter>
  <filter-name>CAS HttpServletRequest Wrapper Filter</filter-name>
  <filter-class>org.jasig.cas.client.util.HttpServletRequestWrapperFilter</filter-class>
</filter>

<filter-mapping>
  <filter-name>CAS Authentication Filter</filter-name>
  <url-pattern>/*</url-pattern>
</filter-mapping>

<filter-mapping>
  <filter-name>CAS Validation Filter</filter-name>
  <url-pattern>/*</url-pattern>
</filter-mapping>

<filter-mapping>
  <filter-name>CAS HttpServletRequest Wrapper Filter</filter-name>
  <url-pattern>/*</url-pattern>
</filter-mapping>

<filter>
  <filter-name>CAS Sign-Out Filter</filter-name>

  <filter-class>org.jasig.cas.client.session.SingleSignOutFilter</filter-class>
</filter>
     
<filter-mapping>
  <filter-name>CAS Sign-Out Filter</filter-name>
  <url-pattern>/*</url-pattern>
</filter-mapping>

<listener>
  <listener-class>org.jasig.cas.client.session.SingleSignOutHttpSessionListener</listener-class>
</listener>