I have a server which does the federated authentication.
I have metadata for Federation environment and the signing certificate.
I will have to access this server from my ruby on rails application server.
As per my understanding I have to provide federation metadata so that a connection can be set up from my application server to the federation server.
I am new to federation authentication.
Any suggestions on how to proceed will be really helpful.
Regards,
Srikanth
Related
We are using freeradius with ldap authentication in our current environment. But we required to use Active Directory authentication instead of ldap due to ldap servers decommissioning. I’ve no idea how to make the configuration changes. Could you please guide me or share me a link which i can go through and complete the task?
Thanks in advance.
Anil
Is it better to store the config server username and password as an environment variable (both in the client and server), or by using a keystore? The keystore password is anyway stored as an environment variable, so why actually use a keystore? Or is there a better way to implement authentication in the Spring Cloud Config server?
In our case, config server is ONLY for backend services, but not for clients. We have multiple clients, like iOS, Android and Web app. Each kind of client will manage their own configurations.
Furthermore, we simply use HTTP basic authentication on config server, and store the username and password as instance variables. So the username and password will be not be exposed in source code level. On the other hand, our config server is not exposed to public network.
Hope this will give you some hints.
I am developing the Single Sign-on (SSO) feature for a system (using OpenID Connect with a Gluu server as the OP). Details of the system are listed as follows:
Programming Language:
Ruby on Rails
Ruby Gem of OpenID Connect:
omniauth-openid-connect (https://github.com/jjbohn/omniauth-openid-connect)
Authorization Endpoint:
/oxauth/seam/resource/restv1/oxauth/authorize
Token Endpoint:
/oxauth/seam/resource/restv1/oxauth/token
However, the response (token) from the Gluu server causes a JSON::JWS::VerificationFailed exception at the system under development (raised by the Ruby Gem omniauth-openid-connect). Apparently, the default method of the Gluu server in signing the token is not compatible with the expectation of the Ruby Gem.
Anything I have missed (in the configuration of the Gluu server / in the settings of the Ruby Gem).
I just find the solution for my problem. The setting "discovery" of the Gem must be turned on (by default, it is turned off).
I developed sso login with Keycloak and spring security adapter and all works fine.
But now I need to authenticate to my company's proxy all the requests to the Keycloak server, that stays out of my LAN.
I didn't find anything about this.
Please, may you give some suggestions?
Thanks
P.s. I am using Keycloak version 1.7.0-Final
we have formsauthentication using Machine keys if it is to be hosted on web farm
How can I host authorization server (say WebAPI) in web farm which will produce same bearer token ?
Do I need to setup same Machine Key configuration on all servers?
Do I need to setup same Machine Key configuration on all servers?
If you're using the OAuth2 authorization server that is part of OWIN/Katana (OAuthAuthorizationServerMiddleware), yes.