Author: dimuthul
Date: Sun Feb 17 21:57:51 2008
New Revision: 13835
Log:
Adding the relying party quick start guide.
Added:
trunk/solutions/identity/modules/documentation/src/site/xdoc/rp_quickstart.xml
Added:
trunk/solutions/identity/modules/documentation/src/site/xdoc/rp_quickstart.xml
==============================================================================
--- (empty file)
+++
trunk/solutions/identity/modules/documentation/src/site/xdoc/rp_quickstart.xml
Sun Feb 17 21:57:51 2008
@@ -0,0 +1,111 @@
+<!--
+ ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com)
+ ~
+ ~ Licensed under the Apache License, Version 2.0 (the "License");
+ ~ you may not use this file except in compliance with the License.
+ ~ You may obtain a copy of the License at
+ ~
+ ~ http://www.apache.org/licenses/LICENSE-2.0
+ ~
+ ~ Unless required by applicable law or agreed to in writing, software
+ ~ distributed under the License is distributed on an "AS IS" BASIS,
+ ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ ~ See the License for the specific language governing permissions and
+ ~ limitations under the License.
+ -->
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
+ "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head>
+</head>
+<body>
+<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@ : Relying party in minutes - A
pre-configured login</h1>
+
+<h2>Introduction</h2>
+This is a preconfigured implementation of the Identity Login for J2EE web
applications. For more information please refer the Relying party developer
guide.
+
+<h2>Configuration Steps</h2>
+
+<p></p>
+<h3>Step 1 : Add the servlet filter to you application and setup the
keystore</h3>
+
+<p>Include the following entry in the web.xml file of the application:</p>
+
+<pre><![CDATA[
+
+ <filter>
+ <filter-name>TokenValidator</filter-name>
+
<filter-class>org.wso2.solutions.identity.relyingparty.servletfilter.RelyingPartyFilter</filter-class>
+ <init-param>
+ <param-name> ................ </param-name>
+ <param-value> ............... </param-value>
+ </init-param>
+ <init-param>
+ ......................
+ </init-param>
+ ......................
+ ......................
+ </filter>
+
+ <filter-mapping>
+ <filter-name>TokenValidator</filter-name>
+ <url-pattern>/*</url-pattern>
+ </filter-mapping>
+]]></pre>
+<br/>
+<br/>
+<strong>Add the keystore containing the private key to the web
application.</strong>
+<p>Create a directory called "keys" directly inside the war directory.
Download the keystore from <a href="8888">here</a> and add it into it.</p>
+
+<h3>Step 2 : Add the information card login page</h3>
+<br/>
+The user loing page must contain a form with an <strong>object</strong> tag as
shown below:
+
+<pre><![CDATA[
+ <form name="frm" id="frm" method="post" action="InfoCardLogin.action">
+ <input type="hidden" name="InfoCardSignin" value="Log in"
/><br/>
+ <OBJECT type="application/x-informationCard" name="xmlToken">
+ <PARAM Name="tokenType"
+
Value="urn:oasis:names:tc:SAML:1.0:assertion">
+ <PARAM Name="requiredClaims"
+
Value="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier">
+ <PARAM Name="issuer"
value="http://schemas.xmlsoap.org/ws/2005/05/identity/issuer/self">
+ </OBJECT>
+ </form>
+]]></pre>
+
+<p>The <strong>object</strong> tag here is the standard information card
object as
+defined <a
href="http://www.identityblog.com/wp-content/resources/profile/InfoCard-Profile-v1-Web-Integration.pdf">
+here</a>.</p>
+
+<p><i>It is important that you include the hidden field called
"InfoCardSignin" with
+the value "Log in". The filter will process the HTTP POST request to extract
+the token sent when this request parameter is available.</i></p>
+
+<br/>
+<br/>
+<h3>Step 3 : Add the required jars to your classpath.</h3>
+
+<p>Ant script available <a href="8888">here</a> will create a directory named
"required-lib" and copy all the required jar files into it.
+Download the ant script and copy it to the identity distribution. Then run the
script by typing ant create-required-lib</p>
+
+<h3>Step 4 : Obtain the information in the verified token and process</h3>
+
+<p>The results of token processing will be available as attributes in the
+ServletRequest object.</p>
+
+<p>To indicate whether token verification was successful or not there will be
an
+attribute by the name "<strong>org.wso2.solutions.identity.rp.State</strong>".
+On successful verification value of this attribute will be
+"<strong>success</strong>". Otherwise it will be
"<strong>failure</strong>".</p>
+
+<p>Initiate a user session in a web application using these values. <a
href="8888">Here</a> is such a page.</p>
+
+<p>The ServletRequest will also contain a set of attrbites by the names of
+the claims (the part of claim URI after the final "/")</p> with their values.
+
+
+
+
+</body>
+</html>
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev