Did you configure `emptySessionPath="true"' for the Connector in 
$CATALINA_HOME/conf/server.xml?
Because all the SSO credentials are shared via session between the portlet and 
reverse proxy service servlet, the option above is necessary. The option name 
is 
case-sensitive and tomcat must be restarted. (Sometimes, you should check if 
the 
process is still running after trying to stop tomcat.)
Also, are you using j2-admin's reverse proxy service servlet (/j2-admin/rproxy 
or ${contextPath}/rproxy) with j2-admin's SSOReveseProxyIFramePortlet?
Session can be shared inside the same web application.
By the way, can you test it after refreshing the session? I've just found that 
the SSO credentials information are initialized when there's no existing one in 
the session.
And, when you right-click in the iframe, is the page properly reverse-proxied? 
The page should be from /j2-admin/rproxy/.... Otherwise, the reverse proxy 
configuration could be wrong.

-Woonsan


----- Original Message ----
> From: "[email protected]" <[email protected]>
> To: Jetspeed Users List <[email protected]>
> Sent: Wed, August 18, 2010 1:47:59 PM
> Subject: Re: SSO IFrame form authentication
> 
> Well, that surprises me, as the SSO doc refers to an sso.form.Action 
> property.  And this works fine in the sso webcontent portlet in  2.2.0  I 
> successfully configured it to post my login form, using  sso.form.Action, 
> log me in, then navigate to the SRC url.  Works great,  except webcontent 
> has problems rendering the page properly.  Thats why  I want to use SSO 
> IFrame.  The makes no distinction between IFrame and  Webcontent portlets 
> as it relates to form based auth.  At any rate, I  have went thru your 
> previous responses, tried using login.htm in the src,  but I still never 
> get a post .  It simply does a get on the login.htm  and renders the page. 
> I have been very careful to assure my SSO Admin  properties are synced with 
> my portlet properties, so it should map to a set  of credentials, but they 
> never get posted.  The best I can do with the  proxy portlets is get it to 
> do basic auth, which of course will not work  with my target url.
> 
> 
> 
> From:
> Woonsan Ko <[email protected]>
> To:
> Jetspeed  Users List <[email protected]>
> Date:
> 08/18/2010  02:12 PM
> Subject:
> Re: SSO IFrame form  authentication
> 
> 
> 
> Unfortunately, the portlet or any other  SSO-related portlet does not 
> provide 
> different form auth URL from the  navigating URL.
> So, the SRC URL must be the form auth target URL. It's up to  the form auth 
> 
> target URL to redirect to other contents.
> The  SSOReverseProxyIFramePortlet is responsible only for sending 
> credentials 
> information to the target form auth page with specified parameter names in 
> POST 
> method.
> This limitation is because it could be complicated if it  should manage 
> some 
> states in a general way to check if the target site  has authenticated or 
> not.
> On the other hand, it would be easier to add or  customize a form auth 
> target 
> page; it can do authentication, store some  session attributes and redirect 
> to 
> other  pages.
> SSOReverseProxyIFramePortlet remembers the last visited page; so when  you 
> visit 
> the page back, it will remember the navigation states during  the session.
> Also, you could choose basic authentication if you don't want to  add or 
> customize the form auth target page.
> 
> Here are some details on  SSO configurations.
> There are two places to configure SSO  configs.
> Firstly, the system administrator should register SSO SITEs in  j2-admin's 
> SSO 
> Admin portlet. [1]
> Secondly, each user should register  the SSO credentials information in 
> my-account.psml which can be navigated by  a link in the login portlet 
> after 
> authenticated.
> Thirdly,  SSOReverseProxyIFramePortlet retrieves the SSO SITE information 
> and the 
> user's SSO credentials information, determining those from the SRC  url.
> 
> In your example, you need to register an SSO SITE with 
> http://host.domainname.com:8090/ATGAdmin/ or 
> http://host.domainname.com:8090/ 
> with proper authentication  mechanism.
> If the SSO SITE needs form authentication, you should provide  proper form 
> auth 
> parameters for username and password.
> When you visit  a portal page including the sso reverse proxy iframe 
> portlet, the 
> portlet will find the best matched SSO SITE from the current navigation 
> url.
> So, if the current proxied url 
> is  http://host.domainname.com:8090/ATGAdmin/login.jsp, then the portlet 
> will 
> retrieve the SSO SITE and credentials information for the user.
> If it is  form-auth for the SSO SITE, the portlet will send the credentials 
> 
> information with the specified parameter names in POST method to the 
> target form 
> auth page.
> 
> [1] 
> http://portals.apache.org/jetspeed-2/adminguide/sso.html#SSO_Management
> 
> HTH,
> 
> Woonsan
> 
> 
> -----  Original Message ----
> > From: "[email protected]" <[email protected]>
> >  To: Jetspeed Users List <[email protected]>
> >  Sent: Wed, August 18, 2010 11:37:23 AM
> > Subject: Re: SSO IFrame form  authentication
> > 
> > Thanks for the much needed documentaton.   However, I still can't seem to 
> 
> > tie the SSO configuration to the  portlet.  I can use the SSO Reverse 
> Proxy 
> > portlet to render  the remote content, but I do not see how to get the 
> > portlet to  preemptively log into the site.  My src is 
> >  http://host.domainname.com:8090/ATGAdmin/customers.htm, however, SSO 
> >  should be logging into 
> http://host.domainname.com:8090/ATGAdmin/login.htm 
> > I don't see how the SSO config knows that, and in my case, it certainly 
> > does not do it.  To net it out, I can get the SSO portlet to  render the 
> > site, but the login never happens.
> > 
> > 
> > 
> > From:
> > Woonsan Ko <[email protected]>
> > To:
> >  Jetspeed  Users List <[email protected]>
> >  Date:
> > 08/18/2010  12:28 PM
> > Subject:
> > Re: SSO IFrame  form  authentication
> > 
> > 
> > 
> > Hi,
> > 
> > For the preferences of the portlet, you  can refer to this 
> documentation:
> >  http://portals.apache.org/applications/webcontent/index.html
> > 
> >  For  URL related stuffs, there are three: SRC, PROXYREMOTEURL and 
> >  PROXYLOCALPATH.
> > The SRC preference is the same as the default  IFrame  portlet.
> > The PROXYREMOTEURL preference is for configuring  the remote proxy target 
> 
> > url 
> > base path.
> > The  PROXYLOCALPATH preference is for  configuring the local proxy pass 
> base 
> > path.
> > So, for example, if SRC is   http://www.yourcompany.com/foo/bar/test.html 
> 
> > and your 
> >  reverse proxy  service (servlet) is configured to map 
> /j2-admin/rproxy/foo/ 
> > to 
> > http://www.yourcompany.com/foo/,  then PROXYREMOTEURL should be set 
> > to http://www.yourcompany.com/foo/ and PROXYLOCALPATH should be set 
> >  to  /j2-admin/rproxy/foo/ or $[contextPath}/rproxy/foo/.
> > Also,  please see the  following documentation on how to configure 
> reverse 
> > proxy 
> > service:
> >  http://portals.apache.org/applications/webcontent/rproxy.html
> > 
> >  Regards,
> > 
> > Woonsan
> > 
> > 
> > -----  Original  Message ----
> > > From: "[email protected]" <[email protected]>
> >  >  To: Jetspeed Users List <[email protected]>
> >  >  Sent: Wed, August 18, 2010 7:22:38 AM
> > > Subject: Re: SSO  IFrame form  authentication
> > > 
> > > I was able to  successfully get form-based auth  to work with your 
> example 
> > 
> > > scenario, however, my own test case does  not.  I still  simply go 
> > directly 
> > > to the login screen.   I'm sure  it has to do with the  proxyremoteurl 
> and 
> > 
> > >   proxylocalpath args, but I have not seen any detailed doc  on how 
> they 
> > > work.
> > > 
> > > 
> > > 
> > >  From:
> > > David Sean  Taylor <[email protected]>
> >  >  To:
> > > Jetspeed  Users List <[email protected]>
> >  >  Date:
> > > 08/17/2010  07:19 PM
> > >  Subject:
> > > Re: SSO IFrame  form authentication
> > > 
> > > 
> > > 
> > > On  Tue, Aug 17,  2010 at  1:40 PM,  <[email protected]>  wrote:
> > > > How did your testing go?  I compared SSO  Webcontent  (which  works, 
> > sort 
> > > of)
> >  > > to SSO IFrame classes and  I see a method for  preemptive  login in 
> the
> > > > webcontent class  but no reference at  all in the  SSO IFrame class. 
> > Does
> > > >  this  just mean it is being done  differently, or is something amiss 
> in 
> > 
> > > the
> > > > SSO IFrame  class?
> >  > 
> > > There are  two SSOIFrame classes:
> > > 
> >  > 1. SSOIFramePortlet
> > > 2.    SSOReverseProxyIFramePortlet
> > > 
> > > Suggest using the  second  one,  SSOReverseProxyIFramePortlet as it 
> gives
> >  > you features not  available in the  older SSOIFramePortlet such  as
> > > auto-resizing and  form-based authentication  (what  you are after)
> > > 
> > > I tested  with  SSOReverseProxyIFramePortlet and it  worked in the
> > >  example  that comes with Jetspeed, but it takes a little bit   of
> > >  configuration.
> > > 
> > > First, ensure  your Tomcat will need this  attribute  set in the
> > >  <Connector> element of   server.xml:
> > > 
> > >  emptySessionPath="true"
> > > 
> > > more  detail   here:
> > > 
> > > http://portals.apache.org/applications/webcontent/index.html
> > > 
> > > If  you had to change server.xml setting, then restart  your  server
> > > 
> > > I took  these steps to verify  SSO with the example  form-based login
> > > that comes with   Jetspeed:
> > > 
> > > 1.  login as admin
> > > 2.  navigate to the Jetspeed Administration  space,  SSO Management 
> page,
> > > or just go  here:
> > > 
> > >   http://localhost:8080/jetspeed/ui/Administrative/sso-admin.psml
> > > 
> > >  Add  a new Site with following parameters:
> > > 
> > > Site Name: Form  Example
> > > Site  URL:   http://localhost:8080/j2-admin/examples/formauth.jsp
> > > Field name  for  User  ID: user
> > > Field name For Password value:  pass
> > > 
> > >  Press Save
> > > 
> > > Add  a  new credential for this site in the  portlet on the right  side
> > > (SSO  Details):
> > > 
> > > Portal   Principal:   admin
> > > Remote Principal:   admin
> > >  Remote  Credential: admin
> > > 
> > > Press Add
> > > 
> > > You  can  verify  that the remote credential was  added for the admin
> > > user by  going  here:
> > > 
> > >  http://localhost:8080/jetspeed/ui/my-account.psml
> >  > 
> > > see the   portlet on the right "SSO Change Passwords", a  remote site
> > > entry should  be  there named "Form  Example"
> > > 
> > > Next, you can use the  Toolbox to find  the  Reverse Proxy Iframe 
> Portlet
> > > by searching on   "iframe" and then selecting it  from there and adding
> > > to a  page. To  make things simple, I just added a page  and then  added
> > > the Reverse  Proxy Iframe Portlet there. At first this  portlet  seems 
> to
> > > want to  use Basic Authentication,  so just hit cancel when challenged.
> > > I  then switched to edit  mode (pencil icon), and entered the following
> > > preferences:
> >  > 
> > > TITLE: My SSO Test
> > >  SRC:    http://localhost:$
> {serverPort}${contextPath}/examples/formauth.jsp
> >  > 
> > > Press  Save
> > > 
> > > You should see in  your portlet  content something  like:
> > > 
> > >  "Hello, admin. You have been  authorized by form-based  authentication 
> 
> > !!!"
> > > 
> > > Give  that a try and see if it  works. Then, move on to  your specific
> > >  IFrame source and  let us know how it  goes...
> > > 
> > >   ---------------------------------------------------------------------
> >  >  To  unsubscribe, e-mail: [email protected]
> >  >  For  additional commands, e-mail: 
> [email protected]
> >  > 
> > > 
> > > --
> > > This  message has been  scanned for viruses  and
> > > dangerous content by  MailScanner,  and is
> > > believed to  be clean   (mailgw2:E659D1E6FC.D1395).
> > > 
> > > 
> > > 
> >  > 
> > > This communication and any  attachments are  confidential,  protected 
> by 
> > > Communications Privacy Act  18  USCS § 2510, solely  for the use of the 
> 
> > > intended  recipient, and may contain  legally  privileged material. If 
> you 
> > 
> > > are not the intended recipient,  please  return  or destroy it 
> > immediately. 
> > > Thank  you.
> > 
> > 
> > 
> > 
> >  ---------------------------------------------------------------------
> >  To  unsubscribe, e-mail: [email protected]
> >  For  additional commands, e-mail: [email protected]
> > 
> > 
> > --
> > This  message has been scanned for viruses  and
> > dangerous content by MailScanner,  and is
> > believed to  be clean  (mailgw2:8B67A1E701.EB059).
> > 
> > 
> > 
> > 
> > This communication and any  attachments are confidential,  protected by 
> > Communications Privacy Act 18  USCS § 2510, solely  for the use of the 
> > intended recipient, and may contain  legally  privileged material. If you 
> 
> > are not the intended recipient,  please  return or destroy it 
> immediately. 
> > Thank  you.
> 
> 
> 
> 
> ---------------------------------------------------------------------
> To  unsubscribe, e-mail: [email protected]
> For  additional commands, e-mail: [email protected]
> 
> 
> --
> This  message has been scanned for viruses and
> dangerous content by MailScanner,  and is
> believed to be clean  (mailgw2:AB8841E700.50A86).
> 
> 
> 
> 
> This communication and any  attachments are confidential, protected by 
> Communications Privacy Act 18  USCS § 2510, solely for the use of the 
> intended recipient, and may contain  legally privileged material. If you 
> are not the intended recipient, please  return or destroy it immediately. 
> Thank you.




---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to