I have found the reason for the 404, but do not know how to fix it. It seems the url is being rewritten and replacing the .js with .html in the following link.
<script src="/otrs-web/js/fckeditor-2.6.4.1/fckeditor.js"></script> to <script src="/otrs-web/js/fckeditor-2.6.4.1/fckeditor.html"></script> I have looked at the default rewrite rules but it is mostly greek. From: Woonsan Ko <[email protected]> To: Jetspeed Users List <[email protected]> Date: 08/19/2010 01:19 PM Subject: Re: SSO IFrame form authentication Regarding the additional hidden fields, can you append those in the SRC url like this? http://host.domainname.com:8090/ATGAdmin/login.jsp?hidden1=a&hidden2=b --- On Thu, 8/19/10, [email protected] <[email protected]> wrote: > From: [email protected] <[email protected]> > Subject: Re: SSO IFrame form authentication > To: "Jetspeed Users List" <[email protected]> > Date: Thursday, August 19, 2010, 6:41 PM > OK, finally got my simple case to > work. I was able to set my src to > customers.htm and my SSO url to login.htm and it works > great now. However, > this was a simple case and not the solution I need. I > am now trying to > login into a url which requires form auth with User & > Password fields, and > also has 3 or 4 hidden fields it is expecting. The > sso doc in the > deployment guide refers to sso.form.Args, but this doesn't > seem to work. > Should it, or is there another way to accomplish. The > net result is > reverse proxy is rendering my url but it doesn't log me > in. > > > > From: > Woonsan Ko <[email protected]> > To: > Jetspeed Users List <[email protected]> > Date: > 08/18/2010 05:28 PM > Subject: > Re: SSO IFrame form authentication > > > > Did you configure `emptySessionPath="true"' for the > Connector in > $CATALINA_HOME/conf/server.xml? > Because all the SSO credentials are shared via session > between the portlet > and > reverse proxy service servlet, the option above is > necessary. The option > name is > case-sensitive and tomcat must be restarted. (Sometimes, > you should check > if the > process is still running after trying to stop tomcat.) > Also, are you using j2-admin's reverse proxy service > servlet > (/j2-admin/rproxy > or ${contextPath}/rproxy) with j2-admin's > SSOReveseProxyIFramePortlet? > Session can be shared inside the same web application. > By the way, can you test it after refreshing the session? > I've just found > that > the SSO credentials information are initialized when > there's no existing > one in > the session. > And, when you right-click in the iframe, is the page > properly > reverse-proxied? > The page should be from /j2-admin/rproxy/.... Otherwise, > the reverse proxy > > configuration could be wrong. > > -Woonsan > > > ----- Original Message ---- > > From: "[email protected]" > <[email protected]> > > To: Jetspeed Users List <[email protected]> > > Sent: Wed, August 18, 2010 1:47:59 PM > > Subject: Re: SSO IFrame form authentication > > > > Well, that surprises me, as the SSO doc refers to an > sso.form.Action > > property. And this works fine in the sso > webcontent portlet in 2.2.0 I > > > successfully configured it to post my login form, > using sso.form.Action, > > > log me in, then navigate to the SRC url. Works > great, except > webcontent > > has problems rendering the page properly. Thats > why I want to use SSO > > IFrame. The makes no distinction between IFrame > and Webcontent > portlets > > as it relates to form based auth. At any rate, > I have went thru your > > previous responses, tried using login.htm in the > src, but I still never > > > get a post . It simply does a get on the > login.htm and renders the > page. > > I have been very careful to assure my SSO Admin > properties are synced > with > > my portlet properties, so it should map to a set > of credentials, but > they > > never get posted. The best I can do with > the proxy portlets is get it > to > > do basic auth, which of course will not work > with my target url. > > > > > > > > From: > > Woonsan Ko <[email protected]> > > To: > > Jetspeed Users List <[email protected]> > > Date: > > 08/18/2010 02:12 PM > > Subject: > > Re: SSO IFrame form authentication > > > > > > > > Unfortunately, the portlet or any other > SSO-related portlet does not > > provide > > different form auth URL from the navigating > URL. > > So, the SRC URL must be the form auth target URL. It's > up to the form > auth > > > > target URL to redirect to other contents. > > The SSOReverseProxyIFramePortlet is responsible > only for sending > > credentials > > information to the target form auth page with > specified parameter names > in > > POST > > method. > > This limitation is because it could be complicated if > it should manage > > some > > states in a general way to check if the target > site has authenticated > or > > not. > > On the other hand, it would be easier to add or > customize a form auth > > target > > page; it can do authentication, store some > session attributes and > redirect > > to > > other pages. > > SSOReverseProxyIFramePortlet remembers the last > visited page; so when > you > > visit > > the page back, it will remember the navigation states > during the > session. > > Also, you could choose basic authentication if you > don't want to add or > > > customize the form auth target page. > > > > Here are some details on SSO configurations. > > There are two places to configure SSO configs. > > Firstly, the system administrator should register SSO > SITEs in > j2-admin's > > SSO > > Admin portlet. [1] > > Secondly, each user should register the SSO > credentials information in > > my-account.psml which can be navigated by a link > in the login portlet > > after > > authenticated. > > Thirdly, SSOReverseProxyIFramePortlet retrieves > the SSO SITE > information > > and the > > user's SSO credentials information, determining those > from the SRC url. > > > > In your example, you need to register an SSO SITE with > > > http://host.domainname.com:8090/ATGAdmin/ > or > > http://host.domainname.com:8090/ > > with proper authentication mechanism. > > If the SSO SITE needs form authentication, you should > provide proper > form > > auth > > parameters for username and password. > > When you visit a portal page including the sso > reverse proxy iframe > > portlet, the > > portlet will find the best matched SSO SITE from the > current navigation > > url. > > So, if the current proxied url > > is http://host.domainname.com:8090/ATGAdmin/login.jsp, > then the portlet > > > will > > retrieve the SSO SITE and credentials information for > the user. > > If it is form-auth for the SSO SITE, the portlet > will send the > credentials > > > > information with the specified parameter names in POST > method to the > > target form > > auth page. > > > > [1] > > http://portals.apache.org/jetspeed-2/adminguide/sso.html#SSO_Management > > > > HTH, > > > > Woonsan > > > > > > ----- Original Message ---- > > > From: "[email protected]" > <[email protected]> > > > To: Jetspeed Users List <[email protected]> > > > Sent: Wed, August 18, 2010 11:37:23 AM > > > Subject: Re: SSO IFrame form > authentication > > > > > > Thanks for the much needed > documentaton. However, I still can't seem > to > > > > > tie the SSO configuration to the > portlet. I can use the SSO Reverse > > Proxy > > > portlet to render the remote content, but I > do not see how to get the > > > > portlet to preemptively log into the > site. My src is > > > http://host.domainname.com:8090/ATGAdmin/customers.htm, > however, SSO > > > should be logging into > > http://host.domainname.com:8090/ATGAdmin/login.htm > > > I don't see how the SSO config knows that, and in > my case, it > certainly > > > does not do it. To net it out, I can get > the SSO portlet to render > the > > > site, but the login never happens. > > > > > > > > > > > > From: > > > Woonsan Ko <[email protected]> > > > To: > > > Jetspeed Users List <[email protected]> > > > Date: > > > 08/18/2010 12:28 PM > > > Subject: > > > Re: SSO IFrame form authentication > > > > > > > > > > > > Hi, > > > > > > For the preferences of the portlet, you can > refer to this > > documentation: > > > http://portals.apache.org/applications/webcontent/index.html > > > > > > For URL related stuffs, there are > three: SRC, PROXYREMOTEURL and > > > PROXYLOCALPATH. > > > The SRC preference is the same as the > default IFrame portlet. > > > The PROXYREMOTEURL preference is for > configuring the remote proxy > target > > > > > url > > > base path. > > > The PROXYLOCALPATH preference is for > configuring the local proxy > pass > > base > > > path. > > > So, for example, if SRC is > http://www.yourcompany.com/foo/bar/test.html > > > > > and your > > > reverse proxy service (servlet) is > configured to map > > /j2-admin/rproxy/foo/ > > > to > > > http://www.yourcompany.com/foo/, > then PROXYREMOTEURL should be set > > > to http://www.yourcompany.com/foo/ and > PROXYLOCALPATH should be set > > > to /j2-admin/rproxy/foo/ or > $[contextPath}/rproxy/foo/. > > > Also, please see the following > documentation on how to configure > > reverse > > > proxy > > > service: > > > http://portals.apache.org/applications/webcontent/rproxy.html > > > > > > Regards, > > > > > > Woonsan > > > > > > > > > ----- Original Message ---- > > > > From: "[email protected]" > <[email protected]> > > > > To: Jetspeed Users List <[email protected]> > > > > Sent: Wed, August 18, 2010 > 7:22:38 AM > > > > Subject: Re: SSO IFrame form > authentication > > > > > > > > I was able to successfully get > form-based auth to work with your > > example > > > > > > > scenario, however, my own test case > does not. I still simply go > > > directly > > > > to the login screen. I'm > sure it has to do with the > proxyremoteurl > > and > > > > > > > proxylocalpath args, but I > have not seen any detailed doc on how > > they > > > > work. > > > > > > > > > > > > > > > > From: > > > > David Sean Taylor <[email protected]> > > > > To: > > > > Jetspeed Users List <[email protected]> > > > > Date: > > > > 08/17/2010 07:19 PM > > > > Subject: > > > > Re: SSO IFrame form authentication > > > > > > > > > > > > > > > > On Tue, Aug 17, 2010 at > 1:40 PM, <[email protected]> > > wrote: > > > > > How did your testing go? I > compared SSO Webcontent (which > works, > > > sort > > > > of) > > > > > to SSO IFrame classes and I > see a method for preemptive login > in > > the > > > > > webcontent class but no reference > at all in the SSO IFrame > class. > > > Does > > > > > this just mean it is being > done differently, or is something > amiss > > in > > > > > > > the > > > > > SSO IFrame class? > > > > > > > > There are two SSOIFrame classes: > > > > > > > > 1. SSOIFramePortlet > > > > 2. > SSOReverseProxyIFramePortlet > > > > > > > > Suggest using the second > one, SSOReverseProxyIFramePortlet as it > > gives > > > > you features not available in > the older SSOIFramePortlet such as > > > > auto-resizing and form-based > authentication (what you are after) > > > > > > > > I tested with > SSOReverseProxyIFramePortlet and it worked in the > > > > example that comes with > Jetspeed, but it takes a little bit of > > > > configuration. > > > > > > > > First, ensure your Tomcat will need > this attribute set in the > > > > <Connector> element > of server.xml: > > > > > > > > emptySessionPath="true" > > > > > > > > more detail here: > > > > > > > > http://portals.apache.org/applications/webcontent/index.html > > > > > > > > If you had to change server.xml > setting, then restart your server > > > > > > > > I took these steps to verify SSO > with the example form-based > login > > > > that comes with Jetspeed: > > > > > > > > 1. login as admin > > > > 2. navigate to the Jetspeed > Administration space, SSO Management > > page, > > > > or just go here: > > > > > > > > http://localhost:8080/jetspeed/ui/Administrative/sso-admin.psml > > > > > > > > Add a new Site with following > parameters: > > > > > > > > Site Name: Form Example > > > > Site URL: http://localhost:8080/j2-admin/examples/formauth.jsp > > > > Field name for User ID: > user > > > > Field name For Password value: pass > > > > > > > > Press Save > > > > > > > > Add a new credential for this > site in the portlet on the right > side > > > > (SSO Details): > > > > > > > > > Portal Principal: admin > > > > Remote Principal: admin > > > > Remote Credential: admin > > > > > > > > Press Add > > > > > > > > You can verify that the > remote credential was added for the > admin > > > > user by going here: > > > > > > > > http://localhost:8080/jetspeed/ui/my-account.psml > > > > > > > > see the portlet on the > right "SSO Change Passwords", a remote > site > > > > entry should be there named > "Form Example" > > > > > > > > Next, you can use the Toolbox to > find the Reverse Proxy Iframe > > Portlet > > > > by searching on "iframe" > and then selecting it from there and > adding > > > > to a page. To make things > simple, I just added a page and then > added > > > > the Reverse Proxy Iframe Portlet > there. At first this portlet > seems > > to > > > > want to use Basic > Authentication, so just hit cancel when > challenged. > > > > I then switched to edit mode > (pencil icon), and entered the > following > > > > preferences: > > > > > > > > TITLE: My SSO Test > > > > SRC: http://localhost:$ > > {serverPort}${contextPath}/examples/formauth.jsp > > > > > > > > Press Save > > > > > > > > You should see in your portlet > content something like: > > > > > > > > "Hello, admin. You have been > authorized by form-based > authentication > > > > > !!!" > > > > > > > > Give that a try and see if it > works. Then, move on to your > specific > > > > IFrame source and let us know > how it goes... > > > > > > > > > --------------------------------------------------------------------- > > > > To unsubscribe, e-mail: > [email protected] > > > > For additional commands, > e-mail: > > [email protected] > > > > > > > > > > > > -- > > > > This message has been scanned > for viruses and > > > > dangerous content by > MailScanner, and is > > > > believed to be > clean (mailgw2:E659D1E6FC.D1395). > > > > > > > > > > > > > > > > > > > > This communication and any attachments > are confidential, protected > > > by > > > > Communications Privacy Act 18 > USCS § 2510, solely for the use of > the > > > > > > intended recipient, and may > contain legally privileged material. > If > > you > > > > > > > are not the intended recipient, > please return or destroy it > > > immediately. > > > > Thank you. > > > > > > > > > > > > > > > > --------------------------------------------------------------------- > > > To unsubscribe, e-mail: [email protected] > > > For additional commands, e-mail: > [email protected] > > > > > > > > > -- > > > This message has been scanned for > viruses and > > > dangerous content by MailScanner, and is > > > believed to be clean > (mailgw2:8B67A1E701.EB059). > > > > > > > > > > > > > > > This communication and any attachments are > confidential, protected > by > > > Communications Privacy Act 18 USCS § 2510, > solely for the use of the > > > > intended recipient, and may contain > legally privileged material. If > you > > > > > are not the intended recipient, > please return or destroy it > > immediately. > > > Thank you. > > > > > > > > > > > --------------------------------------------------------------------- > > To unsubscribe, e-mail: [email protected] > > For additional commands, e-mail: [email protected] > > > > > > -- > > This message has been scanned for viruses and > > dangerous content by MailScanner, and is > > believed to be clean > (mailgw2:AB8841E700.50A86). > > > > > > > > > > This communication and any attachments are > confidential, protected by > > Communications Privacy Act 18 USCS § 2510, > solely for the use of the > > intended recipient, and may contain legally > privileged material. If you > > > are not the intended recipient, please return or > destroy it > immediately. > > Thank you. > > > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [email protected] > For additional commands, e-mail: [email protected] > > > -- > This message has been scanned for viruses and > dangerous content by MailScanner, and is > believed to be clean (mailgw2:C70BC1E6FE.B6E38). > > > > > This communication and any attachments are confidential, > protected by > Communications Privacy Act 18 USCS § 2510, solely for the > use of the > intended recipient, and may contain legally privileged > material. If you > are not the intended recipient, please return or destroy it > immediately. > Thank you. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected] -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean (mailgw2:99F5A1E6FF.2A7BF). This communication and any attachments are confidential, protected by Communications Privacy Act 18 USCS § 2510, solely for the use of the intended recipient, and may contain legally privileged material. If you are not the intended recipient, please return or destroy it immediately. Thank you.
