gatein.sso.enabled=true
gatein.sso.callback.enabled=${gatein.sso.enabled}
gatein.sso.login.module.enabled=${gatein.sso.enabled}
gatein.sso.login.module.class=org.gatein.sso.agent.login.SAML2IntegrationLoginModule
gatein.sso.filter.login.sso.url=/@@portal.container.name@@/dologin
gatein.sso.filter.initiatelogin.enabled=false
gatein.sso.valve.enabled=true
gatein.sso.saml.config.file=$EXO_HOME/gatein/conf/saml2/picketlink-sp.xml
gatein.sso.idp.host=localhost
#Keycloak instance
gatein.sso.idp.url=http://${gatein.sso.idp.host}:8080/auth/realms/master/protocol/saml
# eXo platform login URL
gatein.sso.sp.url=http://localhost:8090/portal/dologin
# WARNING: This bundled keystore is only for testing purposes. You should generate and use your own keystore!
gatein.sso.picketlink.keystore=$EXO_HOME/gatein/conf/saml2/jbid_test_keystore.jks
gatein.sso.valve.class=org.gatein.sso.saml.plugin.valve.ServiceProviderAuthenticator
gatein.sso.filter.logout.enabled=false
gatein.sso.filter.initiatelogin.enabled=false
* Copy « jboss-security-spi-3.0.0.Final.jar » to $EXO_HOME/lib/
* Copy « sso-saml-plugin-5.2.2.jar » to $EXO_HOME/lib/ (For exo-saml 2.2.3 version, use « sso-saml-plugin-5.2.2.jar » )
** Edit the file $EXO_HOME/gatein/conf/saml2/picketlink-sp.xml
# Add the appropriate KeyStorePass, SigningKeyPass and SigningKeyAlias passwords.
This guide was made with:
eXo Platform: 5.2.2 / 5.2.3
Keycloak: 6.0.1 / 7.0.1
exo-saml: 2.2.2 / 2.2.3
Please share with us your experience in applying this tutorial to your own applications and contact us if you have any questions or issues.
SPOILER ALERT
* These steps will no longer be needed from eXo Platform 5.2.5 (being released soon).
** From eXo Platform 5.2.5, these properties will be set in exo.properties.
( Your e-mail address will not be published)