Previously I have described how to install the DAS properly. Today’s entry is all about using the Certificate authentication module in a deployment where you have a DAS instance. So here are the steps required to make this work:
- Follow the DAS install guide, but with the only difference being that you install the DAS on a HTTPS URL (OpenAM can keep running on HTTP). Since you are now using HTTPS, you need to make sure that the OpenAM server trusts the DAS’s certificate, otherwise OpenAM won’t be able to send notifications to the DAS, which could result in strange situations when a given session remains valid for a short period of time even though the user has logged out on a different DAS instance.
- Go to Access Control – realm – Authentication page and Add a new Module Instance called cert with type Certificate
- Open the Certificate module configuration, and change the followings:
- Set the LDAP Server Authentication User/Password to correct values
- For evaluation purposes set the Trusted Remote Hosts to “all”
- Generate a new self signed certificate by following this guide, but make sure that in the CSR you set the CN to “demo”.
- Create PKCS#12 keystore for the freshly generated private key and certificate:
openssl pkcs12 -export -inkey server.key.org -in server.crt -out server.p12
- Install the PKCS#12 keystore in your browser (Guide for Firefox)
- Enable Client Authentication on the DAS’s container. For example on GlassFish 3.1.2 Admin Console you would have to go to Configurations – server-config – HTTP service – Http Listeners – http-listener-2 then open the SSL tab and check the Client Authentication option.
- Install the public certificate into the container’s truststore, so the container will actually trust your certificate:
keytool -import -keystore glassfish3/glassfish/domains/domain2/config/cacerts.jks -file server.crt -alias mycert
You need to make sure that you install the certificate to the actually used truststore, some containers may use the JVM’s truststore instead having one on their own.
- On the DAS enable the Request/Response serialization by setting the following property in the ~/FAMDistAuth/*.properties file:
- Restart the DAS’s container
- Open /auth/UI/Login?module=cert and choose your certificate