JOSSO is an open source Identity and Access Management (IAM) platform for rapid and standards-based Cloud-scale Single Sign-On, web services security, strong authentication and provisioning.
Identity and Access Management is widely considered to be a highly technical domain, with an implementation that’s out of reach for most people. The process of setting up a system for identity and access management has a well-earned reputation for technical difficulty, inconvenience, and errors; all in pursuit of an end product that most users dislike and avoid.
Commercial identity and access management packages offer web-based facilities to set up their products; but without an intimate knowledge of the product’s inner structure, the overall set up and roll-out experience is tedious and error-prone.
JOSSO incorporates a visual modeling user experience to enable ease of use, which translates to productivity. You can get on board with implementing identity-centric use-cases, significantly accelerating time-to-value for streamlining IAM rollouts.
Identity and access management systems like JOSSO have many moving pieces. The product alone will not prove to be very useful while it's not integrated with the underlying IT ecosystem: target systems, directories and other infrastructure pieces.
In order to make sure that you can try JOSSO yourself, without having to perform manual and error-prone tasks, we've made available a fully working virtual machine. This will also keep the host environment safe from any changes that might be required at the infrastructure level (such as setting up DNS servers).
Within the Vagrant virtual machine, we're using Docker containers to host the components of the sandbox deployment. This closely simulates an IT ecosystem, yet avoids the overhead involved in using multiple virtual machines in order to deliver additional isolation. For instance, the JOSSO server, the domain name server, and the two tomcat web containers all live in separate containers. This also provides the flexibility of rolling out additional infrastructure components such as a directory server or an application server, by just pulling and running the corresponding docker container.
Finally, Docker Compose is used for orchestrating containers, namely how containers are launched and their configuration.
Vagrant is a multi-platform command line tool for creating lightweight, reproducible and portable virtual environments. Vagrant acts as a glue layer between different virtualization solutions (software, hardware PaaS and IaaS) and different configuration management utilities (Puppet, Chef, etc.).
Docker is an open source framework for developing, distributing and deploying so-called "Containers", middle ground between virtual machines and process.
It allows processes to be running on the same kernel as system processes, yet it uses separate runtime (include basic things like libc). It basically allows you to run centos on ubuntu or (via Virtual Box) on your Mac and Windows installation.
These pages show how to take advantage of both Vagrant and Docker sandboxing capabilities to do a number of JOSSO related tasks, including installation and testing basic features.
These instructions are not meant to be a full-blown guide to Vagrant or Docker. For that, we recommend looking at the official documentation on the corresponding websites.
Vagrant installation packages are available for OS X, Windows and Linux (deb and rpm format). Installation is a simple “Next, Next, Next, Done” process and doesn’t require any special user interaction.
Since Vagrant is not a virtualization software by itself, it relies on 3rd party providers to accomplish virtualization. For this tutorial I’ll assume you have installed Oracle’s VirtualBox. VirtualBox is a free multi-platform virtualization software which is supported by Vagrant out of the box.
Before running the Vagrant box with the JOSSO Playground make sure to install the docker compose provisioner :
vagrant plugin install vagrant-docker-compose
Let us now set up a JOSSO-based IAM development environment in Vagrant with the following steps:
Create a directory where we will be creating the instance:
mkdir -p ~/Vagrant/josso-playground cd ~/Vagrant/josso-playground
Now we are required to initialize the Vagrant box where the JOSSO playground lives.
vagrant init atricore/josso-playground
This will create a VagrantFile which you may want to edit in case you wish to configure specific virtual machine parameters (e.g. networking).
Finally, launch the vagrant box by issuing the following command:
vagrant up --provider virtualbox
This may take several minutes depending on your bandwidth and the processing power of your workstation.
Once it's completed, connect to the vagrant box:
and start the desktop environment:
sudo startxfce4 &
This is required in order to launch a web browser for using the Atricore Console and example web application.
The example identity appliance encompasses three main entities, namely an Identity Provider (IdP) and two Service Providers (SP). The identity provider is responsible for determining the identity of users, typically through some form of authentication, and establishing a session for them. Conversely, the two service providers will trust authentication assertions made by the identity provider. Once authenticated, users will be able to navigate seamlessly from one service provider to the other without having to authenticate a second time.
The identity provider is using an internal repository - more specifically an identity vault - for storing user details. You're free to use different repository flavors such as directories and external databases. The identity provider is also using simple username and password authentication. Alternative mechanisms, potentially stronger, may be used instead. The identity provider is also exposing its services using SAML, therefore an external SAML service provider may be on-boarded.
Service providers are realized as JavaEE web applications hosted on Apache Tomcat. Both are exposed as SAML service providers, and therefore may be linked to any SAML-compliant identity provider.
Although the JOSSO server is running, its not configured yet. The playground box is bundled with an example configuration - known as an identity appliance - for testing web single sign-on with JavaEE applications.
In order to access the Atricore Console, open a web browser from the desktop environment of the box and hit the following url : http://demo_josso_1.josso.dev.docker:8081/atricore-console:
Access using 'admin' as the username and 'atricore' as the password.
Click on the 'Import' button and select the josso-quick-start-appliance.zip file located in the /home/vagrant/atricore-josso-playground/demo-josso-ce-2.4.2-javaee-tomcat folder.
Click on the 'Identity and Lifecycle Management' tab. Drag the imported identity appliance entry to the 'Staged' section. Then drag it to the 'Deployed' section and start it.
The Identity Appliance should be up and running now, and ready to serve requests.
Both JavaEE web applications are configured to let in only users that are part of the 'role1' group.
Therefore, in order to manage users and their entitlements, switch to the 'Account and Entitlement Management' panel. Click on the 'Create Group' button and enter 'role1' as the group name.
Create an example user identified as 'jdoe'. Enter the user details.
Press on the 'Groups' tab and drag the 'role1' entry to the 'Member Of' column.
Press on the 'Password' tab and fill in the password field. Make sure to remember it as you'll need it to access the configured applications.
The first usage scenario we're going to test is successfully accessing a protected resource on the first JavaEE application by authenticating with the identity provider using a unique identifier. The second use-case encompasses accessing a protected resource within the second JavaEE application without having to re-authenticate. This is typically known as single sign-on (SSO).
Make sure to use the Firefox browser from within the virtual machine hosting the JOSSO playground.
Open the following URL in the browser: (http://demo_tomcat1_1.josso.dev.docker:8080/partnerapp/protected) .
You should be redirected to the identity provider for authenticating. Enter the username and password for the user you've provisioned earlier identified as 'jdoe'.
You should be able to access the protected resource and view the details of the user.
Open the following URL in the browser : (http://demo_tomcat2_1.josso.dev.docker:8080/partnerapp/protected) .
You should be redirected to the identity provider and then be able to access the protected resource without authenticating a second time.