Common configuration
Configuration
Download and extract configuration files
Open the folder where you have installed Web
Rename the customer folder to customer_OLD. Result should look like below: \..\FortifiedID\web\customer_OLD
Download the following ZIP-file, use_case_dnp_externalidp_bankid.zip.
Unzip the file
Copy the customer_WEB folder to \..\FortifiedID\web\
Rename customer_WEB to customer, result should look like: \..\FortifiedID\web\customer
Update configuration to map your environment
Globals
In this section we will look at parts of the configuration and add/replace data for your environment. In this use case we are using the globals concept which is using variables to easily replace data specific to an environment or if a value is used in many places just update it in one place.
First of all, open the file customer/config/globals.json. Change according to the instructions below.
base_dir
base_dir is the top folder where data is located that you do not want to be overwritten by an upgrade. Update the base_dir folder to map your installation.
For Windows the value should be: "base_dir": "../customer"
For Docker, the value should be: "base_dir": ".",
host Set the host value to your DNS name entry, including https://.
http
Update the http information to map your environment. This is the port that Integrity Web will use to host the SAML IdP service. ! The recommendation is to always use SSL to encrypt the communication to Integrity Web.
keystore - https
Either you use the test certificate provided by us, if so you do not need to change anything. If you have a keystore then update the values below to point to your keystore.
Find in section: keystore
keystore - bankid
For connecting against BankID test environment, you don't need to do anything. For production connectivity, please use your BankID keystore and change the variables below to reflect that. Truststore changes will not be needed. Find in section: keystore
keystore - signing and encryption The keystore used for signing and encrypting SAML messages, is configured in the last part of the keystore section. Either you use the test certificate provided by us, if so you do not need to change anything. If you have a keystore then update the values below to point to your keystore.
saml You define the SAML2 metadata URLs in the SAML section. To connect to Skolfederation Trial, leave the skolfederation_metadata url unchanged. To connect to production, you can find the correct url here. Leave authenticating_idp_metadata, authenticating_idp_entityid and authenticating_idp_metadata_path unchanged for now, these will be changed in later step.
bankid environment bid_mode controls which BankID environment to connect to, test or production. Leave unchanged for test. Change to production for production connectivity.
Save the globals.json file.
XML metadata templates
Integrity web will act as a SAML IdP against DNP, and a SAML SP against the authenticating IDP. The metadata for the IdP and the SP will be used to establish trust.
The downloaded configuration contains the metadata templates needed. The DNS/host name must be changed to your environment.
Open customer/config/resources_internal/saml_templates/integrity_skolfed_idp_template.xml
Change to your hostname, by performing a search-replace: Search for: skolfed.integrity.local Replace with: <Enter your DNS name>
Change to your organization name. by performing a search-replace: Search for: Fortified ID Replace with: <Enter your organization name, such as Grevlinge Kommun>
Change to your organization url. by performing a search-replace: Search for: https://www.fortifiedid.se Replace with: <Enter your organization url, such as https://grevlinge.se>
Change to your email address. by performing a search-replace: Search for: skolfed@fortifiedid.se Replace with: <Enter your email, such as info@grevlinge.se>
Change/remove scope values (row 21-23). The values must match the suffix(es) of the eppn values used in your organization.
Save the file
Start the Integrity WEB service
Start the service and verify the start by looking through the server.log file.
Upload the IdP metadata to Skolfederationen
DNP trusts the Skolfederationen identity federation. Hence, the Integrity Web SAML IdP metadata needs to be uploaded to Skolfederationen.
Upload the IdP metadata to Skolfederationen
Fetch the metadata file of the IdP and upload it to the SP.
Open a browser and browse to: https://<YOUR_DNS>:<YOUR_PORT>/saml/metadata/integrity_skolfed_idp example: https://skolfed.integrity.local/saml/metadata/integrity_skolfed_idp
This will download the metadata XML-file for your IdP.
Upload the XML-file to Skolfederationen, by following these instructions.
Last updated