Introduction This tutorial describes the required steps to configure JOSSO 2 Server as a Windows OS service. Prerequisites JOSSO 2 already installed in Windows Oracle’s JDK Installer Administrator access to the Windows Server. Installing the Service Verify Java Install JOSSO Uses an OS service wrapper to start, that...

Introduction There are multiple alternatives when enabling High Availability in JOSSO. Some are more complex than others, and selecting which is the best for you will depend on your requirements. The main goal is to keep the identity services working even in the event of hardware or software failure in one of the JOSSO...

Built-in SSH Service JOSSO has its own built-in SSH service that you can use to access the server command line console. The same credentials that are used to access JOSSO. Connecting ot the server You can configure your SSH client with default options for your JOSSO connection by modifying your $HOME/.ssh/config file....

Manage server users and groups You can mange users either by using the web console, or using the command line. The server will create an admin user if it does not exist. (You can disable this behaviour). You can also add other users to the server. These can then be used when defining server connections along with the...

Introduction Every time you promote an identity appliance from one environment to the other, some tasks need to be performed due to the nature of some features like SSO protocols. In many organizations, this process must be automated and changes to the artifacts are not allowed. JOSSO 2 provides a set of tools aimed...

Monitoring is a key aspect of every day system administration. Through monitoring, administrators can obtain information about resource usage (cpu, memory, etc.) that allows them to better tune the solution and prevent potential issues. Besides monitoring basic resources, JOSSO 2 also provides usage statistics, like...

Auditing is a key security aspect of identity solutions. JOSSO’s auditing module provides a systematic way of collecting information related to events and activities that can be used to ensure conformance with internal and external policies. In JOSSO we call this information audit trails. Audit trails are generated all...

Upgrading from 2.4 This guide will help you upgrade from 2.4 to 2.5. NEW : Web console Help section points to JOSSO documentation NEW : Custom extension descriptor (see details bellow) FIX : SSH server does not re-generate server key on each startup FIX : Issue when importing some 2.4.x appliances using the...