Skip to content

Ansible Playbook for a Shibboleth Resource Registry. Based on Jagger

Notifications You must be signed in to change notification settings

ubuntunet/eduID_ResourceRegistry

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

81 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Ansible Playbook for eduID Resource Registry using Jagger

Initial setup

After having run the playbook successfully for the first time, it is time to setup and configure the Resource Registry

  1. Make sure that the ansible variable "setup_enabled" is set to 'TRUE'. If this has not been the case, you need to enable setup and re-run the playbook.

  2. Open https://{fqdn}/setup in your browser and create your admin account

  3. Disable setup again:

setup_enabled: FALSE

Upgrades/Redployments

There is no need to enable setup as is being done with initial setups.

Make sure to go to https://{fqdn}/update/upgrade after any upgrades in order to make sure that any pending database upgrades are being run.

Create a certificate for the webserver and for metadata signing

For any productive webserver, we recommend using a certificate issued by a trusted CA. Let's Encrypt (https://letsencrypt.org/) is a very useful offering, as is the free Comodo certificates available through UbuntuNet Alliance. For testing and development, a self-signed certificate will do the job.

openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout roles/registry/files/{{ fqdn }}.key -out roles/registry/files/{{ fqdn }}.crt

For signing the metadata you don't need a trusted certificate, so just create one yourself.

openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout roles/registry/files/metadata-signer.key -out roles/registry/files/metadata-signer.crt

How to make secret variables really secret

Create a random vault password - If you haven't done so already

openssl rand -base64 32 > ~/.ansible_vault_pass

Copy, populate and encrypt the secrets file

cp group_vars/secrets.example group_vars/secrets
vi group_vars/secrets
ansible-vault encrypt group_vars/secrets --vault-password-file ~/.ansible_vault_pass

Run the Playbook

ansible-playbook -i [development|production] resource_registry.yml --vault-password-file ~/.ansible_vault_pass

Show the secret vars

ansible-vault view group_vars/secrets --vault-password-file ~/.ansible_vault_pass
``

About

Ansible Playbook for a Shibboleth Resource Registry. Based on Jagger

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages