AMConfig.properties revision f58c87ece2202b8f85310d8885c7e39a7f435c09
#
# DO NOT REMOVE COPYRIGHT NOTICES OR THIS HEADER.
#
# Copyright (c) 2012 ForgeRock Inc. All rights reserved.
#
# The contents of this file are subject to the terms
# of the Common Development and Distribution License
# (the License). You may not use this file except in
# compliance with the License.
#
# You can obtain a copy of the License at
# http://forgerock.org/license/CDDLv1.0.html
# See the License for the specific language governing
# permission and limitations under the License.
#
# When distributing Covered Code, include this CDDL
# Header Notice in each file and include the License file
# at http://forgerock.org/license/CDDLv1.0.html
# If applicable, add the following below the CDDL Header,
# with the fields enclosed by brackets [] replaced by
# your own identifying information:
# "Portions Copyrighted [2012] [ForgeRock Inc]"
#
# The following keys are used to configure the Debug service.
# Possible values for the key 'level' are: off | error | warning | message.
# The key 'directory' specifies the output directory where the debug files
# will be created.
# Trailing spaces are significant.
# Windows: Use forward slashes "/" separate directories, not backslash "\".
# Windows: Spaces in the file name are allowed for Windows.
#/
com.iplanet.services.debug.level=message
com.iplanet.services.debug.directory=/tmp/openamclient
#
# Server mode should be 'false'
#/
com.iplanet.am.serverMode=false
#
# Cache enable / disable properties
#/
com.iplanet.am.sdk.caching.enabled=false
com.sun.identity.idm.cache.enabled=false
com.sun.identity.sm.cache.enabled=false
#
# Logging status
#/
com.iplanet.am.logstatus=ACTIVE
#
# SDK package name
#/
com.iplanet.am.sdk.package=com.iplanet.am.sdk.remote
#
# Configure remote plugin classes for configuration (SMS)
#/
com.sun.identity.sm.sms_object_class_name=com.sun.identity.sm.jaxrpc.SMSJAXRPCObject
#
# Naming URL
#/
com.iplanet.am.naming.url=http://local.machine.com:18080/openam/namingservice
#
# Notification URL
#/
com.sun.identity.client.notification.url=@NOTIFICATION_URL@
#
# Security Credentails to read the configuration data
#/
com.sun.identity.agents.app.username=id=demo,ou=user,dc=openam,dc=forgerock,dc=org
#com.sun.identity.agents.app.username=demo
com.iplanet.am.service.password=changeit
# Needed ??? - commented out by warren
#com.iplanet.am.service.secret={SHA-1}6/x5EAd3cMg0D2PNLcoqwfEgRE8=
#
# Encryption key that will be used to encrypt and decypt
# data to communicate with the server.
# This key is needed to decrypt passwords stored
# in the SMS configuration.
#/
am.encryption.pwd=
#
# Encryption key that will be used to encrypt and decypt
# data used locally within the client.
#/
com.sun.identity.client.encryptionKey=@ENCRYPTION_KEY_LOCAL@
#
# Encryption: The key "com.iplanet.security.encryptor" specifies
# the encrypting class implementation.
# Available classes are:
# com.iplanet.services.util.JCEEncryption
# com.iplanet.services.util.JSSEncryption
#/
com.iplanet.security.encryptor=com.iplanet.services.util.JCEEncryption
#
# Property to enable/disable the notifications for am.sdk and IdRepo Caches.
# If set to "true" notifications are enabled and disabled if set to "false".
#/
com.sun.identity.idm.remote.notification.enabled=true
#
# Cache update time (in minutes) for am.sdk & IdRepo Caches
# if notification URL is not provided or if notifications are disabled.
# Note:
# 1. This property is applicable only if
# 'com.sun.identity.client.notification.url'
# is not provided or if 'com.sun.identity.idm.remote.notification.enabled'
# is set to 'false'.
# 2. If the polling time is set as 0, then polling is disabled.
#/
com.iplanet.am.sdk.remote.pollingTime=1
#
# Property to enable/disable the notifications for service management caches.
# If set to "true" notifications are enabled and disabled if set to "false".
#/
com.sun.identity.sm.notification.enabled=true
#
# Cache update time (in minutes) for service configutation data,
# if notification URL is not provided or if notifications are disabled.
# Note:
# 1. This property is applicable only if
# 'com.sun.identity.client.notification.url'
# is not provided or if 'com.sun.identity.sm.notification.enabled' is
# set to 'false'.
# 2. If the cache time is set as 0, then no cache updates will occur.
#/
com.sun.identity.sm.cacheTime=1
#
# Server protocol, host and port to be used by Client Services
#/
com.iplanet.am.server.protocol=http
com.iplanet.am.server.host=local.machine.com
com.iplanet.am.server.port=18080
com.iplanet.am.services.deploymentDescriptor=/openam
com.iplanet.am.console.protocol=@CONSOLE_PROTOCOL@
com.iplanet.am.console.host=@CONSOLE_HOST@
com.iplanet.am.console.port=@CONSOLE_PORT@
com.iplanet.am.console.deploymentDescriptor=@CONSOLE_DEPLOY_URI@
com.iplanet.am.console.remote=@CONSOLE_REMOTE@
com.iplanet.am.cookie.name=iPlanetDirectoryPro
# Changed to true by warren - Default is false
com.iplanet.am.cookie.encode=false
#
# Session related properties.
#/
com.iplanet.am.session.client.polling.enable=true
com.iplanet.am.session.client.polling.period=180
#
# Identify cert db directory path, prefix and password file
# to initialize JSS Socket Factory when Web Container is configured SSL
#/
com.iplanet.am.admin.cli.certdb.dir=@CONTAINER_CERTDB_DIR@
com.iplanet.am.admin.cli.certdb.prefix=@CONTAINER_CERTDB_PREFIX@
com.iplanet.am.admin.cli.certdb.passfile=@BASEDIR@/@PRODUCT_DIR@/config/.wtpass
#
# Identify property value for SSL ApprovalCallback / HostnameVerifier
# If com.iplanet.services.comm is configured as protocol handler
# and the checkSubjectAltName or resolveIPAddress feature is enabled,
# cert8.db and key3.db with the prefix value of
# com.iplanet.am.admin.cli.certdb.prefix will have to be created under
# the directory of com.iplanet.am.admin.cli.certdb.dir before server is
# restarted.
#/
com.iplanet.am.jssproxy.trustAllServerCerts=false
com.iplanet.am.jssproxy.checkSubjectAltName=false
com.iplanet.am.jssproxy.resolveIPAddress=false
com.iplanet.am.jssproxy.SSLTrustHostList=
#*************************************************************
# Policy Client parameters
#*************************************************************/
# Policy decision log parameters. Possible values for logging.level
# are NONE, ALLOW, DENY, BOTH, and DECISION#/
com.sun.identity.agents.server.log.file.name=amRemotePolicyLog
com.sun.identity.agents.logging.level=NONE
# Notification URL for updating cache#/
com.sun.identity.agents.notification.enabled=false
com.sun.identity.agents.notification.url=@NOTIFICATION_URL@
# Cache time in minutes#/
com.sun.identity.agents.polling.interval=0
# Information to cache. Possible value are "subtree" or "self"#/
com.sun.identity.policy.client.cacheMode=subtree
# Policy client clock skew value in seconds#/
com.sun.identity.policy.client.clockSkew=10
#
# Explicitly disable monitoring services in the client applications.
#
com.sun.identity.monitoring=off
#
# Specify if allow to use cached data for HttpURLConnection
#
com.sun.identity.urlconnection.useCache=false
#
# Property to enable or disable to use the metro implementation
# for ws-trust client.
#/
com.sun.identity.wss.trustclient.enablemetro=true
#*
# Property to use the SOAP version for ws-trust client. The containers
# that do not support JavaEE5 should use the version 1.1 but make sure that
# the STS service is compatible with 1.1 version.
#/
com.sun.identity.wss.soapversion=1.2
#
# Specify implementation class for
# com.sun.identity.plugin.configuration.ConfigurationInstance interface.
com.sun.identity.plugin.configuration.class=@CONFIGURATION_PROVIDER_CLASS@
#
# Specify implementation class for
# com.sun.identity.plugin.datastore.DataStoreProvider interface.
# This property defines the default datastore provider.
com.sun.identity.plugin.datastore.class.default=@DATASTORE_PROVIDER_CLASS@
#
# Specify implementation class for
# com.sun.identity.plugin.session.SessionProvider interface.
com.sun.identity.plugin.session.class=@SESSION_PROVIDER_CLASS@
#
# Specify XML signature provider class
com.sun.identity.saml.xmlsig.signatureprovider.class=com.sun.identity.saml.xmlsig.AMSignatureProvider
#
# Specify XML key provider implementation class
com.sun.identity.saml.xmlsig.keyprovider.class=com.sun.identity.saml.xmlsig.JKSKeyProvider
#
# Identify SAML XML signature keystore file, keystore password file
# and key password file
# Commented by warren. Do we need this?
#com.sun.identity.saml.xmlsig.keystore=C:/proyectos/consultoria/Itecban/seguridad/pruebas/pkcs12/canalKeyStore.jks
#com.sun.identity.saml.xmlsig.storepass=C:/proyectos/consultoria/Itecban/seguridad/pruebas/pkcs12/.canalstorepass
#com.sun.identity.saml.xmlsig.keypass=C:/proyectos/consultoria/Itecban/seguridad/pruebas/pkcs12/.canalstorepass
#com.sun.identity.saml.xmlsig.certalias=canal
#
# Specify type of KeyStore used for saml xml signature. Default is JKS.
# com.sun.identity.saml.xmlsig.storetype=JKS
#
# Flag for checking the Certificate which is embedded in the
# KeyInfo against the certificates in the keystore (specified
# by the "com.sun.identity.saml.xmlsig.keystore" property).
# Possible values for the key are: on|off. If the flag is "on",
# the certification must be presented in the keystore for
# XML signature validation. If the flag is "off", skip
# the presence checking.
com.sun.identity.saml.checkcert=on
#
# XML cannonicalization algorithm. Used for SAML XML signature generation
# and verification. When not specified, or value is empty, default value
# will be used. The following is the list of supported algorithms:
# http://www.w3.org/2001/10/xml-exc-c14n# (default)
# http://www.w3.org/2001/10/xml-exc-c14n#WithComments
# http://www.w3.org/TR/2001/REC-xml-c14n-20010315
# http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments
com.sun.identity.saml.xmlsig.c14nMethod=http://www.w3.org/2001/10/xml-exc-c14n#
#
# XML signature algorithm. Used for SAML XML Signature generation and
# verification. When not specified, or value is empty, default value will be
# used. The following is the list of supported algorithms:
# http://www.w3.org/2000/09/xmldsig#rsa-sha1 (default)
# http://www.w3.org/2000/09/xmldsig#hmac-sha1
# http://www.w3.org/2000/09/xmldsig#dsa-sha1
# http://www.w3.org/2001/04/xmldsig-more#rsa-md5
# http://www.w3.org/2001/04/xmldsig-more#rsa-ripemd160
# http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
# http://www.w3.org/2001/04/xmldsig-more#rsa-sha384
# http://www.w3.org/2001/04/xmldsig-more#rsa-sha512
# http://www.w3.org/2001/04/xmldsig-more#hmac-md5
# http://www.w3.org/2001/04/xmldsig-more#hmac-ripemd160
# http://www.w3.org/2001/04/xmldsig-more#hmac-sha256
# http://www.w3.org/2001/04/xmldsig-more#hmac-sha384
# http://www.w3.org/2001/04/xmldsig-more#hmac-sha512
com.sun.identity.saml.xmlsig.xmlSigAlgorithm=
#
# XML transformation algorithm. Used for SAML XML signature generation
# and verification. When not specified, or value is empty, default value
# will be used. The following is the list of supported algorithms:
# http://www.w3.org/2001/10/xml-exc-c14n# (default)
# http://www.w3.org/2001/10/xml-exc-c14n#WithComments
# http://www.w3.org/TR/2001/REC-xml-c14n-20010315
# http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments
# http://www.w3.org/TR/1999/REC-xslt-19991116
# http://www.w3.org/2000/09/xmldsig#base64
# http://www.w3.org/TR/1999/REC-xpath-19991116
# http://www.w3.org/2000/09/xmldsig#enveloped-signature
# http://www.w3.org/TR/2001/WD-xptr-20010108
# http://www.w3.org/2002/04/xmldsig-filter2
# http://www.w3.org/2002/06/xmldsig-filter2
# http://www.nue.et-inf.uni-siegen.de/~geuer-pollmann/#xpathFilter
com.sun.identity.saml.xmlsig.transformAlg=http://www.w3.org/2001/10/xml-exc-c14n#
#
# SAML2 XML Encryption Provider Implementation class
com.sun.identity.saml2.xmlenc.EncryptionProvider=com.sun.identity.saml2.xmlenc.FMEncProvider
#
# SAML2 XML Signing Provider Implementation class.
com.sun.identity.saml2.xmlsig.SignatureProvider=com.sun.identity.saml2.xmlsig.FMSigProvider
#
# SAML2 XML Signing Certificate Validation.
com.sun.identity.saml2.crl.check=false
#
# SAML2 XML Signing Certificate Validation.
com.sun.identity.saml2.crl.check.ca=false
#
# Client ceritificate alias that will be used in SSL connection for Liberty
# SOAP Binding
com.sun.identity.liberty.ws.soap.certalias=
#
# If the message timestamp is before current timestamp by this amount
# (millisec), it is considered a stale message.
com.sun.identity.liberty.ws.soap.staleTimeLimit=300000
#
# All the messageID of a valid message will be stored in a cache with the it
# is received to avoid duplicate messages. If the current time minus the
# received time is greater than the above staleTimeLimit, it should be removed
# from the cache. The is property specify the interval(millisec) that a
# cleanup thread should check the cache and remove those messageID.
com.sun.identity.liberty.ws.soap.messageIDCacheCleanupInterval=60000
#
# Supported SOAP actors. Each actor must be seperated by '|'
com.sun.identity.liberty.ws.soap.supportedActors=http://schemas.xmlsoap.org/soap/actor/next
#
# Namespace prefix mapping used when marshalling a JAXB content tree to a
# DOM tree. The syntax is
# <prefix>=<namespace>|<prefix>=<namespace>|..........
com.sun.identity.liberty.ws.jaxb.namespacePrefixMappingList=S=http://schemas.xmlsoap.org/soap/envelope/|sb=urn:liberty:sb:2003-08|pp=urn:liberty:id-sis-pp:2003-08|ispp=http://www.sun.com/identity/liberty/pp|is=urn:liberty:is:2003-08
#
# JAXB package list used when constructing JAXBContext. Each package must be
# seperated by ':'.
com.sun.identity.liberty.ws.jaxb.packageList=
#
# Liberty ID-WSF security profile,
# com.sun.identity.liberty.ws.wsc.certalias specifies default certificate
# alias for issuing web service security token for this web service client
# com.sun.identity.liberty.ws.ta.certalias specifies certificate
# alias for trusted authority that will be used to sign SAML or SAML
# BEARER token of response message.
# com.sun.identity.liberty.ws.trustedca.certaliases specifies certificate
# aliases for trusted CA. SAML or SAML BEARER token of incoming request
# message needs to be signed by a trusted CA in this list. The syntax is
# <cert alias 1>[:<issuer 1>]|<cert alias 2>[:<issuer 2>]|.....
# For example, 'myalias1:myissuer1|myalias2|myalias3:myissuer3
# 'issuer' is used when the token doesn't have a KeyInfo inside the
# signature. The 'issuer' of the token needs to be in this list and the
# corresponding cert alias will be used to verify signature. If KeyInfo
# exists, the keystore needs to contain a cert alias that matches the
# KeyInfo and the cert alias needs to be in this list.
# com.sun.identity.liberty.ws.security.TokenProviderImpl specifies
# implementation for security token provider
com.sun.identity.liberty.ws.wsc.certalias=
com.sun.identity.liberty.ws.ta.certalias=
com.sun.identity.liberty.ws.trustedca.certaliases=
com.sun.identity.liberty.ws.security.TokenProviderImpl=com.sun.identity.liberty.ws.security.LibSecurityTokenProvider
#
# URL for WSPRedirectHandlerServlet to handle Liberty WSF WSP-resource owner
# interactions based on user agent redirects. This should be running in
# the same JVM where Liberty SP is running
com.sun.identity.liberty.interaction.wspRedirectHandler=http://local.machine.com:18080/openam/WSPRedirectHandler
#
# indicates whether WSC would participate in interaction
# valid values are interactIfNeeded | doNotInteract | doNotInteractForData
# default value:interactIfNeeded
# value used if an invalid value is specified:interactIfNeeded
com.sun.identity.liberty.interaction.wscSpecifiedInteractionChoice=interactIfNeeded
#
# indicates whether WSC would include userInteractionHeader
# valid values are yes|no (case ignored)
# default value:yes
# value used if no value is specified:yes
com.sun.identity.liberty.interaction.wscWillInlcudeUserInteractionHeader=yes
#
# indicates whether WSC would redirect user for interaction
# valid values are yes|no
# default value:yes
# value used if no value is specified:yes
com.sun.identity.liberty.interaction.wscWillRedirect=yes
#
# WSC's preference on the acceptable duration for interaction(in seconds)
# default value if the value is not specified or a non integer value is
# specified : 60
com.sun.identity.liberty.interaction.wscSpecifiedMaxInteractionTime=80
#
# indicates whether WSC would enforce that redirected to URL is https
# valid values are yes|no (case ignored)
# liberty specification require the value to be yes
# default value:yes
# value used if no value is specified:yes
com.sun.identity.liberty.interaction.wscWillEnforceHttpsCheck=no
#
# This property is used to determine the Liberty identity web services framework
# to be used when the framework can not determine from the in-bound message or
# from the resource offering when AM is acting as the WSC.
# The default version is 1.1, but the possible values are 1.0 or 1.1
# com.sun.identity.liberty.wsf.version=1.1
# Web Services Security Client Properties
# Login URL and Authentication web service URL for WSS Liberty use cases
com.sun.identity.loginurl=http://local.machine.com:18080/openam/UI/Login
com.sun.identity.liberty.authnsvc.url=http://local.machine.com:18080/openam/Liberty/authnsvc
# STS End User Token Plugin class
com.sun.identity.wss.sts.clientusertoken=com.sun.identity.wss.sts.STSClientUserToken
# WSS Provider Configuration Plugin class
com.sun.identity.wss.provider.config.plugin=com.sun.identity.wss.provider.plugins.AgentProvider
# WSS Authenticator Plugin Class
com.sun.identity.wss.security.authenticator=com.sun.identity.wss.security.handler.DefaultAuthenticator
com.sun.identity.jsr196.authenticated.user=AUTHENTICATED_USERS
org.forgerock.openam.oauth2.endpoint.authorize=http://local.machine.com:18080/openam/oauth2/authorize
org.forgerock.openam.oauth2.endpoint.access_token=http://local.machine.com:18080/openam/oauth2/access_token
org.forgerock.openam.oauth2.endpoint.tokeninfo=http://local.machine.com:18080/openam/oauth2/tokeninfo
org.forgerock.openam.oauth2.endpoint.redirection=http://jason.internal.forgerock.com/test
org.forgerock.openam.oauth2.client_id=agent
org.forgerock.openam.oauth2.client_secret=cangetin
org.forgerock.openam.oauth2.username=demo
org.forgerock.openam.oauth2.password=changeit