98N/A#
98N/A# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
98N/A#
98N/A# Copyright (c) 2006 Sun Microsystems Inc. All Rights Reserved
908N/A#
733N/A# The contents of this file are subject to the terms
98N/A# of the Common Development and Distribution License
98N/A# (the License). You may not use this file except in
919N/A# compliance with the License.
919N/A#
919N/A# You can obtain a copy of the License at
919N/A# https://opensso.dev.java.net/public/CDDLv1.0.html or
919N/A# opensso/legal/CDDLv1.0.txt
919N/A# See the License for the specific language governing
919N/A# permission and limitations under the License.
919N/A#
919N/A# When distributing Covered Code, include this CDDL
919N/A# Header Notice in each file and include the License file
919N/A# at opensso/legal/CDDLv1.0.txt.
919N/A# If applicable, add the following below the CDDL Header,
919N/A# with the fields enclosed by brackets [] replaced by
919N/A# your own identifying information:
919N/A# "Portions Copyrighted [year] [name of copyright owner]"
919N/A#
919N/A# $Id: FederationConfig.properties,v 1.21 2010/01/08 22:41:28 exu Exp $
98N/A#
98N/A# Portions Copyright 2016 ForgeRock AS.
98N/A
235N/A# If a component wants to use a different datastore provider than the
156N/A# default one defined above, it can define a property like follows:
156N/A# com.sun.identity.plugin.datastore.class.<componentName>=<provider class>
156N/A
156N/A# com.sun.identity.plugin.configuration.class specifies implementation for
98N/A# com.sun.identity.plugin.configuration.ConfigurationInstance interface.
98N/Acom.sun.identity.plugin.configuration.class=com.sun.identity.plugin.configuration.impl.FedletConfigurationImpl
98N/A
98N/A
493N/A# Specifies implementation for
493N/A# com.sun.identity.plugin.datastore.DataStoreProvider interface.
98N/A# This property defines the default datastore provider.
911N/Acom.sun.identity.plugin.datastore.class.default=com.sun.identity.plugin.datastore.impl.FedletDataStoreProvider
913N/A
913N/A# com.sun.identity.plugin.log.class specifies implementation for
911N/A# com.sun.identity.plugin.log.Logger interface.
98N/Acom.sun.identity.plugin.log.class=com.sun.identity.plugin.log.impl.FedletLogger
235N/A
493N/A
98N/A# com.sun.identity.plugin.session.class specifies implementation for
916N/A# com.sun.identity.plugin.session.SessionProvider interface.
916N/Acom.sun.identity.plugin.session.class=com.sun.identity.plugin.session.impl.FedletSessionProvider
916N/A
916N/A# com.sun.identity.plugin.monitoring.agent.class specifies implementation for
98N/A# com.sun.identity.plugin.monitoring.FedMonAgent interface.
98N/Acom.sun.identity.plugin.monitoring.agent.class=com.sun.identity.plugin.monitoring.impl.FedletAgentProvider
98N/A
606N/A# com.sun.identity.plugin.monitoring.saml1.class specifies implementation for
98N/A# com.sun.identity.plugin.monitoring.FedMonSAML1Svc interface.
98N/Acom.sun.identity.plugin.monitoring.saml1.class=com.sun.identity.plugin.monitoring.impl.FedletMonSAML1SvcProvider
98N/A
606N/A# com.sun.identity.plugin.monitoring.saml2.class specifies implementation for
606N/A# com.sun.identity.plugin.monitoring.FedMonSAML2Svc interface.
98N/Acom.sun.identity.plugin.monitoring.saml2.class=com.sun.identity.plugin.monitoring.impl.FedletMonSAML2SvcProvider
493N/A
493N/A# com.sun.identity.plugin.monitoring.idff.class specifies implementation for
493N/A# com.sun.identity.plugin.monitoring.FedMonIDFFSvc interface.
98N/Acom.sun.identity.plugin.monitoring.idff.class=com.sun.identity.plugin.monitoring.impl.FedletMonIDFFSvcProvider
98N/A
98N/A# com.sun.identity.saml.xmlsig.keyprovider.class specified the implementation
98N/A# class for com.sun.identity.saml.xmlsig.KeyProvider interface
908N/Acom.sun.identity.saml.xmlsig.keyprovider.class=com.sun.identity.saml.xmlsig.JKSKeyProvider
591N/A
493N/A# com.sun.identity.saml.xmlsig.signatureprovider.class specified the
493N/A# implementation class for com.sun.identity.saml.xmlsig.SignatureProvider
493N/A# interface
493N/Acom.sun.identity.saml.xmlsig.signatureprovider.class=com.sun.identity.saml.xmlsig.AMSignatureProvider
493N/A
493N/Acom.sun.identity.common.serverMode=false
493N/A
493N/Acom.iplanet.am.server.protocol=http
493N/Acom.iplanet.am.server.host=openam.example.com
705N/Acom.iplanet.am.server.port=8080
493N/Acom.iplanet.am.services.deploymentDescriptor=/openam
557N/Acom.iplanet.am.logstatus=ACTIVE
557N/A
493N/A
493N/A# Name of the webcontainer.
606N/A# Even though the servlet/JSP are web container independent,
606N/A# Access/Federation Manager uses servlet 2.3 API request.setCharacterEncoding()
851N/A# to decode incoming non English characters. These APIs will not work if
851N/A# Access/Federation Manager is deployed on Sun Java System Web Server 6.1.
851N/A# We use gx_charset mechanism to correctly decode incoming data in
851N/A# Sun Java System Web Server 6.1 and S1AS7.0. Possible values
851N/A# are BEA6.1, BEA 8.1, IBM5.1 or IAS7.0.
851N/A# If the web container is Sun Java System Webserver, the tag is not replaced.
851N/Acom.sun.identity.webcontainer=WEB_CONTAINER
98N/A
591N/A
910N/A# Identify saml xml signature keystore file, keystore password file
851N/A# key password file
591N/Acom.sun.identity.saml.xmlsig.keystore=%BASE_DIR%/keystore.jks
910N/Acom.sun.identity.saml.xmlsig.storepass=%BASE_DIR%/.storepass
910N/Acom.sun.identity.saml.xmlsig.keypass=%BASE_DIR%/.keypass
910N/Acom.sun.identity.saml.xmlsig.certalias=test
910N/A
910N/A
910N/A# Type of KeyStore used for saml xml signature. Default is JKS.
98N/A#
98N/A# com.sun.identity.saml.xmlsig.storetype=JKS
910N/A
910N/A# Specifies the implementation class for
910N/A# com.sun.identity.saml.xmlsig.PasswordDecoder interface.
98N/Acom.sun.identity.saml.xmlsig.passwordDecoder=com.sun.identity.fedlet.FedletEncodeDecode
606N/A
98N/A# The following key is used to specify the maximum content-length
606N/A# for an HttpRequest that will be accepted by the OpenSSO
98N/A# The default value is 16384 which is 16k
591N/Acom.iplanet.services.comm.server.pllrequest.maxContentLength=16384
851N/A
111N/A# The following keys are used to configure the Debug service.
111N/A# Possible values for the key 'level' are: off | error | warning | message.
111N/A# The key 'directory' specifies the output directory where the debug files
111N/A# will be created.
111N/A# Trailing spaces are significant.
606N/A# Windows: Use forward slashes "/" separate directories, not backslash "\".
851N/A# Windows: Spaces in the file name are allowed for Windows.
851N/A#
851N/Acom.iplanet.services.debug.level=message
606N/Acom.iplanet.services.debug.directory=%BASE_DIR%%SERVER_URI%/debug
98N/A
851N/A# The following keys are used to configure the Stats service.
733N/A# Possible values for the key 'level' are: off | file | console
733N/A# Stats state 'file' will write to a file under the specified directory,
733N/A# and 'console' will write into webserver log files
733N/A# The key 'directory' specifies the output directory where the debug files
733N/A# will be created.
606N/A# Trailing spaces are significant.
851N/A# Windows: Use forward slashes "/" separate directories, not backslash "\".
606N/A# Windows: Spaces in the file name are allowed for Windows.
98N/A# Stats interval should be atleast 5 secs to avoid CPU saturation,
851N/A# the product would assume any thing less than 5 secs is 5 secs.
851N/Acom.iplanet.am.stats.interval=60
851N/Acom.iplanet.services.stats.state=file
851N/Acom.iplanet.services.stats.directory=%BASE_DIR%%SERVER_URI%/stats
851N/A
851N/A
851N/A# The key that will be used to encrypt and decrypt passwords.
212N/Aam.encryption.pwd=@AM_ENC_PWD@
851N/A
606N/A# SecureRandom Properties: The key
606N/A# "com.iplanet.security.SecureRandomFactoryImpl"
606N/A# specifies the factory class name for SecureRandomFactory
606N/A# Available impl classes are:
212N/A# com.iplanet.am.util.JSSSecureRandomFactoryImpl (uses JSS)
98N/A# com.iplanet.am.util.SecureRandomFactoryImpl (pure Java)
98N/Acom.iplanet.security.SecureRandomFactoryImpl=com.iplanet.am.util.SecureRandomFactoryImpl
98N/A
98N/A
182N/A# SocketFactory properties: The key "com.iplanet.security.SSLSocketFactoryImpl"
98N/A# specifies the factory class name for LDAPSocketFactory
908N/A# Available classes are:
908N/A# com.iplanet.services.ldap.JSSSocketFactory (uses JSS)
# com.sun.identity.shared.ldap.factory.JSSESocketFactory (pure Java)
com.iplanet.security.SSLSocketFactoryImpl=com.sun.identity.shared.ldap.factory.JSSESocketFactory
# Encryption: The key "com.iplanet.security.encryptor" specifies
# the encrypting class implementation.
# Available classes are:
# com.iplanet.services.util.JCEEncryption
# com.iplanet.services.util.JSSEncryption
com.iplanet.security.encryptor=com.iplanet.services.util.JCEEncryption
# Determines if JSS will be added with highest priority to JCE
# Set this to "true" if other JCE providers should be used for
# digial signatures and encryptions.
com.sun.identity.jss.donotInstallAtHighestPriority=true
# Configuration File (serverconfig.xml) Location
com.iplanet.services.configpath=@BASE_DIR@