forked from lordal/SWAMID-IDP-Deployer
-
Notifications
You must be signed in to change notification settings - Fork 1
/
README
48 lines (38 loc) · 2.22 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
Disclamer
-------------------------------------------------------------------------------
Intended to be used on a clean CentOS 6.4 'minimal' install or newer.
Introduction
-------------------------------------------------------------------------------
Inspired by the scripting work by SWAMID for installing an IDP, this is a variation
that will do an installation for eduroam.
The IDP pieces still reside in the script and will eventually be worked back
into the build.
From ./deploy_idp.sh -h:
##############################################################################
# Federated Identity Appliance Deployer #
# #
# This script is intended to deploy an eduroam ready FreeRADIUS server. #
# It is derived from the SWAMID approach but only supports CAF eduroam #
# at this time. #
# #
# Supported Federations: #
# CAF - (Canadian Access Federation) on CentOS #
# #
# This script requires a configuration file or it will not run properly. #
# Please see ./www/index.html for the interactive configuration builder #
# By using this method we avoid storage of any sensitive passwords. #
# #
# Steps to use the script: #
# Create a configuration via: ~/www/index.html #
# Save the config in this directory #
# Run the script: ./deploy_idp.sh [-h shows this message] #
# Join this machine to your domain: net join -U Administrator #
# Decide on your commercial TLS Certificate #
# Send your request to tickets@canarie.ca to join eduroam #
##############################################################################
Upgrading
-------------------------------------------------------------------------------
This iteration of the script has no upgrading functionality.
That said, it could be run multiple times with different configurations if so desired.
The tool does a 'Restore Point' (aka a tar file of key files) in the
./backup directory.