-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/29/13 6:53 PM, André Warnier wrote:
> I believe that you both are close to the correct understanding, but
> that it helps to clearly distinguish the various parts of the
> process, and be very clear about the terminology (which
> unfortu
> Is this possible, Is there any material available for me
The links already provided cover all that you request
> I have read some where that Apache HTTPD ( ) can do this SSO process,
> then the same could be at Httpd instead of Tomcat end .
>
> If so yes plz let me know the process.
I have
Hey Cris
>>So you want to configure the login process to work once per day, e.g.
the users are prompted once per day for either app, but once prompted,
they won't be prompted again for either app for the rest of the day.
Presumably if the login is without a prompt, then this requirement
disappears
> We have 2 Apps on tomcat with each having independent DB
> the credentials in both apps are in synch with the list of authorized users
> as per LDAP.
What does that mean? Where is the source of the credentials? When a
user changes a password, where do they change it? You say "in synch",
so do th
Hi
Thx for Quick reply
>>Single-Sign-On Valve, which will alllow a user to
login once to the first application running on Tomcat, and then the login
will be valid if
he calls other applications on the same Tomcat, and for these other
applications running
on the same Tomcat he will not have to log
N.s.Karthik wrote:
Hi
Thx for the Conversation
but still i am not convinced
How Do I achieve SSO + LDAP for the setup as define below,
I absolutely do not have any Idea, I am confused with lot's URL's
Apache 2.2x (httpd-ssl) > Tomcat> DB
why SSL between Apache2 and tomcat ? is it
Hi
Thx for the Conversation
but still i am not convinced
How Do I achieve SSO + LDAP for the setup as define below,
I absolutely do not have any Idea, I am confused with lot's URL's
Apache 2.2x (httpd-ssl) > Tomcat> DB
Traffic expected on system is 300+ using IE, FFOX, Safari , Oper
chris derham wrote:
Does that mean that Tomcat treats WIA similar to HTTP BASIC (or maybe
DIGEST) unless you've approved a particular domain/host? That's
interesting. Can you just enter anything you'd like? For instance, can
I authenticate to a server that is expecting WIA from a Linux
workstatio
> Does that mean that Tomcat treats WIA similar to HTTP BASIC (or maybe
> DIGEST) unless you've approved a particular domain/host? That's
> interesting. Can you just enter anything you'd like? For instance, can
> I authenticate to a server that is expecting WIA from a Linux
> workstation just by en
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/29/13 4:19 AM, André Warnier wrote:
> Christopher Schultz wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256
>>
>> André,
>>
>> On 1/28/13 12:32 PM, André Warnier wrote:
>>> Christopher Schultz wrote:
-BEGIN PGP SIGNED
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/28/13 12:32 PM, André Warnier wrote:
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications are browser compatibl
>>> Do you need a plug-in or anything like that? Does it need to be
>>> specifically enabled?
>>
>> No, we use it all the time with IE, Firefox, and I believe Chrome
>> as well.
Last time I was working in this area a few years ago, it worked by
default in IE and had to be turned on in FF. A rogue
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
David,
On 1/28/13 1:18 PM, David kerber wrote:
> On 1/28/2013 1:07 PM, Christopher Schultz wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256
>>
>> André,
>>
>> On 1/28/13 12:32 PM, André Warnier wrote:
>>> Christopher Schultz wrote:
-
On 1/28/2013 1:07 PM, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/28/13 12:32 PM, André Warnier wrote:
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 1/28/13 12:32 PM, André Warnier wrote:
> Christopher Schultz wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256
>>
>> Chris,
>>
>> On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications are browser compatible and use
Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
1) All 3 applications are browser compatible and users may use
other then IE hence IE alone can be ruled out
Do you mean "multiple browsers access these web applications
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Chris,
On 1/28/13 7:47 AM, chris derham wrote:
>> 1) All 3 applications are browser compatible and users may use
>> other then IE hence IE alone can be ruled out
>
> Do you mean "multiple browsers access these web applications, so
> we can't use
> 1) All 3 applications are browser compatible and users may use other then
> IE
> hence IE alone can be ruled out
Do you mean "multiple browsers access these web applications, so we
can't use anything that is IE specific"? Assuming that you do, I don't
believe that anybody suggested anything th
Hi
Thx for the Quick reply
1) All 3 applications are browser compatible and users may use other then
IE
hence IE alone can be ruled out
What about the other (2 & 3) options
with regards
karthik
--
View this message in context:
http://tomcat.10.n6.nabble.com/LDAP-on-TOMCAT-7-0-30-tp499
On 28/01/2013 09:06, André Warnier wrote:
> N.s.Karthik wrote:
>> Hi
>>
>> Spec : JDK1.6, Tomcat 7.0.30, Linux 64
>> bit Suse
>> So far we have been using 3 killer Ajax web based applications with
>> each app provided with separate DB schema.
>>
>> The Requirement is
N.s.Karthik wrote:
Hi
Spec : JDK1.6,
Tomcat 7.0.30,
Linux 64 bit Suse
So far we have been using 3 killer Ajax web based applications
with each app provided with separate DB schema.
The Requirement is to provide a SSO "Single Sign On" Logic with existing
LD
Hi
Spec : JDK1.6,
Tomcat 7.0.30,
Linux 64 bit Suse
So far we have been using 3 killer Ajax web based applications
with each app provided with separate DB schema.
The Requirement is to provide a SSO "Single Sign On" Logic with existing
LDAP Server.
The AAA has
22 matches
Mail list logo