https://github.com/dennisdenuto/uaa-deployment
An unofficial open source deployment manifest for UAA
https://github.com/dennisdenuto/uaa-deployment
bosh idp ldap oidc saml saml-idp uaa uaa-release
Last synced: 8 months ago
JSON representation
An unofficial open source deployment manifest for UAA
- Host: GitHub
- URL: https://github.com/dennisdenuto/uaa-deployment
- Owner: DennisDenuto
- License: apache-2.0
- Created: 2018-01-21T21:21:10.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2018-12-07T22:09:00.000Z (almost 7 years ago)
- Last Synced: 2025-02-15T10:06:22.434Z (8 months ago)
- Topics: bosh, idp, ldap, oidc, saml, saml-idp, uaa, uaa-release
- Language: Shell
- Homepage:
- Size: 40 KB
- Stars: 0
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
** This repo is currently actively in development **
# Deploying a standalone UAA## Pave your IaaS and get a BOSH Director
Before you can start deploying,
you'll need to make sure you've configured your infrastructure appropriately
and deployed a BOSH Director.
If you're using AWS, GCP, or Azure,
we'd suggest using [bbl](https://github.com/cloudfoundry/bosh-bootloader)
to set up your IaaS resources and bootstrap a BOSH director.
Otherwise, take a look at [the BOSH documentation](https://bosh.io/docs/init.html)
for information about prerequisites for a given IaaS
and installing a BOSH Director there.#### bosh-lite
If you're deploying bosh-lite to a VM on AWS, GCP, or Azure,
look at [this guide](iaas-support/bosh-lite/README.md).If you're planning to deploy against a **local** bosh-lite,
follow [these instructions](https://bosh.io/docs/bosh-lite.html).
You'll also need to take the following step before continuing:
```
pushd /tmp
git clone https://github.com/DennisDenuto/saml-release.git --recursive
popd
```# Deploy uaa
```
bosh -e vbox -d uaa deploy uaa.yml \
-o operations/use-bosh-dns.yml \
--vars-store=./store.json \
--no-redact
sudo -E ./configure-host.sh
```# Deploy uaa with ldap
```
bosh -e vbox -d uaa deploy uaa.yml \
-o operations/use-bosh-dns.yml \
-o operations/identity_providers/add_ldap.yml \
--vars-store=./store.json \
--no-redact
sudo -E ./configure-host.sh
```# Deploy uaa with saml
```
bosh -e vbox -d uaa deploy uaa.yml \
-o operations/use-bosh-dns.yml \
-o operations/identity_providers/add_saml.yml \
--vars-store=./store.json \
--no-redact
sudo -E ./configure-host.sh
```# Deploy uaa with oidc
```
bosh -e vbox -d uaa deploy uaa.yml \
-o operations/use-bosh-dns.yml \
-o operations/identity_providers/add_oidc.yml \
--vars-store=./store.json \
--no-redact
sudo -E ./configure-host.sh
```# Deploy uaa with mysql cluster
```
bosh -e vbox -d uaa deploy uaa.yml \
-o operations/use-bosh-dns.yml \
-o operations/database/add-managed-mysql.yml \
--vars-store=./store.json \
--no-redact
sudo -E ./configure-host.sh
```# Deploy uaa with Google oidc
Follow instructions for configuring your Google API account here: https://developers.google.com/identity/protocols/OpenIDConnect```
bosh -e vbox -d uaa deploy uaa.yml \
-o operations/identity_providers/add_google_oidc.yml \
--vars-store=./store.json \
--no-redact
sudo -E ./configure-host.sh
```# Testing uaa standalone deployment
1) uaac target https://uaa-minimal.bosh-lite.com:84432) find clients created in the UAA internal store:
```
bosh int --path=/instance_groups/name=uaa/jobs/name=uaa/properties/uaa/clients <(bosh -e vbox -d uaa manifest)
```
3) get a token:
```
uaac token client get admin -s adminsecret
```# If you have deployed with ldap idp:
4) add users to ldap
```
bosh -e vbox -d uaa errands
bosh -e vbox -d uaa run-errand add-dn
uaac token owner get admin belle -s adminsecret -p koala
```# Testing uaa oidc integration with another uaa
```
curl -v -k 'https://uaa.service.uaa.internal:8443/oauth/token' -i -X POST \
-H 'Content-Type: application/x-www-form-urlencoded' \
-H 'Accept: application/json' \
-d 'client_id=admin&client_secret=adminsecret&grant_type=password&username=marissa_oidc&password=koala&token_format=jwt&response_type=token&login_hint=%257B%2522origin%2522%253A%2522my-oidc-provider%2522%257D'
```