This project is part of FIWARE. You will find more information about this FIWARE GE here.
- You will find the source code of this project in GitHub here
- You will find the documentation of this project in Read the Docs here
Welcome to the main repository for the UPM's implementation of the FIWARE Identity Manager Generic Enabler. This repository acts as an entry point and holds the documentation and some automated tools for installation and management. The IdM is composed of two independent components, a RESTful back-end and web front-end.
If you want to see the code for each of the components of the IdM and more specific documentation please head to each component's repository:
- Horizon based front-end ging/horizon
- Keystone based back-end ging/keystone
You can see a working installation in the FIWARE Lab sandbox environment https://account.lab.fiware.org/
Identity Manager - KeyRock requires Ubuntu 12.04 or greater.
Both Horizon, for the front-end, and Keystone, for the back-end, must be installed in order for the generic enabler to run correctly. They can be installed in the same machine or in two separated ones. If you choose to separate them, the two machines must be able to communicate to each other through the network.
In this repository you can find a set of tools to help in developing, deploying and testing FIWARE's IdM KeyRock using Fabric. This is the recomended way to install the IdM but if you rather install it step by step on your own, please head to the advanced documentation.
The IdM is made out of two components, the web-based front-end and the restful back-end. You can check specific documentation in their repos.
For the instructions on how to install the IdM using the tools scroll down to the next section. This section covers the tools installation.
Install python and python-dev
sudo apt-get install python python-dev
Clone the tools in your machine
git clone https://github.com/ging/fiware-idm idm && cd idm
Create a settings file from the template
cp conf/settings.py.example conf/settings.py
Install virtualenvwrapper following the instructions at their page.
Create a virtualenv and activate it
mkvirtualenv idm_tools
Install python dependencies
pip install -r requirements.txt
To see all available commands use
fab --list
With the virtualenv activated (use workon) you can run the commands using fab task_name. For example:
fab keystone.populate
Some tasks accept arguments that override the defaults from conf/settings.py. It is recommended to use settings.py to configure the tasks but you can use this arguments in a per-task basis if you find you need it. Other tasks might need explicit arguments like the path to a file. The way to pass arguments to tasks is simple and documented here.
For example:
fab keystone.task:one_arg='this',another='that'
There is a configuration file template in /conf/settings.py.example. This provides as a good base configuration file that should be enough for a test/development installation.
Some options you might have to pay attention to are:
IDM_ROOT
If the location of the keystone and horizon components in your system is not directly inside the folder where you have cloned the tools you will have to set this accordingly.
HORIZON_DEV_ADDRESS
Sets the address and port where the frontend will listen to. Default is localhost:8000, you might want to tweak it based on your set up.
KEYSTONE_ADMIN_PORT
andKEYSTONE_PUBLIC_PORT
If you need to use different ports for the keystone back-end
fab keystone.install fab keystone.database_create fab keystone.dev_server
You will need to populate the database with some data needed for the IdM to work properly. In another console and keeping the server on run
fab keystone.populate
You can now log into the web using the administrative account (by default user idm pass idm). If you want some more data to play around run keystone.test_data. This will create some users and organizations to make it easier to try the IdM. Log in with user0@test.com (default password test).
fab keystone.test_data
If at some point you want to clean up, run keystone.database_reset. It will delete the whole database, create it again and populate it.
fab keystone.database_reset
Finally, if you want to run the keystone backend in the backgroud you can install it as a service
fab keystone.set_up_as_service
fab horizon.install
You can check everything went OK running the development server, but you won't be able to log in until you install the backend.
fab horizon.dev_server
We provide an installation script that can be run within a Ubuntu virtual machine. This script installs the whole Identity Manager, and sets it up to run in background.
You can find the installation script and a verification script here.
We also provide a Chef Cookbook, which you can find here.
We also provide a Docker image to facilitate you the building of this GE.
- Here you will find the Dockerfile and the documentation explaining how to use it.
- In Docker Hub you will find the public image.
Warning
Docker support is still experimental.
When either the Front-end (ging/horizon) or the Back-end (ging/keystone) are updated, you no longer need to install everything from start. Simply run the following with the virtualenv activated:
fab update_all
You can update each component separately
- Front-end:
fab horizon.update
- Back-end:
fab keystone.update
When the Identity Manager is installed, as well as every time it is updated, some check tasks will be run. These tasks will especially look for missing settings in the config files, and tell you to manually fix them or even try to figure them out automatically.
You can also run these checks whenever you want, simply running the following:
fab check_all
Each component can be checked separately:
- Front-end:
fab horizon.check
- Back-end:
fab keystone.check
Keyrock back-end is based on Openstack Keystone project, so it exports all the Keystone API. However, Keyrock implements some custom extensions that have their own REST APIs. Furthermore, to facilitate the access to some identity resources we have enabled an SCIM 2.0 API.
Finally, one of the main uses of Keyrock is to allow developers to add identity management (authentication and authorization) to their applications based on FIWARE identity. This is posible thanks to OAuth2 protocol.
You will find the full API description here