Page History
...
- JOC Cockpit stores user accounts, hashed passwords and role assignments
- in its database and
- to the
JETTY_BASE/resources/joc/shiro.ini.active
file (for information purposes)- Users can create a copy of the
shiro.ini.active
file, add their modifications and submit changes by renaming the file toshiro.ini
. - With the next login of a user the
shiro.ini
file will be applied and its contents are added to the JS7 database. - As a result of this operation the
shiro.ini
file is renamed toshiro.ini.active
. A previously availableshiro.ini.active
file is renamed toshiro.ini.backup
.
- Users can create a copy of the
- The migration procedure includes to specify the location of the
shiro.ini.active
file or a file with a similar an arbitrary name holding the latest Shiro configuration.
...
For migration purposes the JS7 Identity Services Service management script is used: joc_manage_identity_service.sh|.cmd
The script is executed in the JS7 environment to which the Shiro configuration should be migrated and . The script is available from
JETTY_HOME/install/joc_manage_identity_service.sh
|.cmd
- If not otherwise specified during installation then the
JETTY HOME
directory defaults to/opt/sos-berlin.com/js7/joc
(for Unix environments)Program Files\sos-berlin.com\js7\joc
(for Windows environments)
...
The <shiro-configuration-file>
specifies the file holding the latest Shiro configuration of the JobScheduler release from which to migrate, see What to migrate. Users can copy the file to their JS7 environment. It is not required that the JobScheduler release to be migrated is available with the same network or server to which the migration is targetedDuring execution of the management script a connection to the JobScheduler installation that should be migrated is not required.
Execution of the management script for migration performs the following operations in JS7:
- Add an Identity Service with Service Type
JOC
and the nameJOC-FROM-SHIRO
- For each LDAP realm included with the
<shiro-configuration-file>
a corresponding Identity Service is created form the name of the LDAP realm.
- For each LDAP realm included with the
- Populate roles of the
JOC-FROM-SHIRO
Identity Service- Any roles and permissions from the
<shiro-configuration-file>
are added to theJOC-FROM-SHIRO
Identity Service.
- Any roles and permissions from the
- Populate accounts of the
JOC-FROM-SHIRO
Identity Service- Any user accounts from the
<shiro-configuration-file>
are added to theJOC-FROM-SHIRO
Identity Service. - This includes to add assignments of roles to user accounts.
- This includes to add hashed passwords available from the
<shiro-configuration-file>
.- JS7 implements its own password hashing algorithm. However, password hashes migrated from Shiro can be used with JS7.
- When a user changes the password then the JS7 password hashing algorithm is applied.
- This procedure is intended for a smooth migration that does not force users to change passwords.
- Any user accounts from the
- Should the management script find existing configuration items with the same name in the
JOC-FROM-SHIRO
Identity Service, for example matching names of roles or user accounts then they will not be overwritten from the<shiro-configuration-file>
.
...