-
Notifications
You must be signed in to change notification settings - Fork 7
Upgrade of demo server to CE Casa 4.0
backup whole ldap backup files (or entire chroot?)
- /opt/gluu/jetty/casa/static/i18n
- /etc/gluu/conf
- /etc/certs
- /etc/default/
- /opt/gluu/jetty/oxauth/custom/libs
- /opt/gluu/jetty/oxauth/custom/pages
upgrade CE to 4.0 (CE upgrade has been heavily tested, so should work fine)
turn on the 4 scripts supported by casa OOTB
test if they work fine, if they do, test passport inbound is working fine (ie github + twitter auth)
otherwise use 1-B
remove ce 3.1.5 thoroughly
install ce 4.0rc5 (BD = ldap + all components except shibboleth, radius, oxauth rp)
replace /etc/cert/super_gluu* with backup's
replace /etc/cert/otp* with backup's
configure fido2 (enable endpoint, add files, etc)
configure twilio params (use ldap backup data)
turn on the 4 scripts supported by casa OOTB
configure passport (using docs + ldap backup data) and test it
import users (requires ldif adjustments. we can reduce/filter the list of users. As of today many are not actual users. Beware of admin)
restore original admin password
change ssl certs for lets encrypt ones (Ganesh)
install casa 4.0 (Default installation)
set log level to debug
copy i18n files
test 2fa stuff works
add 4.0 plugins
- authorized-clients
- custom-branding
- strong-authn-settings
- account-linking (follow docs to properly configure)
overall test
Extra plugins deployment
- inwebo-plugin
- smpp plugin