Configure Single Sign-On

Release 9.3.1 E-mail This Topic Printable Version Give Us Feedback

Configure Single Sign-On

Single sign-on allows users to login once to a software application and gain access to multiple software systems without being prompted to login again. If you configure single sign-on for your Content Management System (CMS) or any other pages you add, users of your Geoportal will only need to login one time to access all the single sign-on enabled applications.



  • Tomcat Instructions
  • Weblogic Instructions




  • Note: The instructions provided below are suggestions according to how SSO was configured during testing. Your organization may require a different procedure depending on your servlet container software, other applications using SSO, security policies and other considerations.

    Tomcat LDAP and Single Sign-On Configuration Instructions

    This single sign-on configuration is tested against Tomcat 5.5.17, and assumes that you have already configured users through LDAP, as per the Geoportal extension 9.3.1 installation guide.

    If you have set up LDAP, then proceed with the following steps to enable single sign-on. You will need to make changes to both your Tomcat server.xml file and your Geoportal web application configuration file.



    1. Modify the Tomcat server.xml File


    2. Modify the geoportal gpt.xml File


    3. Modify the web.xml File




    Weblogic LDAP and Single Sign-On Configuration Instructions

    This single sign-on configuration is tested against Weblogic 10.3.1, and assumes that you have already configured users through LDAP, as per the Geoportal extension 9.3.1 installation guide. This example also assumes that your LDAP is configured with Apache Directory Server. Directions below may need adjustment for other Directory Server vendors.

    If you have set up LDAP, then proceed with the following steps to enable single sign-on. You will need to make changes from within the Weblogic Administration Console to the security realm. For more detailed information on security realms visit Weblogic Website.



    1. Create Security Realm


    2. You will need to update certain fields with information from your LDAP. Fields not mentioned below should be left as their default values. The example shows typical settings for Apache Directory Server:



    3. Alter the DefaultAuthenticator in myrealm
    4. Weblogic has its own security provider that protects weblogic resources, that provider os called DefaultAuthenticator. You will need to adjust the Control Flag setting of the DefaultAuthenticator.



    5. Modify the geoportal gpt.xml File


    6. Modify the web.xml File