Jump To Close Expand all Collapse all Table of contents Server Installation and Configuration Guide 1. Guide Overview Expand section "1. Guide Overview" Collapse section "1. Guide Overview" 1.1. Recommended Additional External Documentation 2. Installation Expand section "2. Installation" Collapse section "2. Installation" 2.1. System Requirements 2.2. Installing RH-SSO from a ZIP File 2.3. Installing RH-SSO from an RPM Expand section "2.3. Installing RH-SSO from an RPM" Collapse section "2.3. Installing RH-SSO from an RPM" 2.3.1. Subscribing to the JBoss EAP 7.1 Repository 2.3.2. Subscribing to the RH-SSO 7.2 Repository and Installing RH-SSO 7.2 2.4. Distribution Directory Structure 3. Choosing an Operating Mode Expand section "3. Choosing an Operating Mode" Collapse section "3. Choosing an Operating Mode" 3.1. Standalone Mode Expand section "3.1. Standalone Mode" Collapse section "3.1. Standalone Mode" 3.1.1. Standalone Boot Script 3.1.2. Standalone Configuration 3.2. Standalone Clustered Mode Expand section "3.2. Standalone Clustered Mode" Collapse section "3.2. Standalone Clustered Mode" 3.2.1. Standalone Clustered Configuration 3.2.2. Standalone Clustered Boot Script 3.3. Domain Clustered Mode Expand section "3.3. Domain Clustered Mode" Collapse section "3.3. Domain Clustered Mode" 3.3.1. Domain Configuration 3.3.2. Host Controller Configuration 3.3.3. Server Instance Working Directories 3.3.4. Domain Boot Script 3.3.5. Clustered Domain Example Expand section "3.3.5. Clustered Domain Example" Collapse section "3.3.5. Clustered Domain Example" 3.3.5.1. Setup Slave Connection to Domain Controller 3.3.5.2. Run the Boot Scripts 3.4. Cross-Datacenter Replication Mode 4. Manage Subsystem Configuration Expand section "4. Manage Subsystem Configuration" Collapse section "4. Manage Subsystem Configuration" 4.1. Configure SPI Providers 4.2. Start the JBoss EAP CLI 4.3. CLI Embedded Mode 4.4. CLI GUI Mode 4.5. CLI Scripting 4.6. CLI Recipes Expand section "4.6. CLI Recipes" Collapse section "4.6. CLI Recipes" 4.6.1. Change the web context of the server 4.6.2. Set the global default theme 4.6.3. Add a new SPI and a provider 4.6.4. Disable a provider 4.6.5. Change the default provider for an SPI 4.6.6. Configure the dblock SPI 4.6.7. Add or change a single property value for a provider 4.6.8. Remove a single property from a provider 4.6.9. Set values on a provider property of type List 5. Profiles 6. Relational Database Setup Expand section "6. Relational Database Setup" Collapse section "6. Relational Database Setup" 6.1. RDBMS Setup Checklist 6.2. Package the JDBC Driver 6.3. Declare and Load JDBC Driver 6.4. Modify the Red Hat Single Sign-On Datasource 6.5. Database Configuration 6.6. Unicode Considerations for Databases Expand section "6.6. Unicode Considerations for Databases" Collapse section "6.6. Unicode Considerations for Databases" 6.6.1. Oracle Database 6.6.2. Microsoft SQL Server Database 6.6.3. IBM DB2 Database 6.6.4. MySQL Database 6.6.5. PostgreSQL Database 7. Network Setup Expand section "7. Network Setup" Collapse section "7. Network Setup" 7.1. Bind Addresses 7.2. Socket Port Bindings 7.3. Setting up HTTPS/SSL Expand section "7.3. Setting up HTTPS/SSL" Collapse section "7.3. Setting up HTTPS/SSL" 7.3.1. Enabling SSL/HTTPS for the Red Hat Single Sign-On Server Expand section "7.3.1. Enabling SSL/HTTPS for the Red Hat Single Sign-On Server" Collapse section "7.3.1. Enabling SSL/HTTPS for the Red Hat Single Sign-On Server" 7.3.1.1. Creating the Certificate and Java Keystore Expand section "7.3.1.1. Creating the Certificate and Java Keystore" Collapse section "7.3.1.1. Creating the Certificate and Java Keystore" 7.3.1.1.1. Self Signed Certificate 7.3.1.2. Configure Red Hat Single Sign-On to Use the Keystore 7.4. Outgoing HTTP Requests Expand section "7.4. Outgoing HTTP Requests" Collapse section "7.4. Outgoing HTTP Requests" 7.4.1. Proxy Mappings for Outgoing HTTP Requests 7.4.2. Outgoing HTTPS Request Truststore 8. Clustering Expand section "8. Clustering" Collapse section "8. Clustering" 8.1. Recommended Network Architecture 8.2. Clustering Example 8.3. Setting Up a Load Balancer or Proxy Expand section "8.3. Setting Up a Load Balancer or Proxy" Collapse section "8.3. Setting Up a Load Balancer or Proxy" 8.3.1. Identifying Client IP Addresses 8.3.2. Enable HTTPS/SSL with a Reverse Proxy 8.3.3. Verify Configuration 8.3.4. Using the Built-In Load Balancer Expand section "8.3.4. Using the Built-In Load Balancer" Collapse section "8.3.4. Using the Built-In Load Balancer" 8.3.4.1. Register a New Host With Load Balancer 8.3.4.2. Master Bind Addresses 8.3.4.3. Host Slave Bind Addresses 8.3.5. Configuring Other Load Balancers 8.4. Sticky sessions Expand section "8.4. Sticky sessions" Collapse section "8.4. Sticky sessions" 8.4.1. Disable adding the route 8.4.2. Example cluster setup with mod_cluster Expand section "8.4.2. Example cluster setup with mod_cluster" Collapse section "8.4.2. Example cluster setup with mod_cluster" 8.4.2.1. Load Balancer Configuration 8.4.2.2. Backend node configuration 8.5. Multicast Network Setup 8.6. Securing Cluster Communication 8.7. Serialized Cluster Startup 8.8. Booting the Cluster 8.9. Troubleshooting 9. Server Cache Configuration Expand section "9. Server Cache Configuration" Collapse section "9. Server Cache Configuration" 9.1. Eviction and Expiration 9.2. Replication and Failover 9.3. Disabling Caching 9.4. Clearing Caches at Runtime Legal Notice Settings Close Language: 简体中文 한국어 日本語 English Language: 简体中文 한국어 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 简体中文 한국어 日本語 English Language: 简体中文 한국어 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Server Installation and Configuration Guide Red Hat Single Sign-On 7.2For Use with Red Hat Single Sign-On 7.2Red Hat Customer Content ServicesLegal NoticeAbstract This guide consists of information to install and configure Red Hat Single Sign-On 7.2 Next