Jump To Close Expand all Collapse all Table of contents Server Installation and Configuration Guide Making open source more inclusive 1. Guide Overview Expand section "1. Guide Overview" Collapse section "1. Guide Overview" 1.1. Recommended additional external documentation 2. Installing the software Expand section "2. Installing the software" Collapse section "2. Installing the software" 2.1. Installation prerequisites 2.2. Installing RH-SSO from a ZIP file 2.3. Installing RH-SSO from an RPM Expand section "2.3. Installing RH-SSO from an RPM" Collapse section "2.3. Installing RH-SSO from an RPM" 2.3.1. Subscribing to the JBoss EAP 7.4 repository 2.3.2. Subscribing to the RH-SSO 7.6 repository and installing RH-SSO 7.6 2.4. Important directories 3. Using operating modes Expand section "3. Using operating modes" Collapse section "3. Using operating modes" 3.1. Using standalone mode Expand section "3.1. Using standalone mode" Collapse section "3.1. Using standalone mode" 3.1.1. Booting in standalone mode 3.1.2. Standalone configuration 3.2. Using standalone clustered mode Expand section "3.2. Using standalone clustered mode" Collapse section "3.2. Using standalone clustered mode" 3.2.1. Standalone clustered configuration 3.2.2. Booting in standalone clustered mode 3.3. Using domain clustered mode Expand section "3.3. Using domain clustered mode" Collapse section "3.3. Using domain clustered mode" 3.3.1. Domain configuration 3.3.2. Host controller configuration 3.3.3. Server instance working directories 3.3.4. Booting in domain clustered mode 3.3.5. Testing with a sample clustered domain 3.4. Using cross-site replication mode 4. Managing the subsystem configuration Expand section "4. Managing the subsystem configuration" Collapse section "4. Managing the subsystem configuration" 4.1. Configure SPI providers 4.2. Starting the JBoss EAP CLI 4.3. CLI embedded mode 4.4. Using CLI GUI mode 4.5. CLI scripting 4.6. CLI recipes Expand section "4.6. CLI recipes" Collapse section "4.6. CLI recipes" 4.6.1. Changing the web context of the server 4.6.2. Setting the global default theme 4.6.3. Adding a new SPI and a provider 4.6.4. Disabling a provider 4.6.5. Changing the default provider for an SPI 4.6.6. Configuring the dblock SPI 4.6.7. Adding or changing a single property value for a provider 4.6.8. Remove a single property from a provider 4.6.9. Setting values on a provider property of type List 5. Profiles 6. Setting up the relational database Expand section "6. Setting up the relational database" Collapse section "6. Setting up the relational database" 6.1. Database setup checklist 6.2. Packaging the JDBC driver 6.3. Declaring and loading the JDBC driver 6.4. Modifying the Red Hat Single Sign-On datasource 6.5. Database Configuration 6.6. Unicode considerations for databases Expand section "6.6. Unicode considerations for databases" Collapse section "6.6. Unicode considerations for databases" 6.6.1. Oracle database 6.6.2. Microsoft SQL Server database 6.6.3. MySQL database 6.6.4. PostgreSQL database 7. Use of the public hostname Expand section "7. Use of the public hostname" Collapse section "7. Use of the public hostname" 7.1. Default provider 7.2. Custom provider 8. Setting up the network Expand section "8. Setting up the network" Collapse section "8. Setting up the network" 8.1. Bind addresses 8.2. Socket port bindings 8.3. HTTPS/SSL 8.4. Enabling HTTPS/SSL for the Red Hat Single Sign-On server Expand section "8.4. Enabling HTTPS/SSL for the Red Hat Single Sign-On server" Collapse section "8.4. Enabling HTTPS/SSL for the Red Hat Single Sign-On server" 8.4.1. Creating the Certificate and Java Keystore Expand section "8.4.1. Creating the Certificate and Java Keystore" Collapse section "8.4.1. Creating the Certificate and Java Keystore" 8.4.1.1. Self Signed Certificate 8.4.2. Configuring Red Hat Single Sign-On to use the keystore Expand section "8.4.2. Configuring Red Hat Single Sign-On to use the keystore" Collapse section "8.4.2. Configuring Red Hat Single Sign-On to use the keystore" 8.4.2.1. JBoss Security Legacy 8.4.2.2. Elytron TLS v1.2 8.4.2.3. Elytron TLS 1.3 8.5. Outgoing HTTP requests Expand section "8.5. Outgoing HTTP requests" Collapse section "8.5. Outgoing HTTP requests" 8.5.1. Proxy mappings for outgoing HTTP requests 8.5.2. Using standard environment variables 8.5.3. Outgoing HTTPS request truststore 9. Configuring Red Hat Single Sign-On to run in a cluster Expand section "9. Configuring Red Hat Single Sign-On to run in a cluster" Collapse section "9. Configuring Red Hat Single Sign-On to run in a cluster" 9.1. Recommended network architecture 9.2. Clustering example 9.3. Setting Up a load balancer or proxy Expand section "9.3. Setting Up a load balancer or proxy" Collapse section "9.3. Setting Up a load balancer or proxy" 9.3.1. Identifying client IP addresses 9.3.2. Enabling HTTPS/SSL with a reverse proxy 9.3.3. Verifying the configuration 9.3.4. Using the built-in load balancer Expand section "9.3.4. Using the built-in load balancer" Collapse section "9.3.4. Using the built-in load balancer" 9.3.4.1. Master bind addresses 9.3.4.2. Host slave bind addresses 9.4. Sticky sessions Expand section "9.4. Sticky sessions" Collapse section "9.4. Sticky sessions" 9.4.1. Disable adding the route 9.5. Setting up multicast networking 9.6. Secure cluster communication 9.7. Serialized cluster startup 9.8. Booting the cluster 9.9. Troubleshooting 10. Server cache configuration Expand section "10. Server cache configuration" Collapse section "10. Server cache configuration" 10.1. Eviction and expiration 10.2. Replication and failover 10.3. Disabling caching 10.4. Clearing cache at runtime 11. Red Hat Single Sign-On Operator Expand section "11. Red Hat Single Sign-On Operator" Collapse section "11. Red Hat Single Sign-On Operator" 11.1. Installing the Red Hat Single Sign-On Operator on a cluster Expand section "11.1. Installing the Red Hat Single Sign-On Operator on a cluster" Collapse section "11.1. Installing the Red Hat Single Sign-On Operator on a cluster" 11.1.1. Installing using the Operator Lifecycle Manager 11.1.2. Installing from the command line 11.2. Using the Red Hat Single Sign-On Operator in production environment 11.3. Installing Red Hat Single Sign-On using a custom resource Expand section "11.3. Installing Red Hat Single Sign-On using a custom resource" Collapse section "11.3. Installing Red Hat Single Sign-On using a custom resource" 11.3.1. The Keycloak custom resource 11.3.2. Creating a Keycloak custom resource on OpenShift 11.4. Creating a realm custom resource 11.5. Creating a client custom resource 11.6. Creating a user custom resource 11.7. Connecting to an external database 11.8. Connecting to an external Red Hat Single Sign-On 11.9. Scheduling database backups 11.10. Installing extensions and themes 11.11. Command options for managing custom resources 11.12. Upgrade strategy Legal Notice Settings Close Language: 한국어 简体中文 日本語 English Language: 한국어 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 한국어 简体中文 日本語 English Language: 한국어 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Server Installation and Configuration Guide Red Hat Single Sign-On 7.6For Use with Red Hat Single Sign-On 7.6Red Hat Customer Content ServicesLegal NoticeAbstract This guide consists of information to install and configure Red Hat Single Sign-On 7.6 Next