These instructions assume that the Fidopolicy application is being installed on the same machine/VM as the FIDO Server.
Create the following directories to configure the WebAuthn servlet home folder.
sudo mkdir -p /usr/local/strongkey/poc/etc
Create a configuration file for the service provider web application.
sudo vi /usr/local/strongkey/poc/etc/poc-configuration.properties
Fill in the appropriate values (listed in [ ]) to configure the sample application with SKFS.
poc.cfg.property.apiuri=https://[hostname of FIDO Server]:8181
Save and exit.
Download the service provider web application distribution fidopolicyserver-vx.xx-dist.tgz.
wget https://sourceforge.net/projects/strongkeyfido/files/v4.15.1/sampleapps/java/fidopolicy/fidopolicyserver-v4.15.1-dist.tgz
sha256sum fidopolicyserver-v4.15.1-dist.tgz
Extract the downloaded file to the current directory:
tar xvzf fidopolicyserver-v4.15.1-dist.tgz
Execute the install-fidopolicyserver.sh script as follows:
sudo ./install-fidopolicyserver.sh
Test that the servlet is running by executing the following cURL command and confirm that the API Web Application Definition Language (WADL) file is returned in response:
curl -k https://localhost:8181/fidopolicyboa/fido2/application.wadl
At this point, the FIDO Policy BOA server is installed. Continue to install the front-end Angular application.
Switch to (or login as) the strongkey user. The default password for the strongkey user is ShaZam123.
su - strongkey
Download the web application distribution for the FIDO2 Server policy-ui-dist.tgz.
wget https://sourceforge.net/projects/strongkeyfido/files/v4.15.1/sampleapps/java/fidopolicy/policy-ui-dist.tgz
sha256sum policy-ui-dist.tgz
Extract the downloaded file.
tar xvzf policy-ui-dist.tgz
Create a directory in Payara named fidopolicy.
mkdir -p /usr/local/strongkey/payara6/glassfish/domains/domain1/docroot/fidopolicy
Copy all the files to the Payara docroot.
cp -r dist/* /usr/local/strongkey/payara6/glassfish/domains/domain1/docroot/fidopolicy
firewall-cmd --zone=public --add-forward-port=port=443:proto=tcp:toport=8181 --permanent
firewall-cmd --reload
The application is deployed in docroot on the FIDO Policy BOA server. Access it as follows in a browser:
https://<FQDN-of-Policy-server>/fidopolicy
The LDAP service credentials used by the web application may be changed by setting the following configurations in the configuration file found at: /usr/local/strongkey/poc/etc/poc-configuration.properties
poc.cfg.property.svcusername=<non-default FIDO service username> poc.cfg.property.svcpassword=<non-default FIDO service password> poc.cfg.property.skfs.adminusername=<non-default admin FIDO service username> poc.cfg.property.skfs.adminpassword=<non-default admin FIDO service password> poc.cfg.property.jwtpassword=<non-default JWT key password>
NOTE: When making changes to any configuration files, the Payara server must be restarted for any changes to take effect. This can be done by running the following as the strongkey user:
sudo systemctl restart payara