These instructions assume that the Fidopolicy application is being installed on the same machine/VM as the FIDO Server.
Create the following directories to configure the WebAuthn servlet home folder.
sudo mkdir -p /usr/local/strongkey/poc/etc
Create a configuration file for the service provider web application.
sudo vi /usr/local/strongkey/poc/etc/poc-configuration.properties
Fill in the appropriate values (listed in [ ]) to configure the sample application with SKFS.
poc.cfg.property.apiuri=https://[hostname of FIDO Server]:8181
Save and exit.
Download the service provider web application distribution fidopolicyserver-vx.xx-dist.tgz.
wget https://sourceforge.net/projects/strongkeyfido/files/v4.13.2/sampleapps/java/fidopolicy/fidopolicyserver-v4.13.2-dist.tgz
shell> sha256sum fidopolicyserver-v4.13.2-dist.tgz
Extract the downloaded file to the current directory:
tar xvzf fidopolicyserver-v4.13.2-dist.tgz
Execute the install-fidopolicyserver.sh script as follows:
sudo ./install-fidopolicyserver.sh
Test that the servlet is running by executing the following cURL command and confirm that the API Web Application Definition Language (WADL) file is returned in response:
curl -k https://localhost:8181/fidopolicyboa/fido2/application.wadl
At this point, the FIDO Policy BOA server is installed. Continue to install the front-end Angular application.
Switch to (or login as) the strongkey user. The default password for the strongkey user is ShaZam123.
su - strongkey
Download the web application distribution for the FIDO2 Server policy-ui-dist.tgz.
wget https://sourceforge.net/projects/strongkeyfido/files/v4.13.2/sampleapps/java/fidopolicy/policy-ui-dist.tgz
shell> sha256sum policy-ui-dist.tgz
Extract the downloaded file.
tar xvzf policy-ui-dist.tgz
Create a directory in Payara named fidopolicy.
mkdir -p /usr/local/strongkey/payara6/glassfish/domains/domain1/docroot/fidopolicy
Copy all the files to the Payara docroot.
cp -r dist/* /usr/local/strongkey/payara6/glassfish/domains/domain1/docroot/fidopolicy
firewall-cmd --zone=public --add-forward-port=port=443:proto=tcp:toport=8181 --permanent
firewall-cmd --reload
The application is deployed in docroot on the FIDO Policy BOA server. Access it as follows in a browser:
https://<FQDN-of-Policy-server>/fidopolicy