7
PEP Proxy - Wilma GE Lesson 2 - Installing, registering and configuring Wilma Álvaro Alonso. UPM – DIT Security Chapter. FIWARE [email protected], @larsonalonso

Wilma - Lesson 2. Installing, registering and configuring Wilma

Embed Size (px)

Citation preview

Page 1: Wilma - Lesson 2. Installing, registering and configuring Wilma

PEP Proxy - Wilma GELesson 2 - Installing, registering and configuring Wilma

Álvaro Alonso. UPM – DITSecurity Chapter. [email protected], @larsonalonso

Page 2: Wilma - Lesson 2. Installing, registering and configuring Wilma

Contents

• How Wilma works• Wilma installation• Wilma registration in Keyrock• Wilma configuration

Page 3: Wilma - Lesson 2. Installing, registering and configuring Wilma

Main concepts

Backend ServiceREST API

REST Client Other services

HTTP request + TOKEN

Web App

Wilma

User 1 User 2

Page 4: Wilma - Lesson 2. Installing, registering and configuring Wilma

Main concepts

Backend ServiceREST API

HTTP request + TOKEN

Wilma

User

Keyrock GE

AuthZForce GE

Page 5: Wilma - Lesson 2. Installing, registering and configuring Wilma

Guidelines

• Wilma Registration in FIWARE Lab– https://account.lab.fiware.org

• Types of authentication tokens– Keystone tokens– OAuth2 tokens

• Check how to obtain tokens in Keyrock courses– https://edu.fiware.org/course/view.php?id=79

• Requests to Wilma

Page 6: Wilma - Lesson 2. Installing, registering and configuring Wilma

Documentation

• Wilma GE– http://catalogue.fiware.org/enablers/pep-proxy-wilma

• Source code– https://github.com/ging/fiware-pep-proxy

• Installation Guide– http://fiware-pep-proxy.readthedocs.org/en/latest/admin_guide/

Page 7: Wilma - Lesson 2. Installing, registering and configuring Wilma

PEP Proxy - Wilma GELesson 2 - Installing, registering and configuring WilmaÁlvaro Alonso. UPM – DITSecurity Chapter. [email protected], @larsonalonso