171 | | 6. Restart the IdP or wait for the reload interval of 15 minutes: |
172 | | {{{ |
173 | | -bash-3.2$ /opt/tomcat/bin/shutdown.sh |
174 | | -bash-3.2$ ps -ef | grep tomcat |
175 | | tomcat 9097 1 0 Jun06 ? 00:26:23 /usr/lib/jvm/jre-1.6.0-sun.x86_64/bin/java -Djava.util.logging.config.file=/opt/tomcat/conf/logging.properties -Xmx1024m -XX:MaxPermSize=128m -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager -Djava.endorsed.dirs=/opt/tomcat/endorsed -classpath /opt/tomcat/bin/bootstrap.jar -Dcatalina.base=/opt/tomcat -Dcatalina.home=/opt/tomcat -Djava.io.tmpdir=/opt/tomcat/temp org.apache.catalina.startup.Bootstrap start |
176 | | root 9821 2633 0 15:22 pts/1 00:00:00 su - tomcat |
177 | | tomcat 9823 9821 0 15:22 pts/1 00:00:00 -bash |
178 | | tomcat 12913 9823 0 15:46 pts/1 00:00:00 ps -ef |
179 | | tomcat 12914 9823 0 15:46 pts/1 00:00:00 grep tomcat |
180 | | -bash-3.2$ /opt/tomcat/bin/startup.sh |
181 | | }}} |
182 | | |
183 | | 7. Test config changes according to [[https://iam.alaska.edu/shib/wiki/TestIdPConfig|Test IdP Config Change]] procedure. |
184 | | |
185 | | 8. |
| 172 | 6. Test config changes according to [[https://iam.alaska.edu/shib/wiki/TestIdPConfig|Test IdP Config Change]] procedure. |
| 173 | |
| 174 | 7. Wait for SPs to get metadata. SPs in the !InCommon federation should be polling the !InCommon metadata [[http://wayf.incommonfederation.org/InCommon/InCommon-metadata.xml|distribution]] point daily. |
| 175 | |
| 176 | 8. Move to the new key/certificate and delete the old key/certificate "security:Credential" stanza in the relying party configuration. After this step there should be //only// one "security:Credential" stanza that points to the key/cert. |
| 177 | {{{ |
| 178 | -bash-3.2$ svn co svn+ssh://sxjpm@iron.alaska.edu/usr/local/iam/shib-svn/idp/trunk/conf |
| 179 | -bash-3.2$ vi conf/relying-party.xml |
| 180 | ... |
| 181 | <security:Credential id="IdPCredential" xsi:type="security:X509Filesystem"> |
| 182 | <security:PrivateKey>/opt/shibboleth-idp/credentials/idp.new.key</security:PrivateKey> |
| 183 | <security:Certificate>/opt/shibboleth-idp/credentials/idp.new.crt</security:Certificate> |
| 184 | </security:Credential> |
| 185 | ... |
| 186 | :wq! |
| 187 | -bash-3.2$ svn ci conf/relying-party.xml -m "Moved to new IdP key/cert and deleted old IdP key/cert." |
| 188 | }}} |
| 189 | |
| 190 | 9. Move to the new key/certificate in the IdP metadata. There should be one "<!KeyDescriptor>" stanzas after this step in the metadata for the new cert in the "<IDPSSODescriptor>" stanza and the "<!AttributeAuthorityDescriptor>" stanza. |
| 191 | {{{ |
| 192 | -bash-3.2$ svn co svn+ssh://sxjpm@iron.alaska.edu/usr/local/iam/shib-svn/idp/trunk/metadata |
| 193 | -bash-3.2$ vi metadata/idp-metadata.xml |
| 194 | ... |
| 195 | :wq! |
| 196 | -bash-3.2$ svn ci metadata/idp-metadata.xml -m "Moved to new IdP cert and deleted old cert." |
| 197 | |
| 198 | 10. Create a new Java Key Store for Tomcat containing the new key/cert for securing the back channel. |
| 199 | {{{ |
| 200 | |
| 201 | }}} |