Deployment

This page shows the deployment procedure of Idra.

Artefacts

These are the artefacts that must be installed in order to run Idra:

Database creation

Idra relies on a MySQL database to store all the application data and collected Open Datasets.

So before deploying the application, it is necessary to create a new database, by importing in the MySQL server the provided SQL dump file:

This dump already contains the statement that creates the idra_db DB automatically. In addition it creates an administration user with the following credentials:

username: admin

password: admin

Note. To change the administrator password login in the Idra Portal with the previous credentials then go to the Administration -> Manage Configurations -> Update Password section.

WARs deployment

Move all the WAR artifacts to the webapps folder of Tomcat installation, start it up and wait until they are deployed.

RDF repository creation

Once the Tomcat server started, go with browser to the URL localhost:8080/rdf4j-workbench

Note. Change the port number according to the configuration of server.xml file of Tomcat conf folder (default 8080)

Through the RDF4J GUI, select “new repository” on the left menu, then create a new repository of type Native Java Store called Idra.

Configuration

Once all the WAR files are deployed and the server has started, modify the following configuration files, located in the deployed folders of Tomcat webapps folder.

Authentication Configuration

Idra Platform supports the following authentication mechanisms: - Basic Authentication: Basic login of the Administrator provided by Idra Platform itself. - Fiware Identity Manager: Authentication of the Administrator via an external instance of Fiware Identity Manager, namely Keyrock. Both versions 6 and 7 are supported.

In order to select which Authorization mechanism to use and configure it accordingly, modify the following configuration files, located in the deployed folders of Tomcat webapps folder. - IdraPortal/WEB-INF/classes/ - in configuration.properties file, change the following property: - idm.authentication.method: allowed values are BASIC and FIWARE - Idra/WEB-INF/classes/ - in configuration.properties file, change the following property: - idra.authentication.method: allowed values are BASIC and FIWARE

Configuring Idra with Fiware IdM Authentication

If the Fiware Identity Manager option was selected (FIWARE), in order to correctly execute the OAuth2 flow: - Idra Platform must be registered as an Application in the Fiware IdM, by specifying, in the registration form, following parameters: - URL: http://IDRA_PORTAL_HOST/IdraPortal - CallbackURL: http://IDRA_HOST/Idra/api/v1/administration/login

Note. Replace IDRA_PORTAL_HOST and IDRA_HOST with the actual values, namely the Base URl where Idra Platform is deployed.

Note. Please see the Fiware Identity Manager manual for further information about the registration process, user roles, and Oauth2 APIs.

Configuring Idra as OAuth2 Client for Fiware IdM authentication

The registration process, described above, provides Client Id and Client Secret, which will be used by Idra platform to perform the Oauth2 flow as a Client. Modify the following configuration files, located in the deployed folders of Tomcat webapps folder. - IdraPortal/WEB-INF/classes/ - in configuration.properties file, change the following properties: - idm.client.id: Client Id provided by the Fiware IdM . - idm.client.secret: Client Secret provided by the Fiware IdM. - idm.redirecturi:http://IDRA_HOST/Idra/api/v1/administration/login, (same value of the callbackURL specified above in the IdM). - idm.logout.callback: http://IDRA_PORTAL_HOST/IdraPortal, (same value of the URL specified above in the IdM). - idm.protocol: Protocol of Fiware IdM instance (http or https) - idm.host: Host of Fiware IdM instance. (INCLUDE ALSO THE PORT, IF ANY).

Note. Replace IDRA_PORTAL_HOST and IDRA_HOST with the actual values, namely the Base URL where Idra Platform is deployed.