The CAT generates installers for numerous operating systems. Consequently, many console tools need to be installed for all the profile generators to work correctly. The prerequisites are:
- Apache2 Web Server
- MySQL/MariaDB Server (we recommend MariaDB and regularly test against versions MariaDB 5.5 and MySQL 5.7)
- PHP 8.0.0 or higher; on Ubuntu also the "php8.0-intl" package
- Required PHP extensions: "gettext", "openssl", "PECL:IMagick", "GD" and "MySQL"
- Optional PHP extensions: "GeoIP" (deprecated v1 GeoIP API)
- simpleSAMLphp version 2.0.0 or higher (included as a composer dependency)
- NSIS 3.00 or higher - either as a native Linux binary or on Wine
- zip
- wpa_supplicant (eapol_test utility, with support for all contemporary EAP methods compiled in - esp. EAP-FAST)
- OpenSSL
Here are some extra configuration hints for these packages:
-
Operating System
language display needs the corresponding locales to be installed (check config/config-template.php for the exact list of locales that CAT can support right now)
for better entropy for cryptographic operations (important particularly for Managed IdP deployments), be sure to have "haveged" service installed and running
-
MySQL / MariaDB
the timezone should be set to UTC in my.cnf
-
Apache
the Directory for installer downloads (configurable, defaults to web/downloads/ ) needs to have "AllowOverrides FileInfo" set
the directories under web/ need to be accessible from DocumentRoot
the CAT log dir (configurable, defaults to /var/log/CAT/ ) needs to be accessible for writing
for general server hardening, the following configuration tokens should be set: - ServerSignature Off - ServerTokens ProductOnly - TraceEnable Off
the following header directives should be configured: - Header always set x-xss-protection "1; mode=block" - Header always set x-frame-options "SAMEORIGIN" - Header always set x-content-type-options "nosniff"
if you want to use client certificates for administrative user authentication, be sure set a sufficiently large SSL Renegotiation Buffer size (e.g. SSLRenegBufferSize 10486000 for 10 MB max. upload size)
There are custom error pages for 404 etc. in web/404.php etc. If you want to use them, set ErrorDocument 404 /.../404.php etc. in your Apache virtual host config.
-
PHP
for general server hardening, the following option should be set in php.ini: "expose_php 0"
for cookie security, the following options should be set in php.ini: "session.cookie_httponly 1" and "session.cookie_secure 1"
the extension php-gmp is needed when enabling Silverbullet functionality
To send mails, PHPMailer v6 needs to be on your system. If your package manager does not provide it, you can download the tarball from GitHub and place it in the directory core/PHPMailer
-
simpleSAMLphp
configure it as a service provider, authenticating towards an IdP of your choice. Attribute mapping is defined in config.php
-
NSIS
needs to have the plug-in "nsArray"
"makensis" needs to be configured in the config/config.php file and executable
-
GeoIP
API Version 1:
best install as a system package or use instructions from http://dev.maxmind.com/geoip/downloadable#PHP-7 or http://php.net/manual/en/geoip.installation.php
download GeoLiteCity and GeoLiteCityv6 databases from http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz and http://geolite.maxmind.com/download/geoip/database/GeoLiteCityv6.dat.gz
unzip them and copy into GeoIP directory changing names to GeoCity.dat and GeoCityv6.dat (the directory is /usr/share/GeoIP or something similar, GeoIP will display an error message if the database is missing and you will be able to guess the required location).
arrange for downloads each month (databases are updated on the first Thursday of each month)
API Version 2:
TBD
- unpack the distribution 1A. if you use a clone of the Git repo instead, remember to "git submodule --init --recursive" at least for the GEANTlink repo in devices/ms/Files/ (there are more submodules referenced in core/ which you may already have on your system, you should double-check)
- create the config/config-master.php file from the supplied template config-master-template.php
- create the config/config-diagnostics.php and/or config/config-confassistant.php files as needed in the same manner
- create the devices/Devices.php file from the supplied template
- on a MySQL/MariaDB server, create the databases as per the schema definition in schema/schema.sql
- make sure that you can connect to that database
- make sure that the var/installer_cache, var/silverbullet and var/tmp directories exists and are writeable to the Apache web server user
- make sure that simpleSAMLphp is installed
- make sure that simpleSAMLphp openid module is enabled and google (or any IdP of your choice) is uncommented in authsources
- create a symlink web/external/jquery/jquery.js pointing to the most current version of jQuery. When installing CAT from composer, the most recent version will be available in vendor/components/jquery/jquery.min.js (the version shipped inside the distribution may not be the most current one!)
- using your browser, check if the main interface is running (web subdirectory)
- if so, go to the master management page to have your system prerequisites checked (web/admin/112365365321.php)
After creating config-*.php as above, adapt it to your needs and the realities on your server. In particular, pay attention to the following:
- reference the autoloader of your simpleSAMLphp installation correctly in config-master.php
- enter the connection details to the database(s)
The device configuration file is in devices/Devices.php. There is a template file devices-template.php - you can simply copy it to have a Devices.php. Unless you want to disable specific device modules, or have custom ways to digitally sign installers, it is not necessary to change this file.
After logging in with simpleSAMLphp, you should enable protection of the superadmin page. This can be done by editing the config-master "SUPERADMINS" array - remove everything and instead add only the unique identifiers that are supposed to have access to that page.
Similarly, you may want to make yourself the federation administrator for at least one federation. You can do so by adding that privilege to your unique identifier with the following SQL statement in the USER database (in this example, for "LU" -> Luxembourg):
INSERT INTO user_options (user_id, option_name, option_value) VALUES("<your unique ID>","user:fedadmin","LU");
- edit the shell script utils/ocsp_update-template.sh to make it point to the location of the OCSP responder.
- make sure SSH access to the OCSP responder works without user interaction using the configured access details.
- set up cron job to run the shell script utils/ocsp_update-template.sh regularly (e.g. once per hour)
CAT ships with a default look-and-feel for the eduroam consortium. You can adapt most of its appearance to your local needs by changing colours and images. The sources for the images are scattered around the source tree. Here is a list of LOGOs to edit:
- web/resources/images/consortium_logo.png (website main logo)
- web/resources/images/gradient-bg.png (gradient top-down for the adverising 'film roll'
- web/resources/images/screenshots/* (sample installers on 'film roll' - supplied ones carry digital sig from TERENA and eduroam logo; might not be appropriate for your use
- web/favicon.ico (website favicon)
- devices/ms/Files/eduroam_150.bmp (logo to embed in Microsoft installers)
- devices/ms/Files/eduroam32.ico (window icon for Microsoft installers)
- devices/ms/Files/cat_bg.bmp (background for front page on windows installers)
The colours are all configured in the web/resources/css/ directory.
- The default eduroam colour number 1 is #BCD7E8 (light blue). Change it to your own colours as needed.
- The default eduroam colour number 2 is #0A698E (dark blue). Change it to your own colours as needed.