The new AG DSN management system
- Java 8+ (plan: Java 10)
- Maven
- PostGreSQL
- Nice to have: LDAP server for authentification
Clone this repository, then build with maven:
mvn clean package
German introduction to maven:
- http://jukusoft.com/2016/10/24/tutorial-eine-einfuehrung-in-maven-teil-1/
- http://jukusoft.com/2016/10/29/tutorial-einfuehrung-maven-teil-2/
If you want to use your real login password (instead of "test"), you will need a LDAP server.
For AGDSN you have to be in internal management network or add a port forwarding for 127.0.0.1:389 --> IDM Server:389
You can add port a forwarding with Bitvise for example:
Change your jcroft config (will be created on first run) to use your tunnel to the LDAP authentication database.
settings/jcroft.cfg:
; Welcome to the JCroft configuration section
; When this option is enabled, JCroft accepts the password "test" for any existing user (no LDAP connection needed then)
auth_test=true
; Session timeout in seconds
session_timeout=600
; LDAP authentication for JCroft users
ldap_host=localhost
ldap_port=389
; database connection
jdbc_ip=localhost
jdbc_port=5432
jdbc_user=jcroft
jdbc_password=ENTER YOUR PASSWORD HERE
jdbc_database=jcroft
; hibernate configuration (only change this, if you know, what you do)
hibernate.hbm2ddl.auto=update
hibernate.dialect=org.hibernate.dialect.PostgreSQL95Dialect
; hazelcast cluster configuration
hz_group_name=dev
hz_group_password=dev-pass
hz_instance_name=cache-1
hz_members=127.0.0.1,127.0.0.2
Currently we use an PostGreSQL database with JPA / Hibernate and Hazelcast.
(Maybe outdated) database schema (WIP):
- Privacy by design (DSGVO-conform)