Before you begin
what you will need from identité®
1. Access to installation files
For downloading install script and dependencies, go to Configuration files .
2. Docker hub credentials
Please use the following docker hub credentials:
Login: secure
Password: PUrb6LQWbE5p.
3. Product license(s)
For registering and using NoPass™, request the NoPass™ Server license.
For registering Keycloak and/or your login portal, request the Keycloak and/or Login Portal license.
NoPass™ urls
Your selection of NoPass™ product schemas determines which URLs from your Domain zone you will need to allocate.
Together these URLs are used by Identité® to generate your NoPass™ license.
This license will be used later in the process to register services with NoPass™.
required
- NoPass™ Server URL (Ex. Nopass.<your_domain>.com).
This URL is used for registering your specific NoPass™ products.
INTEGRATION SPECIFIC OPTIONS
- NoPass™ Consumer "Web Portal" (Ex. Login.<your_domain>.com).
This will be the user login portal for your instance of NoPass™. - NoPass™ Employee SSO "SAML/OIDC" (Ex. Sso.<your_domain>.com).
This will be the admin user login portal for Keycloak IdP. -
NoPass™ Employee MFA "RADIUS" and NoPass™ Desktop Unlock.
Employee MFA and Desktop Unlock use the Required NoPass™ Server URL above.
DNS
Create a new DNS record, pointing to the public address of the server. You should create a DNS record for every one of your service URLs that were chosen at the start.
| your.domain.name | record type | value | TTL |
| nopass | A/AAAA | your server ip-address | 14400 |
License Request
Send a license request to salesengineering@identite.us.
Make sure your request contains the following information: service type, portal domain name, service domain name. In the table below, see the example request information depending on a certain NoPass™ product.
| Request info | NoPass™ Consumer | NoPass™ SDK | NoPass™ Employee MFA | NoPass™ Employee SSO | NoPass™ Desktop Unlock |
| Service type | Portal service | SDK | RADIUS service | Identity provider | Desktop Unlock |
| Portal domain name | <portal.example.com>:port | <portal.example.com>:port | RADIUS:local | https://{keycloakurl}/auth/realms/{realm} | - |
| Service domain name | nopass.<example.com>:port | nopass.<example.com>:port | radiusservice.<example.com>:port | nopass.<example.com>:port | nopass.<example.com>:port |
| Android app package name | N/A | + | N/A | N/A | |
| iOS app bundle ID | N/A | + | N/A | N/A | N/A |
SSL CERTIFICATES
You need an SSL key pair private and public key to establish an encrypted connection via https. They should cover the nopass.your.domain.name address. Certificates should be issued from publicly recognized Certificate Authority - Self Signed Certificates will not work. Wildcard certificates are fine.
Create or obtain SSL certificates from your domain provider.
An SSL certificate signed by Public Certification Authorities (NOT a self-signed certificate).
- The purpose of SSL and certificates is encryption and identification to ensure that the communication exchange between the two parties is secure and trustworthy.
- SSL certificate for domain validation. You must use certificates signed by Public Certification Authorities.
Ensure you have included the intermediate and root CAs in the public part of the certificate.
DO NOT SUPPORT a self-signed certificate.If you are experiencing any issues or have any questions about the documentation, please contact support at support@identite.us.