|
| 1 | +<?xml version="1.0" encoding="UTF-8"?> |
| 2 | +<!-- CoreConfig.xml from https://github.com/snstac/ansible-takserver --> |
| 3 | +<Configuration xmlns="http://bbn.com/marti/xml/config" |
| 4 | + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" |
| 5 | + xsi:schemaLocation="CoreConfig.xsd"> |
| 6 | + |
| 7 | + <network multicastTTL="5" serverId="serverId"> |
| 8 | + |
| 9 | + <input _name="stdssl" protocol="tls" port="8089" coreVersion="2" auth="x509" /> |
| 10 | + |
| 11 | + <!-- <input _name="stdudp" protocol="udp" port="8087" auth="anonymous"/> --> |
| 12 | + <!-- <input _name="streamtcp" protocol="stcp" port="8088" auth="anonymous"/> --> |
| 13 | + <!-- <input _name="stdtcp" protocol="tcp" port="8087" auth="anonymous"/> --> |
| 14 | + <!-- <input _name="SAproxy" protocol="mcast" group="239.2.3.1" port="6969" auth="anonymous" /> --> |
| 15 | + <!-- <input _name="GeoChatproxy" protocol="mcast" group="224.10.10.1" port="17012" auth="anonymous" /> --> |
| 16 | + <!--<announce enable="true" uid="Marti1" group="239.2.3.1" port="6969" interval="1" ip="192.168.1.137" />--> |
| 17 | + <!--<input _name="stdssl" protocol="tls" port="8089"/>--> |
| 18 | + <!--<input _name="sslauth" protocol="tls" port="8090" auth="ldap"/> --> |
| 19 | + |
| 20 | + <!--<input _name="stdtcpwithgroups" protocol="tcp" port="8087" auth="anonymous">--> |
| 21 | + <!--<filtergroup>group one</filtergroup>--> |
| 22 | + <!--<filtergroup>group two</filtergroup>--> |
| 23 | + <!--</input>--> |
| 24 | + |
| 25 | + <!--<input _name="stdtcpwithfilters" protocol="tcp" port="8087" auth="anonymous">--> |
| 26 | + <!--<filter>--> |
| 27 | + <!--<geospatialFilter>--> |
| 28 | + <!--<boundingBox minLongitude="-80" minLatitude="34" maxLongitude="-70" maxLatitude="36" />--> |
| 29 | + <!--<boundingBox minLongitude="-100" minLatitude="34" maxLongitude="-90" maxLatitude="36" />--> |
| 30 | + <!--</geospatialFilter>--> |
| 31 | + <!--</filter>--> |
| 32 | + <!--</input>--> |
| 33 | + |
| 34 | + <!-- web connectors --> |
| 35 | + <connector port="8443" _name="https"/> |
| 36 | + <!-- <connector port="8451" _name="https" enableAdminUI="true" enableWebtak="false" /> --> |
| 37 | + <!-- <connector port="8452" _name="https" enableAdminUI="false" enableWebtak="true" /> --> |
| 38 | + <!-- <connector port="8453" _name="https" enableAdminUI="false" enableWebtak="false" enableNonAdminUI="false"/> --> |
| 39 | + |
| 40 | + <connector port="8444" useFederationTruststore="true" _name="fed_https"/> |
| 41 | + <!-- <connector port="8446" clientAuth="false" _name="cert_https" enableWebtak="false"/> --> |
| 42 | + |
| 43 | + <connector port="8446" clientAuth="false" _name="cert_https"/> |
| 44 | + <!-- <connector port="8446" clientAuth="false" _name="cert_https" keystore="JKS" keystoreFile="certs/files/letsencrypt/demo.snstak.net.jks" keystorePass="atakatak"/> --> |
| 45 | + <!-- <connector port="8080" tls="false" _name="http_plaintext"/> --> |
| 46 | + </network> |
| 47 | + |
| 48 | + <auth> |
| 49 | + <!-- Example OpenLDAP --> |
| 50 | + <!-- |
| 51 | + <ldap |
| 52 | + url="ldap://hostname.bbn.com/" |
| 53 | + userstring="uid={username},ou=People,dc=XXX,dc=bbn,dc=com" |
| 54 | + updateinterval="60" |
| 55 | + style="DS" |
| 56 | + /> |
| 57 | + --> |
| 58 | + |
| 59 | + <!-- Example ActiveDirectory --> |
| 60 | + |
| 61 | + <!--NOTE!! In the example below, GroupBaseDN should be specified relative to the naming context provided in the url attribute below --> |
| 62 | + <!-- |
| 63 | + <ldap |
| 64 | + url="ldap://hostname.bbn.com/dc=XXX,dc=bbn,dc=com" |
| 65 | + userstring="DOMAIN\{username}" |
| 66 | + updateinterval="60" |
| 67 | + groupprefix="" |
| 68 | + style="AD" |
| 69 | + ldapSecurityType="simple" |
| 70 | + serviceAccountDN="cn=fred001,cn=Users,cn=Partition1,dc=XYZ,dc=COM" |
| 71 | + serviceAccountCredential="XXXXXX" |
| 72 | + groupObjectClass="group" |
| 73 | + groupBaseRDN="CN=Groups"/> |
| 74 | + /> |
| 75 | +
|
| 76 | + --> |
| 77 | + <File location="UserAuthenticationFile.xml"/> |
| 78 | + </auth> |
| 79 | + |
| 80 | + <submission ignoreStaleMessages="false" validateXml="false"/> |
| 81 | + |
| 82 | + <subscription reloadPersistent="false"> |
| 83 | + <!-- example static subscription that publishes messages to a UDP multicast address and port --> |
| 84 | + <!-- <static _name="MulticastProxy" protocol="udp" address="239.2.3.1" port="6969" /> --> |
| 85 | + </subscription> |
| 86 | + |
| 87 | + <repository enable="true" numDbConnections="200" primaryKeyBatchSize="500" insertionBatchSize="500"> |
| 88 | + |
| 89 | + <connection url="jdbc:postgresql://127.0.0.1:5432/cot" username="martiuser" password="4mEt48lCJgar2yq" /> |
| 90 | + |
| 91 | + <!-- <connection url="jdbc:postgresql://127.0.0.1:5432/cot" username="martiuser" |
| 92 | + sslEnabled="true" sslMode="verify-ca" |
| 93 | + sslCert="certs/files/martiuser.pem" sslKey="certs/files/martiuser.key.pk8" |
| 94 | + sslRootCert="certs/files/ca.pem"/> --> |
| 95 | + |
| 96 | + </repository> |
| 97 | + |
| 98 | + <repeater enable="true" periodMillis="3000" staleDelayMillis="15000"> |
| 99 | + <!-- Examples --> |
| 100 | + <repeatableType initiate-test="/event/detail/emergency[@type='911 Alert']" cancel-test="/event/detail/emergency[@cancel='true']" _name="911"/> |
| 101 | + <repeatableType initiate-test="/event/detail/emergency[@type='Ring The Bell']" cancel-test="/event/detail/emergency[@cancel='true']" _name="RingTheBell"/> |
| 102 | + <repeatableType initiate-test="/event/detail/emergency[@type='Geo-fence Breached']" cancel-test="/event/detail/emergency[@cancel='true']" _name="GeoFenceBreach"/> |
| 103 | + <repeatableType initiate-test="/event/detail/emergency[@type='Troops In Contact']" cancel-test="/event/detail/emergency[@cancel='true']" _name="TroopsInContact"/> |
| 104 | + </repeater> |
| 105 | + |
| 106 | + <dissemination smartRetry="false" /> |
| 107 | + |
| 108 | + <filter> |
| 109 | + <flowtag enable="true" text=""/> |
| 110 | + <streamingbroker enable="true"/> |
| 111 | + <!-- |
| 112 | + <injectionfilter enable="false"/> |
| 113 | + <dropfilter> |
| 114 | + <typefilter type="u-d-p" /> |
| 115 | + <typefilter type="u-d-c" /> |
| 116 | + </dropfilter> |
| 117 | + --> |
| 118 | + <scrubber enable="false" action="overwrite"/> |
| 119 | + </filter> |
| 120 | + |
| 121 | + <buffer> |
| 122 | + <latestSA enable="true"/> |
| 123 | + <queue/> |
| 124 | + </buffer> |
| 125 | + |
| 126 | + <security> |
| 127 | + <tls context="TLSv1.2" |
| 128 | + keymanager="SunX509" |
| 129 | + keystore="JKS" keystoreFile="certs/files/takserver.jks" keystorePass="atakatak" |
| 130 | + truststore="JKS" truststoreFile="certs/files/truststore-root.jks" truststorePass="atakatak"> |
| 131 | + <!-- <crl _name="TAKServer CA" crlFile="certs/files/ca.crl"/> --> |
| 132 | + |
| 133 | + </tls> |
| 134 | + |
| 135 | + <!-- previous locations of keystore and truststore --> |
| 136 | + <!-- |
| 137 | + <tls context="TLSv1.2" |
| 138 | + keymanager="SunX509" |
| 139 | + keystore="JKS" keystoreFile="certs/TAKServer.jks" keystorePass="atakatak" |
| 140 | + truststore="JKS" truststoreFile="certs/truststore.jks" truststorePass="atakatak"> |
| 141 | + </tls> |
| 142 | + --> |
| 143 | + |
| 144 | + </security> |
| 145 | + |
| 146 | + <federation> |
| 147 | + <federation-server port="9000" v1enabled="false" v2port="9001" v2enabled="true"> |
| 148 | + <tls context="TLSv1.2" |
| 149 | + keymanager="SunX509" |
| 150 | + keystore="JKS" keystoreFile="certs/files/takserver.jks" keystorePass="atakatak" |
| 151 | + truststore="JKS" truststoreFile="certs/files/fed-truststore.jks" truststorePass="atakatak"/> |
| 152 | + </federation-server> |
| 153 | + </federation> |
| 154 | + |
| 155 | +<!-- previous locations of federate keystore and truststore --> |
| 156 | + |
| 157 | +<!-- |
| 158 | +<tls context="TLSv1.2" |
| 159 | + keymanager="SunX509" |
| 160 | + keystore="JKS" keystoreFile="certs/TAKServer.jks" keystorePass="atakatak" |
| 161 | + truststore="JKS" truststoreFile="certs/fed-truststore.jks" truststorePass="atakatak"/> |
| 162 | + --> |
| 163 | + |
| 164 | + <certificateSigning CA="TAKServer"> |
| 165 | + <certificateConfig> |
| 166 | + <nameEntries> |
| 167 | + <nameEntry name="O" value="SNSTAC"/> |
| 168 | + <nameEntry name="OU" value="SNSTAK"/> |
| 169 | + </nameEntries> |
| 170 | + </certificateConfig> |
| 171 | + <TAKServerCAConfig keystore="JKS" keystoreFile="certs/files/ca-signing.jks" keystorePass="atakatak" validityDays="90" signatureAlg="SHA256WithRSA" CAcertificate="certs/files/intermediate"/> |
| 172 | + </certificateSigning> |
| 173 | + |
| 174 | +<!-- |
| 175 | +<certificateSigning CA="{TAKServer | MicrosoftCA}"> |
| 176 | + <certificateConfig> |
| 177 | + <nameEntries> |
| 178 | + <nameEntry name="O" value="Test Org Name"/> |
| 179 | + <nameEntry name="OU" value="Test Org Unit Name"/> |
| 180 | + </nameEntries> |
| 181 | + </certificateConfig> |
| 182 | + <TAKServerCAConfig |
| 183 | + keystore="JKS" |
| 184 | + keystoreFile="certs/files/intermediate-signing.jks" |
| 185 | + keystorePass="atakatak" |
| 186 | + validityDays="30" |
| 187 | + signatureAlg="SHA256WithRSA" /> |
| 188 | + <MicrosoftCAConfig |
| 189 | + username="{MS CA Username}" |
| 190 | + password="{MS CA Password}" |
| 191 | + truststore="/opt/tak/certs/files/keystore.jks" |
| 192 | + truststorePass="atakatak" |
| 193 | + svcUrl="https://{server}/{CA name}_CES_UsernamePassword/service.svc" |
| 194 | + templateName="Copy of User"/> |
| 195 | +</certificateSigning> |
| 196 | +--> |
| 197 | + |
| 198 | + <vbm enabled="false" /> |
| 199 | + |
| 200 | +</Configuration> |
0 commit comments