Deprecated. This material represents early efforts and may be of interest to historians. It doe not describe current VIVO efforts.
...
The runtime.properties file can accept many additional properties, but most of them don't apply to the standard installation. If you choose any of the Installation options, you may need to set some of those properties.
Warning |
---|
TBD |
Most Tomcat installations can be started by running startup.sh
or startup.bat
in Tomcat's bin
directory. Start Tomcat and direct your browser to http://localhost:8080/vivo
to test the application. Note that Tomcat may require several minutes to start VIVO.
...
Warning |
---|
TBD |
Warning |
---|
TBD |
...
Warning |
---|
TBD |
Warning | ||||
---|---|---|---|---|
External authentication: If you want to use an external authentication system like Shibboleth or CUWebAuth, you will need to set an additional property in this file. See the step below entitled Using an External Authentication System with VIVO.
|
...
If you have completed the previous steps, you have good indications that the installation was successful.
The startup status will indicate if the basic configuration of the system was successful. If there were any serious errors, you will see the status screen and will not be allowed to continue with VIVO. If there are warnings, you will see the status screen when you first access VIVO, but after that you may use VIVO without hinderance. In this case, you can review the startup status from siteAdmin -> Startup status.
Here is a simple test to see whether the ontology files were loaded:
Here is a test to see whether your system is configured to serve linked data:
rootUser.emailAddress
you set up in Step IV. If this is your first time logging in, you will be prompted to change the password.Finally, test the search index.
Warning |
---|
TBD |
Most sites choose to configure their VIVO system with an Apache HTTPD web server to accept requests and then proxy them to the VIVO Tomcat context. This will make Vitro available at http://example.com
instead of http://example.com:8080/vitro
. It will also allow the use of external authentication.
Setup HTTPD to send all of the requests that it receives to Tomcat's AJP connector. This can be done in HTTPD 2.x with a simple directive in httpd.conf:
Code Block |
---|
ProxyPass / ajp://localhost:8009/ |
Modify the <Host> in Tomcat server.xml (located in [tomcat root]/conf/
) so that the context path is empty to allow VIVO to be servred from the root path. Locate the <Host name="localhost"...>
directive and update as follows:
Code Block |
---|
<Host name="localhost" appBase="webapps"
DeployOnStartup="false"
unpackWARs="true" autoDeploy="false"
xmlValidation="false" xmlNamespaceAware="false">
<Alias>example.com</Alias>
<Context path=""
docBase="/usr/local/tomcat/webapps/vitro"
reloadable="true"
cookies="true" >
<Manager pathname="" />
</Context>
... |
After setting up the above, it is recommended that you modify the Tomcat AJP connector parameters in server.xml. Look for the <connector> directive and add the following properties:
Code Block |
---|
connectionTimeout="20000" maxThreads="320" keepAliveTimeout="20000" |
Note: the value for maxThreads (320) is equal or greater than the value for MaxClients in the apache's httpd.conf
file.
Warning |
---|
TBD |
Warning | ||||
---|---|---|---|---|
External authentication: If you want to use an external authentication system like Shibboleth or CUWebAuth, you will need to set an additional property in this file. See the step below entitled Using an External Authentication System with VIVO.
|
Warning |
---|
VIVO can be configured to work with an external authentication system like Shibboleth or CUWebAuth.
VIVO must be accessible only through an Apache HTTP server. The Apache server will be configured to invoke the external authentication system. When the user completes the authentication, the Apache server will pass a network ID to VIVO, to identify the user.
If VIVO has an account for that user, the user will be logged in with the privileges of that account. In the absence of an account, VIVO will try to find a page associated with the user. If such a page is found, the user can log in to edit his own profile information.
Your institution will provide you with instructions for setting up the external authentication system. The Apache server must be configured to secure a page in VIVO. When a user reaches this secured page, the Apache server will invoke the external authentication system.
For VIVO, this secured page is named: /loginExternalAuthReturn
When your instructions call for the location of the secured page, this is the value you should use.
To enable external authentication, VIVO requires two values in the runtime.properties
file.
Property name | externalAuth.netIdHeaderName |
---|---|
Description |
The name of the HTTP header that will hold the external user's network ID.When a user completes the authentication process, the Apache server will put the user's network ID into one of the headers of the HTTP request. The instructions from your institution should tell you which header is used for this purpose.
|
Default value | NONE |
Example value | remote_userID |
Property name | selfEditing.idMatchingProperty |
---|---|
Description | Associating a User with a profile page.VIVO will try to associate the user with a profile page, so the user may edit his own profile data. VIVO will search the data model for a person with a property that matches the User’s network ID (the value of the property must be either a String literal or an untyped literal). You need to tell VIVO what property should be used for matching. This property is also mentioned in the insructions for A simple installation, because it can also be useful for sites that do not use external authentication. |
Default value | NONE |
Example value | http://vivo.mydomain.edu/ns#networkId |
Finally, you will need to provide text for the Login button.
In your theme, add a line to the all.properties
file, like this one:
external_login_text = [the text for your login button]For example:
external_login_text = Log in using BearCat Shibboleth
The VIVO login form will display a button labelled "Log in using BearCat Shibboleth".If your site supports additional languages, add lines to the corresponding files. For example, all_es.properties
might contain this line:
external_login_text = Entrar usando Shibboleth GatoOso
...
Warning | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Warning |
---|
TBD |
Warning |
---|
TBD |
|
Warning |
---|
TBD |
Warning |
---|
TBD |
Warning | ||||
---|---|---|---|---|
|
Warning | |
---|---|
VIVO now supports an extension of the OpenSocial API, known as Open Research Networking Gadgets, or ORNG (pronounced "ORNG") (see http://www.opengadgets.org/index.html). Configuring VIVO to support ORNG requires several steps, including additions to the VIVO properties, modifications to Tomcat, creating a security key for safe network operations, and running a build script. For instructions, consult the file setting_up_orng.html in this directory. | |
Warning | |
These values are used when deploying VIVO as an OpenSocial container and integrating with OpenSocial gadgets (see Step 13, below). If you are creating a VIVO installation that does not use OpenSocial gadgets, these values are omitted. | OpenSocial.shindigURL OpenSocial.tokenService OpenSocial.tokenKeyFile OpenSocial.sandbox |
...