Gluu Casa Quick Start Guide#
Gluu Casa is a self-service web portal for end-users to manage security preferences for their account in a Gluu Server. Follow this guide to install and configure a deployment of Casa.
Casa can be installed on a VM with a pre-existing Gluu Server installation, or a new instance of the Gluu Server can be installed during Casa deployment.
The server or VM should have at least the following minimum specs:
|CPU Unit||RAM||Disk Space||Processor Type|
|2||5 GB||40 GB||64 Bit|
The following operating systems are supported:
- Ubuntu 14/16
- CentOS 6/7
- RHEL 6/7
- Debian 8/9
Casa requires an operational Gluu Server with a matching version number (e.g. Casa 3.1.6 and Gluu 3.1.6). In addition, Casa should be installed on the same server or virtual machine as the Gluu Server.
- Follow the Casa installation instructions to install the packages.
If you don't already have the Gluu Server installed, it will be automatically installed with Casa.
Do not run setup_casa.py at this time.
Set up Gluu Server#
Otherwise, skip this step.
Make sure the Gluu Server has at least the following components:
- oxAuth OAuth2 Server
- oxTrust admin GUI
- Gluu LDAP
- Apache Web Server
Set up Casa#
Once the Gluu Server is installed, run the Casa setup script.
The oxd client software is a required component to integrate Casa with the Gluu Server. It will be automatically installed with the script. When prompted, select
no to install oxd.
Configuring Casa for usage requires you to enable interception scripts in the Gluu Server, activate the authentication methods in Casa, and install and configure the 2FA settings plugin.
Interception Scripts in Gluu: Enable authentication interception scripts in the Gluu Server. Log in to oxTrust as an administrator and enable the desired 2FA credentials to be managed with Casa.
Activate authentication methods in Casa: Once the interception scripts have been enabled, they can be activated in Casa itself. Log in to Casa as an administrator and enable the desired methods.
Test enrollment and 2FA#
Enroll at least two credentials on a non-administrator user.
Turn on 2FA for the account.
Test 2FA Authentication by logging off and logging back in. Application access should now require a second authentication factor.
Once satisfied with testing, configure the Gluu Server to log in users via Casa for all applications the server protects.
Check out available plugins#
Browse our catalog of plugins to add features and expand Casa!