Documentation for Crowd 2.5. Documentation for other versions of Crowd is available too.
You can use Crowd to provide external authentication and authorisation for Atlassian's FishEye source-repository viewer.
Crowd supports centralised authentication and single sign-on (SSO) for FishEye versions 1.3.1 and later.
Crucible と FisheEYe
If you are using Atlassian's Crucible code review tool, you will need to follow the instructions below on integrating Crowd with FishEye. If you have the standalone version of Crucible without FishEye (available from Crucible 1.6), please follow the instructions below to set up the Crowd directory and application for Crucible instead of FishEye. If preferred, you can change the name of your Crowd application and directory to 'Crucible' rather than 'FishEye'. Then follow the further instructions to integrate Crowd with Crucible.
On this page:
CROWD
.FISHEYE
.Crowd Client JAR
Please make sure you use the default Crowd client JAR that ships with FishEye. In particular, FishEye is not compatible with the crowd-integration-client-2.0.7.jar
that is bundled with Crowd 2.0.7. See the Crowd 2.0.7 Release Notes.
The FishEye application will need to authenticate users against a directory configured in Crowd. You will need to set up a directory in Crowd for FishEye. For more information on how to do this, see Adding a Directory. We will assume that the directory is called FishEye Directory for the rest of this document. It is possible to assign more than one directory for an application, but for the purposes of this example, we will use FishEye Directory to house FishEye users.
If you wish to use Crowd groups to control access to your FishEye repositories, you should set up your groups in Crowd. See the documentation on Creating Groups for more information on how to define these groups.
Use Crowd to create at least one user in the FishEye Directory. If you are using groups, assign your user(s) to the appropriate groups. The Crowd documentation has more information on creating users and assigning users to groups.
Crowd needs to be aware that the FishEye application will be making authentication requests to Crowd. We need to add the FishEye application to Crowd and map it to the FishEye Directory:
Once Crowd is aware of the FishEye application, Crowd needs to know which users can authenticate (log in) to FishEye via Crowd. As part of the 'Add Application' wizard, you will set up your directories and group authorisations for the application. If necessary, you can adjust these settings after completing the wizard. Below are some examples.
You can either allow entire directories to authenticate, or just particular groups within the directories. In our example, we will allow the entire FishEye Directory to authenticate:
If you wish to authorise specific groups only, please see Mapping a Directory to an Application and Specifying which Groups can access an Application.
As part of the 'Add Application' wizard, you will set up FishEye's IP address. This is the address which FishEye will use to authenticate to Crowd. If necessary you can add a hostname, in addition to the IP address, after completing the wizard. See Specifying an Application's Address or Hostname.
The instructions below are for FishEye 1.4.x and later. If you are using FishEye 1.3.x, please follow the guide for earlier versions of FishEye.
If you have an existing FishEye installation with existing built-in users, please do the following for each username in FishEye:
http://localhost:8095/crowd/services/
crowd.token
cookies. This is useful in environments where you want FishEye to ignore crowd.token
cookies set by other Crowd-enabled applications.
For more information, please see the FishEye documentation on configuring external authentication sources.
If you have groups in the Crowd directory that is mapped to your FishEye application (see Step 1 above), the Crowd groups can be seen in FishEye. You can use those groups to control access to your FishEye repositories.
See Permissions in the FishEye documentation for details.
You set the basic Crowd properties, such as the application name, password and URL, using the FishEye adminstration screens (described above). You can also fine tune your Crowd integration by overriding the default Crowd properties, such as the session validation interval and SSO cookie name, by manually editing the config.xml
file in your FishEye installation directory.
To override the default Crowd properties:
config.xml
file in your <FishEye home directory>
(the folder where you installed FishEye).<crowd-properties>
element to the file. Override the default values for any of the Crowd properties (described in the crowd.properties file) by adding the property in the <crowd-properties>
section with the desired value.
For example, your config.xml
file should look like this, if you want to set the session.validationinterval
to 20 minutes:
<config control-bind="127.0.0.1:8059" version="1.0"> <crowd-properties> session.validationinterval=20 </crowd-properties> </config>
Note that FishEye 2.8, and later, overrides the Crowd defaults with these values:
プロパティ | Crowd Default | FishEye 2.8+ |
http.timeout | 5000 (millisecs) | 5000 (millisecs) |
socket.timeout | 600000 (milliseconds) | 20000 (millisecs) |
If you are using Atlassian's Crucible code review tool, please take a look at the further instructions on integrating Crowd with Crucible.