Fortify App📜
Pre Deployment Configuration📜
- How to create java keystore?
 - 
you need to create pkcs12 java keystore add certificate and key using openssl.
bash openssl pkcs12 -export -in <client-cert.pem> -inkey <client-key.pem> -out fortify-keystore.jks -name <Alias Name>
 - 
Validate certs in keystore
bash keytool -list -v -keystore fortify-keystore.jks
 
Post Install Configuration📜
- 
Prerequisites:
 - 
Keycloak is available to fortify
- Make sure you configure a valid redirect URL to
 
https://${FORTIFY_URL}/saml/SSO/alias/- 
Make sure you configure a valid logout URL
 - 
saml_single_logout_service_url_post:http://${FORTIFY_URL}/saml/SingleLogout/alias/ssc` 
 - 
Keycloak realm metadata is available from keycloak. To verify please try follow below steps
curl https://${KEYCLOAK_DNS}/auth/realms/${REALM_NAME}/protocol/saml- with above command you should get a 
200response and also xml file with data to connect to IDP(Identity Provider(Keycloak)) 
 - 
Keystore password
- secret name ref:
 - Name: 
fortify-secret - Data: 
httpCertificateKeystorePassword 
 - 
Certificate password
- secret name ref:
 - Name: 
fortify-secret - Data: 
httpCertificateKeyPassword 
 - 
Post Configuration:
 - 
Login into the Fortify web UI using the default user credentials
username/password: admin/admin. It will prompt you to update your password immediately.
 - 
Complete login with new credentials
 - 
Now you need to setup SSO with SAML
 - 
Navigate to administration page and select configuration on left sidebar of the administration page.

 - 
Select SSO in the configuration section, it will show a drop down menu for SSO options.

 - 
From the drop down select SAML, by default most of the values are populated already.

 - 
set the keystore password and signing and encryption key.

 - 
Save the config.
 - 
Now go to argocd and kill the fortify pod.( Note: Just kill the pod to restart service and wait for approx:3 min).


 - 
Now try to access your fortify URL, it will redirect back to keycloak.