Skip to content

Commit 2842fb5

Browse files
kimburgessgitbook-bot
authored andcommitted
GitBook: [master] 76 pages modified
1 parent 002ce16 commit 2842fb5

File tree

20 files changed

+70
-77
lines changed

20 files changed

+70
-77
lines changed

README.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,16 @@
11
---
22
description: >-
3-
ACAEngine is a platform for creating digital experiences for physical
3+
Engine is a platform for creating digital experiences for physical
44
environments. It connects devices, hardware systems and third-party software
55
to provide an API for the built environment.
66
---
77

8-
# What is ACAEngine
8+
# What is Engine?
99

1010
{% hint style="success" %}
1111
If you’ve used traditional, hardware-based control systems before, welcome to the new world.
1212
{% endhint %}
1313

14-
>
15-
1614
* **Software only** built on the modern web.
1715
* **Open source** continuously improved and backed by a full-time team of developers.
1816
* **Extensible** able to run stand-alone, or integrated into staff, building or third party apps.
@@ -31,5 +29,5 @@ There are no restrictions on what can be built, but here are some examples of [w
3129

3230
## Who builds it?
3331

34-
[ACA Projects](https://www.acaprojects.com/staff) are a fast-paced team of developers and designers based across Australia, Singapore, Hong Kong, Shanghai and London. We believe in modern tech and despise black boxes.
32+
[Place Technology](https://place.technology) is a team of developers, designers and technologists based across Australia, Singapore, Hong Kong, Shanghai and London. We believe in modern tech and despise black boxes.
3533

SUMMARY.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Table of contents
22

3-
* [What is ACAEngine](README.md)
3+
* [What is Engine?](README.md)
44
* [Key Concepts](key-concepts/README.md)
55
* [Drivers](key-concepts/drivers.md)
66
* [Modules](key-concepts/modules.md)
@@ -15,7 +15,7 @@
1515

1616
* [System Architecture](deployment/architecture.md)
1717
* [Single Sign-On](deployment/single-sign-on/README.md)
18-
* [Configuring ACAEngine for SAML2](deployment/single-sign-on/configuring-acaengine-for-saml2.md)
18+
* [Configuring Engine for SAML2](deployment/single-sign-on/configuring-acaengine-for-saml2.md)
1919
* [SAML2 with Azure AD](deployment/single-sign-on/saml2-with-azure-ad.md)
2020
* [SAML2 with ADFS](deployment/single-sign-on/saml2-with-adfs.md)
2121
* [SAML2 with Auth0](deployment/single-sign-on/saml2-with-auth0.md)
@@ -93,6 +93,5 @@
9393

9494
## Support
9595

96-
* [Tech Chat](support/chat.md)
9796
* [Service Desk](https://support.acaprojects.com)
9897

deployment/architecture.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# System Architecture
22

3-
ACAEngine is packaged and distributed as a set of Docker containers for deployment within private cloud, or on-premise infrastructure. All application components run on hosts owned and managed by your organistation.
3+
Engine is packaged and distributed as a set of Docker containers for deployment within private cloud, or on-premise infrastructure. All application components run on hosts owned and managed by your organistation.
44

55
## Application Services
66

@@ -24,15 +24,15 @@ A dedicated search service is used to provide fast, efficient access to informat
2424

2525
## External Components
2626

27-
In addition to the core application services, a number of external components contribute to the overall deployment environment. These are not created as part of ACAEngine, but may require configuration as part of the deployment.
27+
In addition to the core application services, a number of external components contribute to the overall deployment environment. These are not created as part of Engine, but may require configuration as part of the deployment.
2828

2929
### ![](../.gitbook/assets/components-client.svg) Clients
3030

31-
Clients are devices running interfaces distributed by Web nodes, or native apps and other services which use the ACAEngine API. Common examples may be a phone running a staff app, room booking panels or wayfinding displays.
31+
Clients are devices running interfaces distributed by Web nodes, or native apps and other services which use the Engine API. Common examples may be a phone running a staff app, room booking panels or wayfinding displays.
3232

3333
### ![](../.gitbook/assets/components-identity.svg) Identity Provider
3434

35-
Interactions with ACAEngine must be associated with a valid user. To simplify UX and improve security, authentication integrates tightly with existing identity providers operating in an environment. This may be services such as Azure AD, Google Sign-In or other services providing SAML or OAuth2 endpoints.
35+
Interactions with Engine must be associated with a valid user. To simplify UX and improve security, authentication integrates tightly with existing identity providers operating in an environment. This may be services such as Azure AD, Google Sign-In or other services providing SAML or OAuth2 endpoints.
3636

3737
### ![](../.gitbook/assets/components-load-balancer.svg) Load Balancer
3838

deployment/single-sign-on/configuring-acaengine-for-saml2.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,25 @@
11
---
22
description: >-
3-
Steps required for enabling SAML2 sign on for users logging in to all
4-
ACAEngine web apps
3+
Steps required for enabling SAML2 sign on for users logging in to all Engine
4+
web apps
55
---
66

7-
# Configuring ACAEngine for SAML2
7+
# Configuring Engine for SAML2
88

9-
By default, ACAEngine uses local authentication. An admin account is generated upon initial deployment and the administrator can manually create additional user accounts in the ACAEngine Backoffice \(on the Users tab\).
9+
By default, Engine uses local authentication. An admin account is generated upon initial deployment and the administrator can manually create additional user accounts in the Backoffice \(on the Users tab\).
1010

1111
Switching to federated authentication is recommended. There are 3 steps required:
1212

13-
1. In ACAEngine Backoffice, create a new SAML2 Identity provider entry
14-
2. In your organisation's SAML2 Identity provider dashboard \(e.g. Azure AD, ADFS, Auth0\), create the SAML2 Service provider for entry for ACAEngine
15-
3. Back in ACAEngine Backoffice, update the SAML2 Identity provider entry with the new details retrieved from step 2
13+
1. In Backoffice, create a new SAML2 Identity provider entry
14+
2. In your organisation's SAML2 Identity provider dashboard \(e.g. Azure AD, ADFS, Auth0\), create the SAML2 Service provider for entry for Engine
15+
3. Back in Backoffice, update the SAML2 Identity provider entry with the new details retrieved from step 2
1616

1717
## Prerequisites
1818

1919
1. The domain where users will visit to login must exist as a valid **DNS** entry
20-
2. Browsers should consider the domain secure: Valid **SSL certificates** should be in place and served by either your load balancer or the web server in front of ACAEngine.
20+
2. Browsers should consider the domain secure: Valid **SSL certificates** should be in place and served by either your load balancer or the web server in front of Engine.
2121

22-
## Step 1: Add a new SAML2 authentication source to ACAEngine
22+
## Step 1: Add a new SAML2 authentication source
2323

2424
1. Login as an admin to backoffice \([https://&lt;engine-url&gt;/backoffice/\](https://<engine-url>/backoffice/\)\)
2525
2. On the **Domains** tab, select the Domain that represents the URL you wish to enable SAML2 for.
@@ -80,7 +80,7 @@ Switching to federated authentication is recommended. There are 3 steps required
8080
2. Example: If you copied _"_[https://engine.example-organisation.com/auth/adfs?id=adfs-XXXXXXXX](https://engine.example-organisation.com/auth/adfs?id=adfs-XXXXXXXX)_"_ then set the Assertion URL to "_https://engine.example-organisation.com/auth/adfs/callback?id=**adfs-XXXXXXXX**"_
8181
3. Click Save
8282
83-
## Step 2: Register ACAEngine as new service/app in your authentication provider
83+
## Step 2: Register a new service/app in your authentication provider
8484
8585
### Prerequisites
8686
@@ -97,13 +97,13 @@ Follow the instructions for your Identity Provider:
9797
* [ADFS](saml2-with-adfs.md)
9898
* [Auth0](saml2-with-auth0.md)
9999
100-
## Step 3: Update the ACAEngine SAML2 authentication source settings
100+
## Step 3: Update the SAML2 authentication source settings
101101
102-
You will enter these details from Step 2 into ACAEngine Backoffice:
102+
You will enter these details from Step 2 into Backoffice:
103103
104104
### Prerequisites
105105
106-
1. **Issuer** \(also known as **Identifier**\): If your ID provider defines an Identifier instead of letting you define one, Update the ACAEngine auth settings to use the required Identifier.
106+
1. **Issuer** \(also known as **Identifier**\): If your ID provider defines an Identifier instead of letting you define one, Update the auth settings to use the required Identifier.
107107
108108
For example, Azure AD defines fixed identifiers in the form _"spn:00000000-0000-0000-0000-000000000000"_ where the 0 digits are the _Application \(client\) ID_, found on the Overview page of the Azure AD Application.
109109
@@ -115,10 +115,10 @@ You will enter these details from Step 2 into ACAEngine Backoffice:
115115
116116
### Update Engine's new authentication settings
117117
118-
Start by clicking edit \(pen icon\) on the Authentication that was created in Step 1 _"Add a new SAML2 authentication source to ACAEngine"_ \(top of this page\)
118+
Start by clicking edit \(pen icon\) on the Authentication that was created in Step 1 _"Add a new SAML2 authentication source"_ \(top of this page\)
119119
120120
1. Replace the **Issuer** field with the Issuer from your SAML2 ID provider \(unless your SAML2 ID provider already matches\)
121-
2. Replace the **IDP Target URL** field with the SAML2 Identity provider login url that was generated in Step 2 _"Register ACAEngine as new service/app on your authentication provider"_
121+
2. Replace the **IDP Target URL** field with the SAML2 Identity provider login url that was generated in Step 2 _"Register a new service/app on your authentication provider"_
122122
3. Paste the long X509Certificate string into the **Full Certificate** field, without any appended/prepended text.
123123
4. Click Save
124124

deployment/single-sign-on/saml2-with-adfs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# SAML2 with ADFS
22

3-
If using ADFS, [these steps](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/create-a-relying-party-trust) can generally be followed. ACAEngine will use these four SAML2 claims:
3+
If using ADFS, [these steps](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/create-a-relying-party-trust) can generally be followed. Engine will use these four SAML2 claims:
44

55
* Firstname
66
* Lastname

deployment/single-sign-on/saml2-with-auth0.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22

33
## Prerequesites
44

5-
* You are an administrator of an Auth0 domain and would like ACAEngine user to be redirected to this Auth0 domain for signup and SSO login.
5+
* You are an administrator of an Auth0 domain and would like Engine user to be redirected to this Auth0 domain for signup and SSO login.
66

77
## Auth0 configuration
88

99
* Follow [these instructions](https://auth0.com/docs/dashboard/guides/applications/register-app-spa) to create a register a single-page-app for SAML2 SSO using Auth0
10-
* The `Name` of the applicaiton can be the domain name on which your instance of ACAEngine is located.
10+
* The `Name` of the applicaiton can be the domain name on which your instance of Engine is located.
1111
* On the `Addons` tab, enable SAML2 Web App and use [these steps](https://auth0.com/docs/protocols/saml/saml2webapp-tutorial) as a guide.
12-
* Set the `Application Callback URL` to match ACAEngine's `Assertion URL` \(e.g. [https:///auth/adfs/callback?id=adfs-XXXXXX\](https:///auth/adfs/callback?id=adfs-XXXXXX%29\)
12+
* Set the `Application Callback URL` to match Engine's `Assertion URL` \(e.g. [https:///auth/adfs/callback?id=adfs-XXXXXX\](https:///auth/adfs/callback?id=adfs-XXXXXX%29\)
1313
* Paste in the below for `Settings`:
1414

1515
```text

deployment/single-sign-on/saml2-with-azure-ad.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
# SAML2 with Azure AD
22

3-
If using Azure Active Directory for SSO a new or exisiting "App Registration" will need to be configured to provide be the SAML2 identity provider for ACAEngine.
3+
If using Azure Active Directory for SSO a new or exisiting "App Registration" will need to be configured to provide be the SAML2 identity provider for Engine.
44

55
## Step 1 - New or Existing App Registration
66

77
* Login to portal.azure.com and browse to [Azure AD &gt; App Registrations](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps)
88
* Locate the existing app that was created for [o365 Graph API access](https://github.com/acaprojects/docs/tree/be220954cefb53b2ac2ca82f775a56993117e99d/deployment/single-sign-on/integrations/directory-services/microsoft-office365.md). If none has been created yet, then create a new app registration now, as this app can be used for both SSO and o365 Graph API access.
99
* If creating a NEW app registration:
1010
* Name it and select the appropriate "Support Account types" \(which is usually "Single tenant"\).
11-
* Paste the ACAEngine **Assertion URL** \(generated in Step 1 of [Configuring ACAEngine for SAML2](configuring-acaengine-for-saml2.md)\) into the **Reply URL** field. Leave the type as "Web". Click Register to finish.
11+
* Paste the ACAEngine **Assertion URL** \(generated in Step 1 of [Configuring Engine for SAML2](configuring-acaengine-for-saml2.md)\) into the **Reply URL** field. Leave the type as "Web". Click Register to finish.
1212
* If configuring an existing app registration:
1313
* Navigate to Overview -&gt; Redirect URIs
14-
* Paste the ACAEngine **Assertion URL** \(generated in Step 1 of [Configuring ACAEngine for SAML2](configuring-acaengine-for-saml2.md)\) into the **Redirect URI** field. Leave the type as "Web". Click Save to finish.
14+
* Paste the ACAEngine **Assertion URL** \(generated in Step 1 of [Configuring Engine for SAML2](configuring-acaengine-for-saml2.md)\) into the **Redirect URI** field. Leave the type as "Web". Click Save to finish.
1515
* Confirm that you have access to the [SAML2 Federation Metadata URL](https://docs.microsoft.com/en-us/azure/active-directory/azuread-dev/azure-ad-federation-metadata) for your Azure Tenant. This is generally in the below format. Data in this XML file may be used later in Step 3, OR can be used to configure advanced custom claims.
1616

1717
* https://login.microsoftonline.com/&lt;Tenant ID or Domain Name&gt;/FederationMetadata/2007-06/FederationMetadata.xml
@@ -53,17 +53,17 @@ Now two fields of the app Manifest need to be edited \(`groupMembershipClaims` a
5353

5454
* Click Save
5555

56-
## Step 3 - Collect data required by ACAEngine Backoffice
56+
## Step 3 - Collect data required by Backoffice
5757

58-
The App Registration is now configured for Engine. Three pieces of info are required to be entered back into ACAEngine \(Step 3 of [Configuring ACAEngine for SAML2](configuring-acaengine-for-saml2.md)\):
58+
The App Registration is now configured for Engine. Three pieces of info are required to be entered back into Backoffice \(Step 3 of [Configuring Engine for SAML2](configuring-acaengine-for-saml2.md)\):
5959

6060
### **Issuer**
6161

6262
For Azure AD the "Issuer" will be the "Application \(client\) ID" found on the Overview page of your App Registrating, but with "spn:" added to the front. E.g. _"spn:00000000-0000-0000-0000-000000000000"_ where the 0 digits are the Application \(client\) ID from Azure AD. Paste this value into the Issuer field of the SAML2 auth object that was created in ACAEngine.
6363

6464
### **IDP Target URL**
6565

66-
Also known as **SAML2 sign-on endpoint.** This is the url that ACAEngine redirects users to in order to login with your SAML2 ID provider. For Azure AD it is : [**https://login.microsoftonline.com/**](https://login.microsoftonline.com/)**&lt;TENANT-ID&gt;/**_**saml2**_ _\*\*_ where the Directoy \(tenant\) ID can be seen on the Overview tab of your Azure App Registration. Paste this into the IDP Target URL field of the SAML2 auth object that was created in ACAEngine
66+
Also known as **SAML2 sign-on endpoint.** This is the url that Engine redirects users to in order to login with your SAML2 ID provider. For Azure AD it is : [**https://login.microsoftonline.com/**](https://login.microsoftonline.com/)**&lt;TENANT-ID&gt;/**_**saml2**_ _\*\*_ where the Directoy \(tenant\) ID can be seen on the Overview tab of your Azure App Registration. Paste this into the IDP Target URL field of the SAML2 auth object that was created in Engine
6767

6868
### Full Certificate
6969

integrations/directory-services/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
description: Options for integrating ACAEngine with enterprise directory services.
2+
description: Options for integrating Engine with enterprise directory services.
33
---
44

55
# Directory Services
66

7-
ACAEngine extends beyond IoT control/monitoring when integrated with one of several enterprise directory service options. Directory service integration enables the ACAEngine Staff API, which allows apps to offer experiences such as room searching/booking, user directory searching and calendar event information/interactions.
7+
Engine extends beyond IoT control/monitoring when integrated with one of several enterprise directory service options. Directory service integration enables the Engine Staff API, which allows apps to offer experiences such as room searching/booking, user directory searching and calendar event information/interactions.
88

99
Data from directory services can be combined with IoT and/or location services data to add meaningful context to user interactions within a space. The result can be used to trigger an event in the space in real time or stored for retrospective analytics.
1010

0 commit comments

Comments
 (0)