You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,16 @@
1
1
---
2
2
description: >-
3
-
ACAEngine is a platform for creating digital experiences for physical
3
+
Engine is a platform for creating digital experiences for physical
4
4
environments. It connects devices, hardware systems and third-party software
5
5
to provide an API for the built environment.
6
6
---
7
7
8
-
# What is ACAEngine
8
+
# What is Engine?
9
9
10
10
{% hint style="success" %}
11
11
If you’ve used traditional, hardware-based control systems before, welcome to the new world.
12
12
{% endhint %}
13
13
14
-
>
15
-
16
14
***Software only** built on the modern web.
17
15
***Open source** continuously improved and backed by a full-time team of developers.
18
16
***Extensible** able to run stand-alone, or integrated into staff, building or third party apps.
@@ -31,5 +29,5 @@ There are no restrictions on what can be built, but here are some examples of [w
31
29
32
30
## Who builds it?
33
31
34
-
[ACA Projects](https://www.acaprojects.com/staff) are a fast-paced team of developersand designers based across Australia, Singapore, Hong Kong, Shanghai and London. We believe in modern tech and despise black boxes.
32
+
[Place Technology](https://place.technology) is a team of developers, designers and technologists based across Australia, Singapore, Hong Kong, Shanghai and London. We believe in modern tech and despise black boxes.
Copy file name to clipboardExpand all lines: deployment/architecture.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# System Architecture
2
2
3
-
ACAEngine is packaged and distributed as a set of Docker containers for deployment within private cloud, or on-premise infrastructure. All application components run on hosts owned and managed by your organistation.
3
+
Engine is packaged and distributed as a set of Docker containers for deployment within private cloud, or on-premise infrastructure. All application components run on hosts owned and managed by your organistation.
4
4
5
5
## Application Services
6
6
@@ -24,15 +24,15 @@ A dedicated search service is used to provide fast, efficient access to informat
24
24
25
25
## External Components
26
26
27
-
In addition to the core application services, a number of external components contribute to the overall deployment environment. These are not created as part of ACAEngine, but may require configuration as part of the deployment.
27
+
In addition to the core application services, a number of external components contribute to the overall deployment environment. These are not created as part of Engine, but may require configuration as part of the deployment.
Clients are devices running interfaces distributed by Web nodes, or native apps and other services which use the ACAEngine API. Common examples may be a phone running a staff app, room booking panels or wayfinding displays.
31
+
Clients are devices running interfaces distributed by Web nodes, or native apps and other services which use the Engine API. Common examples may be a phone running a staff app, room booking panels or wayfinding displays.
Interactions with ACAEngine must be associated with a valid user. To simplify UX and improve security, authentication integrates tightly with existing identity providers operating in an environment. This may be services such as Azure AD, Google Sign-In or other services providing SAML or OAuth2 endpoints.
35
+
Interactions with Engine must be associated with a valid user. To simplify UX and improve security, authentication integrates tightly with existing identity providers operating in an environment. This may be services such as Azure AD, Google Sign-In or other services providing SAML or OAuth2 endpoints.
Copy file name to clipboardExpand all lines: deployment/single-sign-on/configuring-acaengine-for-saml2.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,25 +1,25 @@
1
1
---
2
2
description: >-
3
-
Steps required for enabling SAML2 sign on for users logging in to all
4
-
ACAEngine web apps
3
+
Steps required for enabling SAML2 sign on for users logging in to all Engine
4
+
web apps
5
5
---
6
6
7
-
# Configuring ACAEngine for SAML2
7
+
# Configuring Engine for SAML2
8
8
9
-
By default, ACAEngine uses local authentication. An admin account is generated upon initial deployment and the administrator can manually create additional user accounts in the ACAEngine Backoffice \(on the Users tab\).
9
+
By default, Engine uses local authentication. An admin account is generated upon initial deployment and the administrator can manually create additional user accounts in the Backoffice \(on the Users tab\).
10
10
11
11
Switching to federated authentication is recommended. There are 3 steps required:
12
12
13
-
1. In ACAEngine Backoffice, create a new SAML2 Identity provider entry
14
-
2. In your organisation's SAML2 Identity provider dashboard \(e.g. Azure AD, ADFS, Auth0\), create the SAML2 Service provider for entry for ACAEngine
15
-
3. Back in ACAEngine Backoffice, update the SAML2 Identity provider entry with the new details retrieved from step 2
13
+
1. In Backoffice, create a new SAML2 Identity provider entry
14
+
2. In your organisation's SAML2 Identity provider dashboard \(e.g. Azure AD, ADFS, Auth0\), create the SAML2 Service provider for entry for Engine
15
+
3. Back in Backoffice, update the SAML2 Identity provider entry with the new details retrieved from step 2
16
16
17
17
## Prerequisites
18
18
19
19
1. The domain where users will visit to login must exist as a valid **DNS** entry
20
-
2. Browsers should consider the domain secure: Valid **SSL certificates** should be in place and served by either your load balancer or the web server in front of ACAEngine.
20
+
2. Browsers should consider the domain secure: Valid **SSL certificates** should be in place and served by either your load balancer or the web server in front of Engine.
21
21
22
-
## Step 1: Add a new SAML2 authentication source to ACAEngine
22
+
## Step 1: Add a new SAML2 authentication source
23
23
24
24
1. Login as an admin to backoffice \([https://<engine-url>/backoffice/\](https://<engine-url>/backoffice/\)\)
25
25
2. On the **Domains** tab, select the Domain that represents the URL you wish to enable SAML2 for.
@@ -80,7 +80,7 @@ Switching to federated authentication is recommended. There are 3 steps required
80
80
2. Example: If you copied _"_[https://engine.example-organisation.com/auth/adfs?id=adfs-XXXXXXXX](https://engine.example-organisation.com/auth/adfs?id=adfs-XXXXXXXX)_"_ then set the Assertion URL to "_https://engine.example-organisation.com/auth/adfs/callback?id=**adfs-XXXXXXXX**"_
81
81
3. Click Save
82
82
83
-
## Step 2: Register ACAEngine as new service/app in your authentication provider
83
+
## Step 2: Register a new service/app in your authentication provider
84
84
85
85
### Prerequisites
86
86
@@ -97,13 +97,13 @@ Follow the instructions for your Identity Provider:
97
97
* [ADFS](saml2-with-adfs.md)
98
98
* [Auth0](saml2-with-auth0.md)
99
99
100
-
## Step 3: Update the ACAEngine SAML2 authentication source settings
100
+
## Step 3: Update the SAML2 authentication source settings
101
101
102
-
You will enter these details from Step 2 into ACAEngine Backoffice:
102
+
You will enter these details from Step 2 into Backoffice:
103
103
104
104
### Prerequisites
105
105
106
-
1. **Issuer** \(also known as **Identifier**\): If your ID provider defines an Identifier instead of letting you define one, Update the ACAEngine auth settings to use the required Identifier.
106
+
1. **Issuer** \(also known as **Identifier**\): If your ID provider defines an Identifier instead of letting you define one, Update the auth settings to use the required Identifier.
107
107
108
108
For example, Azure AD defines fixed identifiers in the form _"spn:00000000-0000-0000-0000-000000000000"_ where the 0 digits are the _Application \(client\) ID_, found on the Overview page of the Azure AD Application.
109
109
@@ -115,10 +115,10 @@ You will enter these details from Step 2 into ACAEngine Backoffice:
115
115
116
116
### Update Engine's new authentication settings
117
117
118
-
Start by clicking edit \(pen icon\) on the Authentication that was created in Step 1 _"Add a new SAML2 authentication source to ACAEngine"_ \(top of this page\)
118
+
Start by clicking edit \(pen icon\) on the Authentication that was created in Step 1 _"Add a new SAML2 authentication source"_ \(top of this page\)
119
119
120
120
1. Replace the **Issuer** field with the Issuer from your SAML2 ID provider \(unless your SAML2 ID provider already matches\)
121
-
2. Replace the **IDP Target URL** field with the SAML2 Identity provider login url that was generated in Step 2 _"Register ACAEngine as new service/app on your authentication provider"_
121
+
2. Replace the **IDP Target URL** field with the SAML2 Identity provider login url that was generated in Step 2 _"Register a new service/app on your authentication provider"_
122
122
3. Paste the long X509Certificate string into the **Full Certificate** field, without any appended/prepended text.
Copy file name to clipboardExpand all lines: deployment/single-sign-on/saml2-with-adfs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# SAML2 with ADFS
2
2
3
-
If using ADFS, [these steps](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/create-a-relying-party-trust) can generally be followed. ACAEngine will use these four SAML2 claims:
3
+
If using ADFS, [these steps](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/create-a-relying-party-trust) can generally be followed. Engine will use these four SAML2 claims:
Copy file name to clipboardExpand all lines: deployment/single-sign-on/saml2-with-auth0.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,14 @@
2
2
3
3
## Prerequesites
4
4
5
-
* You are an administrator of an Auth0 domain and would like ACAEngine user to be redirected to this Auth0 domain for signup and SSO login.
5
+
* You are an administrator of an Auth0 domain and would like Engine user to be redirected to this Auth0 domain for signup and SSO login.
6
6
7
7
## Auth0 configuration
8
8
9
9
* Follow [these instructions](https://auth0.com/docs/dashboard/guides/applications/register-app-spa) to create a register a single-page-app for SAML2 SSO using Auth0
10
-
* The `Name` of the applicaiton can be the domain name on which your instance of ACAEngine is located.
10
+
* The `Name` of the applicaiton can be the domain name on which your instance of Engine is located.
11
11
* On the `Addons` tab, enable SAML2 Web App and use [these steps](https://auth0.com/docs/protocols/saml/saml2webapp-tutorial) as a guide.
12
-
* Set the `Application Callback URL` to match ACAEngine's `Assertion URL`\(e.g. [https:///auth/adfs/callback?id=adfs-XXXXXX\](https:///auth/adfs/callback?id=adfs-XXXXXX%29\)
12
+
* Set the `Application Callback URL` to match Engine's `Assertion URL`\(e.g. [https:///auth/adfs/callback?id=adfs-XXXXXX\](https:///auth/adfs/callback?id=adfs-XXXXXX%29\)
Copy file name to clipboardExpand all lines: deployment/single-sign-on/saml2-with-azure-ad.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,17 @@
1
1
# SAML2 with Azure AD
2
2
3
-
If using Azure Active Directory for SSO a new or exisiting "App Registration" will need to be configured to provide be the SAML2 identity provider for ACAEngine.
3
+
If using Azure Active Directory for SSO a new or exisiting "App Registration" will need to be configured to provide be the SAML2 identity provider for Engine.
4
4
5
5
## Step 1 - New or Existing App Registration
6
6
7
7
* Login to portal.azure.com and browse to [Azure AD > App Registrations](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps)
8
8
* Locate the existing app that was created for [o365 Graph API access](https://github.com/acaprojects/docs/tree/be220954cefb53b2ac2ca82f775a56993117e99d/deployment/single-sign-on/integrations/directory-services/microsoft-office365.md). If none has been created yet, then create a new app registration now, as this app can be used for both SSO and o365 Graph API access.
9
9
* If creating a NEW app registration:
10
10
* Name it and select the appropriate "Support Account types" \(which is usually "Single tenant"\).
11
-
* Paste the ACAEngine **Assertion URL**\(generated in Step 1 of [Configuring ACAEngine for SAML2](configuring-acaengine-for-saml2.md)\) into the **Reply URL** field. Leave the type as "Web". Click Register to finish.
11
+
* Paste the ACAEngine **Assertion URL**\(generated in Step 1 of [Configuring Engine for SAML2](configuring-acaengine-for-saml2.md)\) into the **Reply URL** field. Leave the type as "Web". Click Register to finish.
12
12
* If configuring an existing app registration:
13
13
* Navigate to Overview -> Redirect URIs
14
-
* Paste the ACAEngine **Assertion URL**\(generated in Step 1 of [Configuring ACAEngine for SAML2](configuring-acaengine-for-saml2.md)\) into the **Redirect URI** field. Leave the type as "Web". Click Save to finish.
14
+
* Paste the ACAEngine **Assertion URL**\(generated in Step 1 of [Configuring Engine for SAML2](configuring-acaengine-for-saml2.md)\) into the **Redirect URI** field. Leave the type as "Web". Click Save to finish.
15
15
* Confirm that you have access to the [SAML2 Federation Metadata URL](https://docs.microsoft.com/en-us/azure/active-directory/azuread-dev/azure-ad-federation-metadata) for your Azure Tenant. This is generally in the below format. Data in this XML file may be used later in Step 3, OR can be used to configure advanced custom claims.
16
16
17
17
*https://login.microsoftonline.com/<Tenant ID or Domain Name>/FederationMetadata/2007-06/FederationMetadata.xml
@@ -53,17 +53,17 @@ Now two fields of the app Manifest need to be edited \(`groupMembershipClaims` a
53
53
54
54
* Click Save
55
55
56
-
## Step 3 - Collect data required by ACAEngine Backoffice
56
+
## Step 3 - Collect data required by Backoffice
57
57
58
-
The App Registration is now configured for Engine. Three pieces of info are required to be entered back into ACAEngine\(Step 3 of [Configuring ACAEngine for SAML2](configuring-acaengine-for-saml2.md)\):
58
+
The App Registration is now configured for Engine. Three pieces of info are required to be entered back into Backoffice\(Step 3 of [Configuring Engine for SAML2](configuring-acaengine-for-saml2.md)\):
59
59
60
60
### **Issuer**
61
61
62
62
For Azure AD the "Issuer" will be the "Application \(client\) ID" found on the Overview page of your App Registrating, but with "spn:" added to the front. E.g. _"spn:00000000-0000-0000-0000-000000000000"_ where the 0 digits are the Application \(client\) ID from Azure AD. Paste this value into the Issuer field of the SAML2 auth object that was created in ACAEngine.
63
63
64
64
### **IDP Target URL**
65
65
66
-
Also known as **SAML2 sign-on endpoint.** This is the url that ACAEngine redirects users to in order to login with your SAML2 ID provider. For Azure AD it is : [**https://login.microsoftonline.com/**](https://login.microsoftonline.com/)**<TENANT-ID>/**_**saml2**__\*\*_ where the Directoy \(tenant\) ID can be seen on the Overview tab of your Azure App Registration. Paste this into the IDP Target URL field of the SAML2 auth object that was created in ACAEngine
66
+
Also known as **SAML2 sign-on endpoint.** This is the url that Engine redirects users to in order to login with your SAML2 ID provider. For Azure AD it is : [**https://login.microsoftonline.com/**](https://login.microsoftonline.com/)**<TENANT-ID>/**_**saml2**__\*\*_ where the Directoy \(tenant\) ID can be seen on the Overview tab of your Azure App Registration. Paste this into the IDP Target URL field of the SAML2 auth object that was created in Engine
Copy file name to clipboardExpand all lines: integrations/directory-services/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
description: Options for integrating ACAEngine with enterprise directory services.
2
+
description: Options for integrating Engine with enterprise directory services.
3
3
---
4
4
5
5
# Directory Services
6
6
7
-
ACAEngine extends beyond IoT control/monitoring when integrated with one of several enterprise directory service options. Directory service integration enables the ACAEngine Staff API, which allows apps to offer experiences such as room searching/booking, user directory searching and calendar event information/interactions.
7
+
Engine extends beyond IoT control/monitoring when integrated with one of several enterprise directory service options. Directory service integration enables the Engine Staff API, which allows apps to offer experiences such as room searching/booking, user directory searching and calendar event information/interactions.
8
8
9
9
Data from directory services can be combined with IoT and/or location services data to add meaningful context to user interactions within a space. The result can be used to trigger an event in the space in real time or stored for retrospective analytics.
0 commit comments