ODSGenerateWebIDX509CertOSKeystoreFFNETExtGenerate an X.509 Certificate (with a WebID watermark) that's managed by host operating system keystore: FirefoxGenerate an X.509 Certificate (with a WebID watermark) that's managed by host operating system keystore: Firefox Set up an X.509 certificate issuer and HTTPS listener. Set up X.509 Certificate Service. Install the .NET extension for Firefox. Go to the ODS home page (local or remote) and register new user (or log in as existing ODS user).
Post registration you end up with an ODS generated Person Entity Identifier (an HTTP URI that Identifies "You") that takes the form: http://cname/dataspace/person/user-name#this
Edit your profile (Note: If this step is skipped, the resulting X.509 certificate will not have a human readable name):
Go to Profile Edit -> "Security":
Go to "Certificate Generator". Should be displayed the Virtuoso Certificate Generator Wizard:
Click "Next". Specify Certificate type:
Click "Next". Specify Certificate details:
Click "Next". Specify Issuer:
Click "Next". Select in the "Install or save" page option "Install the certificate in the Windows Certificate Store":
Click "Next". Click "Copy" in order to copy the generated certificate and click "Exit":
View the generated certificate saved in your Windows KeyStore: From Run run mmc. The Microsoft Management Console will pop up. Go to File ?> Add /Remove Snap-in. Go to Standalone(TAB) ?> Add ?> Certificates. Select Computer Account and click "Next". Select Local computer. Click Finish and Close. Go back to Security -> X.509 Certificates:
Paste the copied generated certificate from above in the "X.509 Certificate" area:
Note that you can also hatch the option "Enable Automatic WebID Login":
Click the "Save Certificate" button which writes the Public Key Component of the generated Certificate to your FOAF based ODS hosted Profile data space:
Log out and access for ex.: https://id.myopenlink.net/ods. Select when prompted from your browser, the certificate generated from above:
Click "WebID Login":
As result you should be successfully logged in:
Now log out again and log in as another user, for ex. demo. Perform an WebID based ACL Sharing of a resource to the user with the generated from above X.509 hosted WebID.
Note: these steps apply to any ODS instance. Related Generate an X.509 Certificate (with a WebID watermark) that's managed by host operating system keystore Chrome Safari IE Guide of generating X.509 Certificates via ODS Safeguarding your Virtuoso-hosted SPARQL Endpoint SPARQL Endpoint Protection Methods Collection Virtuoso documentation SPARQL Service Endpoint Service Endpoint Security Managing a SPARQL Web Service Endpoint SPARQL Virtuoso Tips and Tricks Collection SPARQL Endpoint DET Configuration Guide WebID Protocol & SPARQL Endpoint ACLs Tutorial SPARQL OAuth Tutorial Securing SPARQL endpoints SPARUL over SPARQL using the http://cname:port/sparql-auth endpoint Virtuoso Authentication Server UI Manage a SPARQL-WebID based Endpoint WebID Protocol Support in OpenLink Data Spaces. Manage ODS Datadspaces Objects WebID Access Control Lists (ACLs): ODS Briefcase WebID based ACL Guide Person Entity WebID based ACL Guide Group Entity WebID based ACL Guide Public WebID based ACL Guide ODS Feed Manager WebID based ACL Guide Person Entity Specific ACL Group Entity Specific ACL Public Specific ACL for anyone with a WebID ODS Calendar WebID based ACL Guide Person Entity Specific ACL Group Entity Specific ACL Public Specific ACL for anyone with a WebID ODS Bookmark Manager WebID based ACL Guide Person Entity Specific ACL Group Entity Specific ACL Public Specific ACL for anyone with a WebID ODS Addressbook WebID based ACL Guide Person Entity Specific ACL Group Entity Specific ACL Public Specific ACL for anyone with a WebID Guide for Set up a X.509 certificate issuer and HTTPS listener and generate ODS user certificates Configure Virtuoso+ODS instance as an X.509 Certificate Authority and HTTPS listener Configure Virtuoso instance as an X.509 Certificate Authority and HTTPS listener Setting up PubSubHub in ODS PubSubHubBub Demo Client Example Feed subscription via PubSubHub protocol Example Setting Up PubSubHub to use WebID Protocol or IP based control lists CA Keys Import using Conductor Generate an X.509 Certificate (with a WebID watermark) to be managed by a browser-based keystore Using Virtuoso's WebID Verification Proxy Service with a WebID-bearing X.509 certificate Using Virtuoso's WebID Identity Provider (IdP) Proxy Service with an X.509 certificate ODS Briefcase WebID Protocol Share File Guide WebID Protocol Specification Test WebID Protocol Certificate page WebID Protocol Certificate Generation page