Alertus (Unified Security Notification)

Basic Information

Service Name

Alertus

Service URL

https://alertus.publicsafety.tufts.edu/new window icon

Service Owner(s)

Office of Emergency Management, Digital Communications, and Tufts Technology Services

Authentication

Simplified Sign-On enabled - LDAP

Who Can Use It

Tufts Public Safety personell

Limitations

Available 24/7.

VendorAlertus
Vendor Contact202-253-7887
Tufts Business ContactAnthony Veliz

 

Description

Allows Tufts to send an alert to networked computers. May be activated by Pubic Safety during a significant emergency or dangerous situation involving an immediate threat to the health or safety of the Tufts community. Alert can be triggered through TuftsAlert (emergency alert system).

Alertus authentication and access configuration

Alertus uses Shibboleth as a Single sign-on provider (SSO). Altertus uses Active Directory (AD) group membership for role assignment to authenticated users.

Steps taken to configure Alertus for SSO using Shibboleth

  1. Downloaded shibboleth-sp-2.6.0.1-win64 from the Shibboleth site (https://shibboleth.net/downloads/service-provider/latest/win64/)
  2. Installed to default location (C:\opt\shibboleth-sp)
  • Updated Shibboleth to define the SP/IDP
  1. Placed the IDP-medadata file provided by ESS in the Shibboleth config directory.
    1. Location: C:\opt\shibboleth-sp\etc\shibboleth
    2. Filename: idp-metadata.xml and placed in
    3. Update file C:\opt\shibboleth-sp\etc\shibboleth\shibboleth2.xml per instruction provided in install document  
  2. Updated the Alertus configuration file to use Shibboleth
    1. Location: C:\alertus\conf
    2. Filename: impl_httpd.conf

Steps take to configure Alertus to use AD groups for roles.

  • Created needed AD objects
  1. Created service account (Alertus) for read access to AD. (tufts.ad.tufts.edu/Central/UIT/Users/alertus)
  2. Created AD group AlertusAdmin (tufts.ad.tufts.edu/Central/UIT/Users/AlertusAdmin).
  3. Created AD group AlertusUser (tufts.ad.tufts.edu/Central/UIT/Users/AlertusUser).

NOTE: AD group membership change permission was provided to Anthony Veliz to management these groups.

  • Alertus Active Directory configuration

URL for updates:  https://alertus.publicsafety.tufts.edu/alertusmw/viewMiddlewareSettingsForm.jsp

Field values used:

  
Hostnametufts.ad.tufts.edu
Port389
Auth Mechanismsimple
Usernametufts.ad.tufts.edu/Central/UIT/Users/alertus
User DNDC=tufts,DC=ad,DC=tufts,DC=edu
User ID AttributeuserPrincipalName
Login AttributeuserPrincipalName
Email Attributemail
Group DNDC=tufts,DC=ad,DC=tufts,DC=edu
Admin Group NameAlertusAdmin
User Group NameAlertusUser
User AttributesAMAccountName
Group Attributemember
 Click to show screen capture...


Manage “Users and Access Rights” from https://alertus.publicsafety.tufts.edu/AlertusWeb/InitEditUsersList.do

 

 Click to show screen capture...

 

 

Information on the Tufts IT Knowledgebase is intended for IT Professionals at Tufts.
If you have a question about a Tufts IT service or computer/account support, please contact your IT support group.