Skip to content

SUSE Janssen Installation#

Before you install, check the VM system requirements.

Supported versions#

  • SUSE Linux Enterprise Server (SLES) 15
  • openSUSE Leap 15.5

Install the Package#

  • If the server firewall is running, make sure you allow https, which is needed for OpenID and FIDO.
sudo firewall-cmd --permanent --zone=public --add-service=https
sudo firewall-cmd --reload
  • for SLES, we need to enable PackageHub as per OSversion and architecture
    sudo SUSEConnect -p PackageHub/15.5/x86_64
  • Download the GPG key zip file , unzip and import GPG key
sudo rpm -import automation-jans-public-gpg.asc
  • Download the release package from the GitHub Janssen Project Releases
  • Verify integrity of the downloaded package using published sha256sum.

Download sha256sum file for the package


Check the hash if it is matching. You may need to change your working directory to where both the rpm and sha256sum file are located.

sha256sum -c jans-1.1.3-suse15.x86_64.rpm.sha256sum

Output similar to below should confirm the integrity of the downloaded package.

<package-name>: OK
  • Install the package
sudo zypper install ~/jans-1.1.3-suse15.x86_64.rpm

Run the setup script#

  • Run the setup script in interactive mode:
sudo python3 /opt/jans/jans-setup/

See more detailed instructions on the setup script if you're confused how to answer any of the questions, for details about command line arguments, or you would prefer to use a properties file instead of interactive mode.

Verify the Installation#

After the successful completion of setup process, verify the system health.

Log in to Text User Interface (TUI)#

Begin configuration by accessing the TUI with the following command:

sudo /opt/jans/jans-cli/

Full TUI documentation can be found here

If you have selected casa during installation you can access casa using url https://<host>/jans-casa

Enabling HTTPS#

To enable communication with Janssen Server over TLS (https) in a production environment, Janssen Server needs details about CA certificate. Update the HTTPS cofiguration file https_jans.conf as shown below:


Want to use Let's Encrypt to get a certificate? Follow this guide.

  • Open https_jans.conf

    sudo vi /etc/apache2/vhosts.d/_https_jans.conf

  • Update SSLCertificateFile and SSLCertificateKeyFile parameters values

    SSLCertificateFile location_of_fullchain.pem
    SSLCertificateKeyFile location_of_privkey.pem

  • Restart httpd service for changes to take effect

    sudo /usr/sbin/rcapache2 restart


Uninstall process involves two steps and removes all the Janssen Server components.


For removal of the attached persistence store, please refer to this note.

  1. Uninstall Janssen Server
  2. Remove and purge the jans package

If you have not run the Jans setup script, you can skip step 1 and just remove the package.

First, run command below to uninstall the Janssen server

sudo python3 /opt/jans/jans-setup/ -uninstall

You'll see the following confirmation:

This process is irreversible.
You will lose all data related to Janssen Server.

Are you sure to uninstall Janssen Server? [yes/N] yes

Uninstalling Jannsen Server...
Removing /etc/default/jans-config-api
Stopping jans-config-api
Removing /etc/default/jans-scim
Stopping jans-scim
Removing /etc/default/jans-fido2
Stopping jans-fido2
Removing /etc/default/jans-auth
Stopping jans-auth
Removing /etc/default/jans-client-api
Stopping jans-client-api
Stopping OpenDj Server
Executing rm -r -f /etc/certs
Executing rm -r -f /etc/jans
Executing rm -r -f /opt/jans
Executing rm -r -f /opt/amazon-corretto*
Executing rm -r -f /opt/jre
Executing rm -r -f /opt/node*
Executing rm -r -f /opt/jetty*
Executing rm -r -f /opt/jython*
Executing rm -r -f /opt/opendj
Executing rm -r -f /opt/dist
Removing /etc/apache2/sites-enabled/https_jans.conf
Removing /etc/apache2/sites-available/https_jans.conf

Second uninstall the package:

rpm -qa | grep jans

And then use zypper remove <package>

Last update: 2024-01-31
Created: 2022-05-18