Front-end - Back-end interaction:
Logic-flow:
Basic HybridRealm authentication. The PASOE validates the provided credentials (username & password) directly, through HybridRealm, using the ISwatAuthenticationService.
In order to use AkiomaUser authentication, in the pasoe-config.xml / OEPAS_config.xml configuration file, the AllowedAuthentication property must contain AkiomaUser:
<AllowedAuthentication>AkiomaUser</AllowedAuthentication> |
Note: In case AllowedAuthentication is missing from the config file, the default is AkiomaUser.
Front-end - Back-end interaction:
Logic-flow:
In order to use ActiveDirectory authentication, the following configuration settings must be present in pasoe-config.xml / OEPAS_config.xml:
Example:
<AllowedAuthentication>ActiveDirectory</AllowedAuthentication> <ssoAuthenticationURI>http://localhost:8888/auth/ad/login</ssoAuthenticationURI> <ssoAuthenticationCheckURI>http://localhost:8888/sessions</ssoAuthenticationCheckURI> <ssoAuthenticationSecretKey>12345678901</ssoAuthenticationSecretKey><!-- OPTIONAL --> |
Note: node-main is hidden behind PASOE server from the client's perspective.
TBD by Sergiu Morar / Sebastian Lucaciu
In order to use HybridRealm as the authentication provider of spring.security, the following configuration settings must be set:
oeablSecurity.properties
To define routes that do not require authentication, modify the oeablSecurity.csv configuration file and set the desired URIs to permitAll():
Example for LoginWebHandler /web/Login/ routes:
# "url-pattern","<method>","<spring-access-expression>" ?? # Permit unauthenticated access to /web/Login/** "/web/Login/**","*","permitAll()" ?? # Authentication for /web/** "/web/**","*","hasAnyRole('ROLE_PSCUser')" ?? # Best practice - deny anything not explicitly granted "/**","*","denyAll()" |
Note: To override access for a specific/sub-route: have the override setting before the parent setting. Example: /web/Login sub-route config overrides /web route config, thus it is set before.
In order to use the existing AkiomaUser and/or ActiveDirectory authentication/s, the <AllowedAuthentication> property must be present in the pasoe-config.xml / OEPAS_config.xml configuration file.
The AllowedAuthentication property is a comma separated list, containing enabled authentication methods. Default value is "AkiomaUser".
Example:
<AllowedAuthentication>AkiomaUser,ActiveDirectory</AllowedAuthentication> |
The property is checked, during the authentication processes, if the current authentication is allowed.
Example for AkiomaUser check:
METHOD PROTECTED VOID CheckIsAllowedAkiomaUserAuth(): IF LOOKUP("AkiomaUser", SessionManager:AllowedAuthentication) EQ 0 THEN UNDO, THROW NEW Exception("AkiomaUser authentication is disabled!", 1). END METHOD. |