Front-end - Back-end interaction:
Basic HybridRealm authentication. The PASOE validates the provided credentials (username & password) directly, through HybridRealm, using the ISwatAuthenticationService.
In order to use AkiomaUser authentication, in the pasoe-config.xml / OEPAS_config.xml configuration file, the AllowedAuthentication property must contain AkiomaUser:
<AllowedAuthentication>AkiomaUser</AllowedAuthentication> |
Note: In case AllowedAuthentication is missing from the config file, the default is AkiomaUser.
Front-end - Back-end interaction:
Logic-flow:
In order to use ActiveDirectory authentication, the following configuration settings must be present in pasoe-config.xml / OEPAS_config.xml:
Example:
<AllowedAuthentication>ActiveDirectory</AllowedAuthentication> <ssoAuthenticationURI>http://localhost:8888/auth/ad/login</ssoAuthenticationURI> <ssoAuthenticationCheckURI>http://localhost:8888/sessions</ssoAuthenticationCheckURI> <ssoAuthenticationSecretKey>12345678901</ssoAuthenticationSecretKey><!-- OPTIONAL --> |
Note: node-main is hidden behind PASOE server from the client's perspective.
TBD by Sergiu Morar / Sebastian Lucaciu
In order to use HybridRealm as the authentication provider of spring.security, the following configuration settings must be set:
http.all.authmanager=oerealm # Authentication manager to use, in our case: oerealm ?? client.login.model=form # Authentication model to use, in our case: form ?? OERealm.UserDetails.realmClass=Akioma.Security.HybridRealm # HybridRealm class to use, in our case: Akioma.Security.HybridRealm ?? ?? |
In order to use the existing AkiomaUser and/or ActiveDirectory authentication/s, the <AllowedAuthentication> property must be present in the pasoe-config.xml / OEPAS_config.xml configuration file.
The AllowedAuthentication property is a comma separated list, containing enabled authentication methods. Default value is "AkiomaUser".
Example:
<AllowedAuthentication>AkiomaUser,ActiveDirectory</AllowedAuthentication> |
The property is checked, during the authentication processes, if the current authentication is allowed.
Example for AkiomaUser check:
METHOD PROTECTED VOID CheckIsAllowedAkiomaUserAuth(): IF LOOKUP("AkiomaUser", SessionManager:AllowedAuthentication) EQ 0 THEN UNDO, THROW NEW Exception("AkiomaUser authentication is disabled!", 1). END METHOD. |