Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
devel:documentation:application_configuration:dev:backend [2020/06/15 11:13] kopro [Authentication] ad information about DefaultAccMultipleSystemAuthenticator |
devel:documentation:application_configuration:dev:backend [2020/08/11 12:40] tomiskar [Application/ Server] |
||
---|---|---|---|
Line 73: | Line 73: | ||
# Show transaction identifiers (uuid) in frontend application | # Show transaction identifiers (uuid) in frontend application | ||
idm.pub.app.show.transactionId=false | idm.pub.app.show.transactionId=false | ||
- | # Show role environmnent | + | # Show role environment |
idm.pub.app.show.environment=true | idm.pub.app.show.environment=true | ||
+ | # Show role baseCode in frontend application for roles (table, role detail, niceLabel, info components, role select) | ||
+ | idm.pub.app.show.role.baseCode=true | ||
# Available size options for tables in frontend application | # Available size options for tables in frontend application | ||
idm.pub.app.show.sizeOptions=10, | idm.pub.app.show.sizeOptions=10, | ||
Line 80: | Line 82: | ||
# default form can be disabled => at least one configured form projection is needed | # default form can be disabled => at least one configured form projection is needed | ||
idm.pub.app.show.identity.formProjection.default=true | idm.pub.app.show.identity.formProjection.default=true | ||
+ | # If is true, then role-request description will be show on the detail. | ||
+ | # Description will hidden if this property will be false and role request | ||
+ | # doesn' | ||
+ | idm.pub.app.show.roleRequest.description=true | ||
# | # | ||
# Private properties - used on backend only. | # Private properties - used on backend only. | ||
Line 87: | Line 93: | ||
# demo data was created - prevent to create demo data duplicitly | # demo data was created - prevent to create demo data duplicitly | ||
idm.sec.core.demo.data.created=false | idm.sec.core.demo.data.created=false | ||
- | # Enable forest index for tree structures | + | # Create init data at application start. Init data (product provided roles) are updated automatically with pruct updates. |
- | idm.sec.app.forest.index.enabled=true | + | # Set property to false to disable init data creation and updates. |
+ | idm.sec.core.init.data.enabled=true | ||
</ | </ | ||
Line 504: | Line 511: | ||
# could contains default authorities and authority policies configuration | # could contains default authorities and authority policies configuration | ||
# for adding autocomplete or all record read permission etc. | # for adding autocomplete or all record read permission etc. | ||
+ | # Role full code should be given (should contain environment, | ||
+ | # Role authorities are updated automatically, | ||
idm.sec.core.role.default=userRole | idm.sec.core.role.default=userRole | ||
# Admin user role | # Admin user role | ||
+ | # Role full code should be given (should contain environment, | ||
+ | # Role authorities are updated automatically, | ||
idm.sec.core.role.admin=superAdminRole | idm.sec.core.role.admin=superAdminRole | ||
# Separator for the suffix with environment used in role code. | # Separator for the suffix with environment used in role code. | ||
Line 665: | Line 676: | ||
==== Authentication ==== | ==== Authentication ==== | ||
- | UUID of system, against which to user will be authenticated. | + | UUID of system, against which to user will be authenticated. This authentication is from version 10.4.0 deprecated. |
<code properties> | <code properties> | ||
# ID system against which to authenticate | # ID system against which to authenticate | ||
Line 671: | Line 682: | ||
</ | </ | ||
- | Authentication against multiple system wich to user will be authenticated (since 10.4.0) | + | Authentication against multiple system wich to user will be authenticated (since 10.4.0) |
<code properties> | <code properties> | ||
- | idm.sec.acc.security.auth.order1.systemId= | + | idm.sec.acc.security.auth.order1.system= |
- | idm.sec.acc.security.auth.order2.systemId= | + | idm.sec.acc.security.auth.order2.system= |
</ | </ | ||