You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For example, for a given SSO service plan/UAA identity zone, the location would be `https://subdomain.login.my-domain.org`
42
+
41
43
It has three API endpoints:
42
44
*`GET /todo` to list TODO items. Requires the user to have `todo.read` scope.
43
45
*`POST /todo` to create a TODO item. Requires `todo.write` scope. Example body: `{"todo":"<content>"}`
@@ -61,3 +63,29 @@ Follow the steps [here](http://docs.pivotal.io/p-identity/manage-resources.html)
61
63
The authenticated user should also have the scopes `todo.read` and `todo.write`.
62
64
63
65
NOTE: If a user doesn't have these scopes, contact your local admin to grant these scopes to that user.
66
+
67
+
# Bootstrap Application Client Configurations for the Pivotal Single Sign-On Service Instance
68
+
Beginning in SSO 1.4.0, you can use the following values your application's manifest to bootstrap client configurations for your applications automatically when binding or rebinding your application to the service instance. These values will be automatically populated to the client configurations for your application through CF environment variables.
69
+
70
+
When you specify your own scopes and authorities, consider including openid for scopes on auth code, implicit, and password grant type applications, and uaa.resource for client credentials grant type applications, as these will not be provided if they are not specified.
71
+
72
+
The table below provides a description and the default values. Further details and examples are provided in the sample application manifests.
73
+
74
+
| Property Name | Description | Default |
75
+
| ------------- | ------------- | ------------- |
76
+
| name | Name of the application | (N/A - Required Value) |
77
+
| GRANT_TYPE | Allowed grant type for the application through the SSO service - only one grant type per application is supported by SSO | authorization_code |
78
+
| SSO_IDENTITY_PROVIDERS | Allowed identity providers for the application through the SSO service plan | uaa |
79
+
| SSO_REDIRECT_URIS | Comma separated whitelist of redirection URIs allowed for the application - Each value must start with http:// or https:// | (Will always include the application route) |
80
+
| SSO_SCOPES | Comma separated list of scopes that belong to the application and are registered as client scopes with the SSO service. This value is ignored for client credential grant type applications. | openid |
81
+
| SSO_AUTO_APPROVED_SCOPES | Comma separated list of scopes that the application is automatically authorized when acting on behalf of users through SSO service | <Defaults to existing scopes/authorities> |
82
+
| SSO_AUTHORITIES | Comma separated list of authorities that belong to the application and are registered as client authorities with the SSO service. Authorities are restricted to the space they were originally created. Privileged identity zone/plan administrator scopes (e.g. scim.read, idps.write) cannot be bootstrapped and must be assigned by zone/plan administrators. This value is ignored for any grant type other than client credentials. | uaa.resource |
83
+
| SSO_REQUIRED_USER_GROUPS | Comma separated list of groups a user must have in order to authenticate successfully for the application | (No value) |
84
+
| SSO_ACCESS_TOKEN_LIFETIME | Lifetime in seconds for the access token issued to the application by the SSO service | 43200 |
85
+
| SSO_REFRESH_TOKEN_LIFETIME | Lifetime in seconds for the refresh token issued to the application by the SSO service | 2592000 (not used for client credentials) |
86
+
| SSO_RESOURCES | Resources that the application will use as scopes/authorities for the SSO service to be created during bootstrapping if they do not already exist - The input format can be referenced in the provided sample manifest. Note that currently all permissions within the same top level permission (e.g. todo.read, todo.write) must be specified in the same application manifest. Currently you cannot specify additional permissions in the same top level permission (e.g. todo.admin) in additional application manifests.| (No value) |
87
+
| SSO_ICON | Application icon that will be displayed next to the application name on the Pivotal Account dashboard if show on home page is enabled - do not exceed 64kb | (No value) |
88
+
| SSO_LAUNCH_URL | Application launch URL that will be used for the application on the Pivotal Account dashboard if show on home page is enabled | (Application route) |
89
+
| SSO_SHOW_ON_HOME_PAGE | If set to true, the application will appear on the Pivotal Account dashboard with the corresponding icon and launch URL| True |
90
+
91
+
To remove any variables set through bootstrapping, you must use `cf unset-env <APP_NAME> <PROPERTY_NAME>` and rebind the application.
Copy file name to clipboardExpand all lines: authcode/manifest.yml
+37
Original file line number
Diff line number
Diff line change
@@ -6,5 +6,42 @@ applications:
6
6
path: build/libs/authcode.jar
7
7
env:
8
8
SKIP_SSL_VALIDATION: "true"
9
+
10
+
# Grant type to be set for the application's client configurations - Only one grant type per application is supported by SSO
9
11
GRANT_TYPE: authorization_code
12
+
13
+
# Identity provider(s) to be set for the application's client configurations
10
14
SSO_IDENTITY_PROVIDERS: uaa
15
+
16
+
# The following are bootstrap configurations you may use to automatically create client configurations in the SSO service for your application if the configurations do not exist. These configurations take effect when binding or rebinding to the SSO, and will overwrite existing client configurations if any. The values provided below are examples.
17
+
18
+
# Whitelist of redirect URI(s) allowed for the application. This value must start with http:// or https://
Copy file name to clipboardExpand all lines: client_credentials/manifest.yml
+37
Original file line number
Diff line number
Diff line change
@@ -6,5 +6,42 @@ applications:
6
6
path: build/libs/client_credentials.jar
7
7
env:
8
8
SKIP_SSL_VALIDATION: "true"
9
+
10
+
# Grant type to be set for the application's client configurations - Only one grant type per application is supported by SSO
9
11
GRANT_TYPE: client_credentials
12
+
13
+
# Identity provider(s) to be set for the application's client configurations
10
14
SSO_IDENTITY_PROVIDERS: uaa
15
+
16
+
# The following are bootstrap configurations you may use to automatically create client configurations in the SSO service for your application if the configurations do not exist. These configurations take effect when binding or rebinding to the SSO, and will overwrite existing client configurations if any. The values provided below are examples.
17
+
18
+
# Whitelist of redirect URI(s) allowed for the application. This value must start with http:// or https://
Copy file name to clipboardExpand all lines: implicit/manifest.yml
+37
Original file line number
Diff line number
Diff line change
@@ -6,5 +6,42 @@ applications:
6
6
path: build/libs/implicit.jar
7
7
env:
8
8
SKIP_SSL_VALIDATION: "true"
9
+
10
+
# Grant type to be set for the application's client configurations - Only one grant type per application is supported by SSO
9
11
GRANT_TYPE: implicit
12
+
13
+
# Identity provider(s) to be set for the application's client configurations
10
14
SSO_IDENTITY_PROVIDERS: uaa
15
+
16
+
# The following are bootstrap configurations you may use to automatically create client configurations in the SSO service for your application if the configurations do not exist. These configurations take effect when binding or rebinding to the SSO, and will overwrite existing client configurations if any. The values provided below are examples.
17
+
18
+
# Whitelist of redirect URI(s) allowed for the application. This value must start with http:// or https://
Copy file name to clipboardExpand all lines: password/manifest.yml
+37
Original file line number
Diff line number
Diff line change
@@ -6,5 +6,42 @@ applications:
6
6
path: build/libs/password.jar
7
7
env:
8
8
SKIP_SSL_VALIDATION: "true"
9
+
10
+
# Grant type to be set for the application's client configurations - Only one grant type per application is supported by SSO
9
11
GRANT_TYPE: password
12
+
13
+
# Identity provider(s) to be set for the application's client configurations
10
14
SSO_IDENTITY_PROVIDERS: uaa
15
+
16
+
# The following are bootstrap configurations you may use to automatically create client configurations in the SSO service for your application if the configurations do not exist. These configurations take effect when binding or rebinding to the SSO, and will overwrite existing client configurations if any. The values provided below are examples.
17
+
18
+
# Whitelist of redirect URI(s) allowed for the application. This value must start with http:// or https://
0 commit comments