- Instruction
- Go to:
MAIN SETTINGS >> Application Settings >> Target Applications - Create a new Target Application using the Identity Propagator plugin.
- Set Default URL to the forward location of the Adminapp
- Set URL Pattern to match the URL of the Adminapp.
- Add useradmin as the required role.
- The Target Application is partly configured.
|
| - Next: Create an SSO Ticket Identity Propagator
- Create and configure an SSO Ticket Identity Propagator.
- Set Ticket Lifetime to less than 5 seconds.
- Set Forward Location Parameter to Location.
- The SSO Ticket Identity Propagator is pre-configured.
|
| - Next: Create a JWT Ticket Encoder
- Create and configure a JWT Ticket Encoder.
- Set Username Ticket Key as username.
- Issuer as appropriate, e.g. Airlock IAM.
- Set Valid Not Before Skew to 5.
- Set claims stored as an array with two values: roles and realm.
- Create and configure a JWT Ticket Signer. Use an HMAC algorithm.
- The SSO Ticket Identity Propagator and SSO Ticket Encoder are now configured.
|
| - Next: Create a Mapping Ticket Service plugin
- Go to the Ticket Identity Propagator.
- Create a Mapping Ticket Service plugin.
- Create a Mapped Ticket Element plugin.
- Configure the Ticket Element plugin for the user roles with:
- -Ticket Key as roles.
- -Value Reference as @roles.
- -Set mandatory as true.
- Create a second Mapped Ticket Element plugin.
- Configure the Ticket Element plugin for the realm attribute with:
- Set Ticket Key as realm.
- Set Value Reference as realm.
- Set mandatory as true.
- The Mapping Ticket Service is now configured.
|
- The Target Application configuration is now completed.
|