Altair® Panopticon

 

Example

For an example of OAuth2.0 server configuration, here are some roles and users:

Roles/Groups available:

q  admin-backend

q  admin-all

q  server-designers

q  server-viewers

q  server-viewer-groupX

 

Users:

1.     username:testuser, roles:["server-viewers"]

2.      username:testuser2, roles:["server-viewers","server-designers","admin-all"]

 

For the OAuth2.0 server authentication, you would have to generate ClientID and ClientSecret.

To be authenticated by the OAuth2.0 server, the following Panopticon properties will be set:

authentication.oauth2.client.id=ClientId authentication.oauth2.client.secret=ClientSecret authentication.oauth2.identity.attribute.roles=roles authentication.oauth2.identity.attribute.username=username authentication.oauth2.identity.url=https://oauth2/me authentication.oauth2.login.callback.url=http://localhost:8080/panopticon/server/rest/auth/login authentication.oauth2.login.redirect.url= authentication.oauth2.login.response.type=code authentication.oauth2.login.scope= authentication.oauth2.login.state= authentication.oauth2.login.url=https://oauth2/authorize authentication.oauth2.logout.redirect.url= authentication.oauth2.logout.url= authentication.oauth2.token.method=query authentication.oauth2.token.url=https://oauth2/access_token authentication.type=OAUTH2 access.default.roles= access.administrator.groups=admin-backend,admin-all access.designer.groups=server-designers access.viewer.groups=server-viewers,server-viewer-groupX