Adding api-publisher component to the pack See merge request entgra/product-iots!54merge-requests/56/head^2
commit
c8ca8616eb
@ -0,0 +1,59 @@
|
||||
{
|
||||
"theme" : {
|
||||
"base" : "wso2",
|
||||
"subtheme" : "modern"
|
||||
},
|
||||
"context" : "/api-publisher",
|
||||
"enableRestrictByRoles" : "true",
|
||||
"enableSelectedTenantSubscription" : "true",
|
||||
"ssoConfiguration" : {
|
||||
"enabled" : "false",
|
||||
"issuer" : "API_PUBLISHER",
|
||||
"identityProviderURL" : "https://localhost:9443/samlsso",
|
||||
"keyStorePassword" : "",
|
||||
"identityAlias" : "",
|
||||
"verifyAssertionValidityPeriod":"true",
|
||||
"timestampSkewInSeconds":"300",
|
||||
"audienceRestrictionsEnabled":"true",
|
||||
"responseSigningEnabled":"true",
|
||||
"assertionSigningEnabled":"true",
|
||||
"keyStoreName" :"",
|
||||
"signRequests" : "true",
|
||||
"assertionEncryptionEnabled" : "false",
|
||||
"idpInit" : "false",
|
||||
"idpInitSSOURL" : "https://localhost:9443/samlsso?spEntityID=API_PUBLISHER",
|
||||
"loginUserNameAttribute" : ""
|
||||
//"identityProviderLogoutURL" : "https://localhost:9443/samlsso",
|
||||
//"externalLogoutPage" : "https://localhost:9443/samlsso?slo=true"
|
||||
//"acsURL" : "https://localhost:9443/publisher/jagg/jaggery_acs.jag", //use only if Assertion Consumer Service URL needs to be sent along with SAML request
|
||||
//"nameIdPolicy" : "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified", //If not specified, 'urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified' will be used
|
||||
},
|
||||
|
||||
"oidcConfiguration" : {
|
||||
"enabled" : "false",
|
||||
"issuer" : "API_PUBLISHER",
|
||||
"identityProviderURI" : "http://localhost:8080/openid-connect-server-webapp/",
|
||||
"authorizationEndpointURI" : "http://localhost:8080/openid-connect-server-webapp/authorize",
|
||||
"tokenEndpointURI" : "http://localhost:8080/openid-connect-server-webapp/token",
|
||||
"userInfoURI" : "http://localhost:8080/openid-connect-server-webapp/userinfo",
|
||||
"jwksURI" : "http://localhost:8080/openid-connect-server-webapp/jwk",
|
||||
"logoutEndpointURI" : "http://localhost:8080/openid-connect-server-webapp/logout",
|
||||
"authHttpMethod": "POST",
|
||||
"clientConfiguration" : {
|
||||
"clientId" : "client_am_publisher",
|
||||
"clientSecret" : "secret",
|
||||
"responseType" : "code",
|
||||
"authorizationType" : "authorization_code",
|
||||
"scope" : "phone email address openid profile",
|
||||
"redirectURI" : "https://localhost:9443/publisher/jagg/jaggery_oidc_acs.jag",
|
||||
"postLogoutRedirectURI" : "https://localhost:9443/store/"
|
||||
}
|
||||
},
|
||||
|
||||
"reverseProxy" : {
|
||||
"enabled" : false, // values true , false , "auto" - will look for X-Forwarded-* headers
|
||||
"host" : "sample.proxydomain.com", // If reverse proxy do not have a domain name use IP
|
||||
"context":"",
|
||||
//"regContext":"" // Use only if different path is used for registry
|
||||
},
|
||||
}
|
Loading…
Reference in new issue