forked from community/product-iots
Adding api-publisher component to the pack See merge request entgra/product-iots!54357-notification-for-kiosk-mode
commit
c8ca8616eb
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"theme" : {
|
||||||
|
"base" : "wso2",
|
||||||
|
"subtheme" : "modern"
|
||||||
|
},
|
||||||
|
"context" : "/api-publisher",
|
||||||
|
"enableRestrictByRoles" : "true",
|
||||||
|
"enableSelectedTenantSubscription" : "true",
|
||||||
|
"ssoConfiguration" : {
|
||||||
|
"enabled" : "false",
|
||||||
|
"issuer" : "API_PUBLISHER",
|
||||||
|
"identityProviderURL" : "https://localhost:9443/samlsso",
|
||||||
|
"keyStorePassword" : "",
|
||||||
|
"identityAlias" : "",
|
||||||
|
"verifyAssertionValidityPeriod":"true",
|
||||||
|
"timestampSkewInSeconds":"300",
|
||||||
|
"audienceRestrictionsEnabled":"true",
|
||||||
|
"responseSigningEnabled":"true",
|
||||||
|
"assertionSigningEnabled":"true",
|
||||||
|
"keyStoreName" :"",
|
||||||
|
"signRequests" : "true",
|
||||||
|
"assertionEncryptionEnabled" : "false",
|
||||||
|
"idpInit" : "false",
|
||||||
|
"idpInitSSOURL" : "https://localhost:9443/samlsso?spEntityID=API_PUBLISHER",
|
||||||
|
"loginUserNameAttribute" : ""
|
||||||
|
//"identityProviderLogoutURL" : "https://localhost:9443/samlsso",
|
||||||
|
//"externalLogoutPage" : "https://localhost:9443/samlsso?slo=true"
|
||||||
|
//"acsURL" : "https://localhost:9443/publisher/jagg/jaggery_acs.jag", //use only if Assertion Consumer Service URL needs to be sent along with SAML request
|
||||||
|
//"nameIdPolicy" : "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified", //If not specified, 'urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified' will be used
|
||||||
|
},
|
||||||
|
|
||||||
|
"oidcConfiguration" : {
|
||||||
|
"enabled" : "false",
|
||||||
|
"issuer" : "API_PUBLISHER",
|
||||||
|
"identityProviderURI" : "http://localhost:8080/openid-connect-server-webapp/",
|
||||||
|
"authorizationEndpointURI" : "http://localhost:8080/openid-connect-server-webapp/authorize",
|
||||||
|
"tokenEndpointURI" : "http://localhost:8080/openid-connect-server-webapp/token",
|
||||||
|
"userInfoURI" : "http://localhost:8080/openid-connect-server-webapp/userinfo",
|
||||||
|
"jwksURI" : "http://localhost:8080/openid-connect-server-webapp/jwk",
|
||||||
|
"logoutEndpointURI" : "http://localhost:8080/openid-connect-server-webapp/logout",
|
||||||
|
"authHttpMethod": "POST",
|
||||||
|
"clientConfiguration" : {
|
||||||
|
"clientId" : "client_am_publisher",
|
||||||
|
"clientSecret" : "secret",
|
||||||
|
"responseType" : "code",
|
||||||
|
"authorizationType" : "authorization_code",
|
||||||
|
"scope" : "phone email address openid profile",
|
||||||
|
"redirectURI" : "https://localhost:9443/publisher/jagg/jaggery_oidc_acs.jag",
|
||||||
|
"postLogoutRedirectURI" : "https://localhost:9443/store/"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
"reverseProxy" : {
|
||||||
|
"enabled" : false, // values true , false , "auto" - will look for X-Forwarded-* headers
|
||||||
|
"host" : "sample.proxydomain.com", // If reverse proxy do not have a domain name use IP
|
||||||
|
"context":"",
|
||||||
|
//"regContext":"" // Use only if different path is used for registry
|
||||||
|
},
|
||||||
|
}
|
Loading…
Reference in new issue