Fusion Impersonation via a Service Account
user-id
attribute, which is described in the next section.fusion.conf
file in src/main/resources/conf/platforms/fusion/
:impersonate
attribute informs Appkit that users will be querying Fusion pipelines via a service account. Below that, both the userName
and the password
are the credentials for the service account that Fusion will authenticate against. The last attribute user-id
is optional and by default takes the value of username
. This is the parameter that will be appended to the query string and filtered on in the security trimming stage. For example, the complete query URL might appear as:Set Up Active Directory Federation Services (ADFS) Authentication for App Studio or Appkit
pom.xml
under the root of the project.
dependencies
tag in pom.xml
:
security.conf
file in src/main/resources/conf/security/
to contain:
spring-security.xml
file because this module encapsulates all Spring configuration automatically.ClientId
should be a GUID and the RedirectUri
must point to the Appkit application URL, with /oauthLogin
appended. Here, localhost
is used for testing an Appkit application running on the local development machine.conf/security/oauth.conf
.oauth.conf
client-id
, adfs-url
and resource
parameters for the environment in question.The client-id
is the ID that was set up against ADFS using the Add-ADFSClient
PowerShell command.The adfs-url
is the URL of the ADFS server with the /adfs
context appended.The resource
is the relying party trust identifier set up in ADFS management.The `high-trust’ parameter is only required when integrating the ADFS and SharePoint modules. This article is only concerned with authentication against ADFS.web.xml
file of the project:Set Up Facebook Authentication
pom.xml
under the root of the project.
dependencies
tag in pom.xml
:
security.conf
file in src/main/resources/conf/security/
to contain:
spring-security.xml
file because this module encapsulates all Spring configuration automatically.conf/security/oauth.conf
. For example:client-id
and client-secret
settings have already been generated in the ‘Facebook for Developers’ admin console and provided to you as an application developer. For more information, see the Facebook documentation on OAuth.http://your-application-url/oauthLogin
.web.xml
file of the project:Set Up Google Authentication
pom.xml
under the root of the project.dependencies
tag in pom.xml
:
security.conf
file in src/main/resources/conf/security/
to contain:
spring-security.xml
file, because this module encapsulates all Spring configuration automatically.conf/security/oauth.conf
:client-id
and client-secret
settings have already been generated in the Google Developer Console and provided to you as an application developer. For more information about this, see the Google documentation on OAuth.http://your-application-url/oauthLogin
.web.xml
of the project:Set Up Office 365 Authentication
pom.xml
under the root of the project.
dependencies
tag in pom.xml
:
security.conf
file in src/main/resources/conf/security/
to contain:
spring-security.xml
file because this module encapsulates all Spring configuration automatically.conf/security/oauth.conf
:http://your-application-url/oauthLogin
.web.xml
file of the project: