Advertisement
Guest User

Untitled

a guest
Dec 6th, 2018
243
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.02 KB | None | 0 0
  1. This is default value. It should be updated only if the context path changes from default.
  2. ##scheme://server:port/contextPath/saml/login?idp=mySelectedIDP.
  3. #sso.idp.loginUrl=/saml/login
  4. #
  5. ## Entity ID of the SP
  6. #sso.service.provider.entity.id=com:imc:eplocal:sp
  7. #
  8. ##Base URL of SP. Needs to be a URL with protocol, server, port and context path.
  9. #
  10. #sso.service.provider.entity.base.url=https://dev-portal.imcinternal.com/
  11. #
  12. ## Defines the name identifier formats supported by the identity provider.
  13. ## Name identifiers are a way for providers to communicate with each other regarding a user.
  14. #sso.service.provider.entity.name.id=urn:oasis:names:tc:SAML:2.0:nameid-format:imcaccountid
  15. #
  16. ##Context provider parameters which overrides request attributes with values of the load-balancer or reverse-proxy in front
  17. ##of the local application. The settings help to provide correct redirect URls and verify destination URLs during
  18. ##SAML processing.
  19. #sso.service.load.balancer.scheme=https
  20. #sso.service.load.balancer.host=dev-portal.imcinternal.com
  21. #sso.service.load.balancer.exhibitor.portal.host=dev-portal.imcinternal.com
  22. #sso.service.load.balancer.admin.portal.host=dev-admin.imcinternal.com
  23. #sso.service.load.balancer.context.path=/
  24. #
  25. ##static sp metadata configuration
  26. #sso.sp.metadata.exhibitor.portal=classpath:idmconf/dev/exhibitor-portal.xml
  27. #sso.sp.metadata.admin.portal=classpath:idmconf/dev/admin-portal.xml
  28. #sso.sp.metadata.exhibitor.portal.path=/idmconf/dev/exhibitor-portal.xml
  29. #sso.sp.metadata.admin.portal.path=/idmconf/dev/admin-portal.xml
  30. #
  31. ##The HTTP parameter to look for the username when performing authentication. Default is "username".
  32. #lvm.login.field.username=email
  33. ##The HTTP parameter to look for the password when performing authentication. Default is "password".
  34. #lvm.login.field.passwordname=password
  35. ## path where login page in Hippo will be available for LVM
  36. #lvm.login.page.url=/login
  37. #lvm.logout.success.redirect.url=https://dev-lvm.imcinternal.com/
  38. #
  39. #lvm.rememberme.token.timeout=15552000
  40. #lvm.authfail=/403
  41. #lvm.authenticationfail.url=/login?error=
  42. #
  43. #
  44. #sso.site.config=classpath:idmconf/site-config-dev.json
  45. ##endpoint for getting user for exhibitor portal
  46. #sso.idm.api.by.id=https://dev-idm.imcinternal.com/imc-api-idm/api/v1/token/{id}
  47. #sso.idm.api.update.login.attempt=https://dev-idm.imcinternal.com/imc-api-idm/api/v1/lvm/open/loginattempt/{email}/update
  48. #sso.idm.api.reset.login.attempt=https://dev-idm.imcinternal.com/imc-api-idm/api/v1/lvm/open/resetattempt/{email}/reset
  49. #
  50. #
  51. #
  52. ##endpoint for getting user for LVM website
  53. #sso.idm.api.by.email=https://dev-idm.imcinternal.com/imc-api-idm/api/v1/token/{email}/account
  54. #
  55. #sso.hippo.scan.package=com.imc.idm.security.core.userdetails
  56. ### =========== RDS schema config where spring session related tables are present ========================
  57. #idm.spring.session.database.url=jdbc:mysql://172.16.18.47:3306/idm
  58. #idm.spring.session.datasource.driverClassName=com.mysql.jdbc.Driver
  59. #idm.spring.session.datasource.username=idmapp
  60. #idm.spring.session.datasource.password=idmdev07
  61. #idm.spring.session.max.interval.seconds=7776000
  62. #
  63. ## This is authorization fail page
  64. #sso.idp.authfail=/403
  65. #sso.authfail.lease.url=/lease-expired
  66. #sso.authenticationfail.url=/login?error=
  67. #
  68. ## This is account verification email url
  69. #lvm.accountnotverified.url=/account-not-verified?email=
  70. #sso.accountnotverified.url=/account-not-verified?email=
  71. #
  72. #sso.idp.admin.authfail=/403
  73. #sso.admin.authfail.lease.url=/lease-expired
  74. #sso.admin.authenticationfail.url=/login?error=
  75. #sso.admin.accountnotverified.url=/account-not-verified?email=
  76. #
  77. #sso.portal.dashboard.url=https://dev-portal.imcinternal.com/
  78. #sso.admin.dashboard.url=/
  79. #
  80. #sso.idp.logout.url=https://dev-idm-1a-1.imcinternal.com/idp/logout.jsp
  81. #sso.enterworks.logout.url=https://dev-pim-1a-1.imcinternal.com/webcm/logout.do
  82. #
  83. ## This is EULA Page url
  84. #lvm.eulapage.url=/policy-gateway-page
  85. #sso.eulapage.url=/policy-gateway-page
  86. #lvm.eulawebpolicypage.url=/eula-web-privacy-policy
  87. #sso.eulawebpolicypage.url=/eula-web-privacy-policy
  88. #
  89. #
  90. #zendesk.sub.domain=imcentershelp
  91. #zendesk.jwt.shared.secret=WFkv74ewAERZvaRjXvSbM33cqxVcJPgBu9zmhVuaUCw5VpMc
  92. #zendesk.jwt.expiration=20
  93. #zendesk.domain.protocol=https://
  94. #
  95. #hippo.cms.jwt.shared.secret=4G7Q+0ZYHalf6e7rHoLwsg==
  96. #hippo.cms.jwt.token.expiration.mins=30
  97. #hippo.cms.author.host=dev-author-1a-1.imcinternal.com:8080/cms/
  98. #hippo.cms.author.protocol=http://
  99. #
  100. ## ------------------- IDM - OAuth Properties ------------------------------------
  101. ## The endpoint should be contacted to get access token from IDM server
  102. #sso.idm.api.oauth.token.url=https://dev-idm.imcinternal.com/imc-api-idm/oauth/token
  103. ## A Resource Owner's username and password are submitted as part of the request, and a token is issued upon successful authentication.
  104. #sso.idm.api.oauth.token.grant.type=password
  105. ## The identifier of the client making the OAuth token request.It is configured in RDS "oauth_client_details" table
  106. #sso.idm.api.oauth.token.client.id=imcidm
  107. ## The client secret is a secret known only to the application and the authorization server. It is configured in RDS "oauth_client_details" table
  108. #sso.idm.api.oauth.token.client.secret=imcidm
  109. #
  110. ## IDM endpoint to revoke a token after logout
  111. #sso.idm.api.revoke.token.endpoint=http://localhost:8085/imc-api-idm//api/v1/token/oauth/token
  112. ## OAuth token revocation endpoint expects jwt token. This property configures the expiration time of JWT token
  113. #sso.idm.oauth.token.jwt.expiration.in.min=5
  114. ## OAuth token revocation endpoint expects jwt token. This property configures the signing keyof JWT token
  115. #sso.idm.oauth.token.jwt.shared.key=8vp162oWsT1VhHlgjlQDVg==
  116. #
  117. ## ------------------- IDM - OAuth Properties Ends ------------------------------------
  118.  
  119. ## SSL cert to sign the SAML messages
  120. #sso.keystore.file=file:/Users/leandrobelluscio/Clientes/Borderless/workspace/imc-lvm_portal/cms/conf/imckeystore/saml/lvdclocal-sso.jks
  121. ##sso.keystore.file=file:/Users/vsingh/rfprojects/IMC/workstation/source/lvm_portal/lvm_portal/cms/conf/imckeystore/saml/lvdclocal-sso.jks
  122. #
  123. ## Alias of the certificate
  124. #sso.keystore.alias=lvdclocalsso
  125. ## Passphrase of the keystore
  126. #sso.keystore.pass=lvdclocalsso
  127. #
  128. ## Resource URL for the idp metadata
  129. #sso.idp.metadata.url=https://dev-idm-1a-1.imcinternal.com/idp/shibboleth
  130. ##sso.idp.metadata.url=https://dev-gluutest.imcinternal.com/idp/shibboleth
  131. #
  132. #
  133. ## This is default value. It should be updated only if the context path changes from default.
  134. ##scheme://server:port/contextPath/saml/login?idp=mySelectedIDP.
  135. #sso.idp.loginUrl=/saml/login
  136. #
  137. ## Entity ID of the SP
  138. #sso.service.provider.entity.id=com:imc:eplocal:sp
  139. #
  140. ##Base URL of SP. Needs to be a URL with protocol, server, port and context path.
  141. #
  142. #sso.service.provider.entity.base.url=https://dev-portal.imcinternal.com/
  143. #
  144. ## Defines the name identifier formats supported by the identity provider.
  145. ## Name identifiers are a way for providers to communicate with each other regarding a user.
  146. #sso.service.provider.entity.name.id=urn:oasis:names:tc:SAML:2.0:nameid-format:imcaccountid
  147. #
  148. ##Context provider parameters which overrides request attributes with values of the load-balancer or reverse-proxy in front
  149. ##of the local application. The settings help to provide correct redirect URls and verify destination URLs during
  150. ##SAML processing.
  151. #sso.service.load.balancer.scheme=https
  152. #sso.service.load.balancer.host=dev-portal.imcinternal.com
  153. #sso.service.load.balancer.exhibitor.portal.host=dev-portal.imcinternal.com
  154. #sso.service.load.balancer.admin.portal.host=dev-admin.imcinternal.com
  155. #sso.service.load.balancer.context.path=/
  156. #
  157. ##static sp metadata configuration
  158. #sso.sp.metadata.exhibitor.portal=classpath:idmconf/default/exhibitor-portal.xml
  159. #sso.sp.metadata.admin.portal=classpath:idmconf/default/admin-portal.xml
  160. #sso.sp.metadata.exhibitor.portal.path=/idmconf/default/exhibitor-portal.xml
  161. #sso.sp.metadata.admin.portal.path=/idmconf/default/admin-portal.xml
  162. #
  163. ##The HTTP parameter to look for the username when performing authentication. Default is "username".
  164. #lvm.login.field.username=email
  165. ##The HTTP parameter to look for the password when performing authentication. Default is "password".
  166. #lvm.login.field.passwordname=password
  167. ## path where login page in Hippo will be available for LVM
  168. #lvm.login.page.url=/login
  169. #lvm.logout.success.redirect.url=/
  170. #
  171. #lvm.rememberme.token.timeout=15552000
  172. #lvm.authfail=/403
  173. #lvm.authenticationfail.url=/login?error=
  174. #
  175. ### -----------------
  176. #sso.site.config=classpath:idmconf/site-config-default.json
  177. #
  178. ##endpoint for getting user for exhibitor portal
  179. #sso.idm.api.by.id=http://localhost:8085/imc-api-idm/api/v1/token/{id}
  180. #
  181. #
  182. #
  183. ##endpoint for getting user for LVM website
  184. #sso.idm.api.by.email=http://localhost:8085/imc-api-idm/api/v1/token/{email}/account
  185. #sso.idm.api.update.login.attempt=http://localhost:8085/imc-api-idm/api/v1/lvm/open/loginattempt/{email}/update
  186. #sso.idm.api.reset.login.attempt=http://localhost:8085/imc-api-idm/api/v1/lvm/open/resetattempt/{email}/reset
  187. #
  188. #
  189. #
  190. #
  191. #sso.hippo.scan.package=com.imc.idm.security.core.userdetails
  192. ### =========== RDS schema config where spring session related tables are present ========================
  193. ##idm.spring.session.database.url=jdbc:mysql://172.31.188.35:3306/idm?useSSL=false
  194. ##idm.spring.session.datasource.driverClassName=com.mysql.jdbc.Driver
  195. ##idm.spring.session.datasource.username=idmapp
  196. ##idm.spring.session.datasource.password=idmdev07
  197. ##idm.spring.session.max.interval.seconds=7776000
  198. #idm.spring.session.database.url=jdbc:mysql://172.16.18.47:3306/idm
  199. #idm.spring.session.datasource.driverClassName=com.mysql.jdbc.Driver
  200. #idm.spring.session.datasource.username=idmapp
  201. #idm.spring.session.datasource.password=idmdev07
  202. #idm.spring.session.max.interval.seconds=7776000
  203. #
  204. ## This is authorization fail page
  205. #sso.idp.authfail=/403
  206. #sso.authfail.lease.url=/lease-expired
  207. #sso.authenticationfail.url=/login?error=
  208. #
  209. ## This is account verification email url
  210. #lvm.accountnotverified.url=/account-not-verified?email=
  211. #sso.accountnotverified.url=/account-not-verified?email=
  212. #
  213. #
  214. #sso.idp.admin.authfail=/403
  215. #sso.admin.authfail.lease.url=/lease-expired
  216. #sso.admin.authenticationfail.url=/login?error=
  217. #sso.admin.accountnotverified.url=/account-not-verified?email=
  218. #
  219. #sso.portal.dashboard.url=/
  220. #sso.admin.dashboard.url=/
  221. #
  222. #sso.idp.logout.url=https://gluu-test.imc.com/idp/logout.jsp
  223. #sso.enterworks.logout.url=https://ewrazorfish/webcm/logout.do
  224. #
  225. ## This is EULA Page url
  226. #lvm.eulapage.url=/policy-gateway-page
  227. #sso.eulapage.url=/policy-gateway-page
  228. #lvm.eulawebpolicypage.url=/eula-web-privacy-policy
  229. #sso.eulawebpolicypage.url=/eula-web-privacy-policy
  230. #
  231. #
  232. #zendesk.sub.domain=imcentershelp
  233. #zendesk.jwt.shared.secret=WFkv74ewAERZvaRjXvSbM33cqxVcJPgBu9zmhVuaUCw5VpMc
  234. #zendesk.jwt.expiration=20
  235. #zendesk.domain.protocol=https://
  236. #
  237. #hippo.cms.jwt.shared.secret=4G7Q+0ZYHalf6e7rHoLwsg==
  238. #hippo.cms.jwt.token.expiration.mins=30
  239. #hippo.cms.author.host=dev-local-portal.imcinternal.com:8080/cms/
  240. #hippo.cms.author.protocol=http://
  241. #
  242. ##------------------- IDM - OAuth Properties ------------------------------------
  243. ## The endpoint should be contacted to get access token from IDM server
  244. #sso.idm.api.oauth.token.url=https://dev-idm.imcinternal.com/imc-api-idm/oauth/token
  245. ## A Resource Owner's username and password are submitted as part of the request, and a token is issued upon successful authentication.
  246. #sso.idm.api.oauth.token.grant.type=password
  247. ## The identifier of the client making the OAuth token request.It is configured in RDS "oauth_client_details" table
  248. #sso.idm.api.oauth.token.client.id=imcidm
  249. ## The client secret is a secret known only to the application and the authorization server. It is configured in RDS "oauth_client_details" table
  250. #sso.idm.api.oauth.token.client.secret=imcidm
  251. #
  252. ## IDM endpoint to revoke a token after logout
  253. #sso.idm.api.revoke.token.endpoint=http://localhost:8085/imc-api-idm//api/v1/token/oauth/token
  254. ## OAuth token revocation endpoint expects jwt token. This property configures the expiration time of JWT token
  255. #sso.idm.oauth.token.jwt.expiration.in.min=5
  256. ## OAuth token revocation endpoint expects jwt token. This property configures the signing keyof JWT token
  257. #sso.idm.oauth.token.jwt.shared.key=8vp162oWsT1VhHlgjlQDVg==
  258. #
  259. ## ------------------- IDM - OAuth Properties Ends ------------------------------------
  260. # This is default value. It should be updated only if the context path changes from default.
  261. #scheme://server:port/contextPath/saml/login?idp=mySelectedIDP.
  262. sso.idp.loginUrl=/saml/login
  263.  
  264. # Entity ID of the SP
  265. sso.service.provider.entity.id=com:imc:eplocal:sp
  266.  
  267. #Base URL of SP. Needs to be a URL with protocol, server, port and context path.
  268.  
  269. sso.service.provider.entity.base.url=https://dev-portal.imcinternal.com/
  270.  
  271. # Defines the name identifier formats supported by the identity provider.
  272. # Name identifiers are a way for providers to communicate with each other regarding a user.
  273. sso.service.provider.entity.name.id=urn:oasis:names:tc:SAML:2.0:nameid-format:imcaccountid
  274.  
  275. #Context provider parameters which overrides request attributes with values of the load-balancer or reverse-proxy in front
  276. #of the local application. The settings help to provide correct redirect URls and verify destination URLs during
  277. #SAML processing.
  278. sso.service.load.balancer.scheme=https
  279. sso.service.load.balancer.host=dev-portal.imcinternal.com
  280. sso.service.load.balancer.exhibitor.portal.host=dev-portal.imcinternal.com
  281. sso.service.load.balancer.admin.portal.host=dev-admin.imcinternal.com
  282. sso.service.load.balancer.context.path=/
  283.  
  284. #static sp metadata configuration
  285. sso.sp.metadata.exhibitor.portal=classpath:idmconf/dev/exhibitor-portal.xml
  286. sso.sp.metadata.admin.portal=classpath:idmconf/dev/admin-portal.xml
  287. sso.sp.metadata.exhibitor.portal.path=/idmconf/dev/exhibitor-portal.xml
  288. sso.sp.metadata.admin.portal.path=/idmconf/dev/admin-portal.xml
  289.  
  290. #The HTTP parameter to look for the username when performing authentication. Default is "username".
  291. lvm.login.field.username=email
  292. #The HTTP parameter to look for the password when performing authentication. Default is "password".
  293. lvm.login.field.passwordname=password
  294. # path where login page in Hippo will be available for LVM
  295. lvm.login.page.url=/login
  296. lvm.logout.success.redirect.url=http://dev-idm-1a-1.imcinternal.com:8080/
  297.  
  298. lvm.rememberme.token.timeout=15552000
  299. lvm.authfail=/403
  300. lvm.authenticationfail.url=/login?error=
  301.  
  302.  
  303. sso.site.config=classpath:idmconf/site-config-dev.json
  304. #endpoint for getting user for exhibitor portal
  305. sso.idm.api.by.id=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/api/v1/token/{id}
  306. sso.idm.api.update.login.attempt=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/api/v1/lvm/open/loginattempt/{email}/update
  307. sso.idm.api.reset.login.attempt=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/api/v1/lvm/open/resetattempt/{email}/reset
  308.  
  309.  
  310.  
  311. #endpoint for getting user for LVM website
  312. sso.idm.api.by.email=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/api/v1/token/{email}/account
  313.  
  314. sso.hippo.scan.package=com.imc.idm.security.core.userdetails
  315. ## =========== RDS schema config where spring session related tables are present ========================
  316. idm.spring.session.database.url=jdbc:mysql://172.16.18.47:3306/idm
  317. idm.spring.session.datasource.driverClassName=com.mysql.jdbc.Driver
  318. idm.spring.session.datasource.username=idmapp
  319. idm.spring.session.datasource.password=idmdev07
  320. idm.spring.session.max.interval.seconds=7776000
  321.  
  322. # This is authorization fail page
  323. sso.idp.authfail=/403
  324. sso.authfail.lease.url=/lease-expired
  325. sso.authenticationfail.url=/login?error=
  326.  
  327. # This is account verification email url
  328. lvm.accountnotverified.url=/account-not-verified?email=
  329. sso.accountnotverified.url=/account-not-verified?email=
  330.  
  331. sso.idp.admin.authfail=/403
  332. sso.admin.authfail.lease.url=/lease-expired
  333. sso.admin.authenticationfail.url=/login?error=
  334. sso.admin.accountnotverified.url=/account-not-verified?email=
  335.  
  336. sso.portal.dashboard.url=https://dev-portal.imcinternal.com:8080/
  337. sso.admin.dashboard.url=/
  338.  
  339. sso.idp.logout.url=https://dev-idm-1a-1.imcinternal.com:8080/idp/logout.jsp
  340. sso.enterworks.logout.url=https://dev-pim-1a-1.imcinternal.com/webcm/logout.do
  341.  
  342. # This is EULA Page url
  343. lvm.eulapage.url=/policy-gateway-page
  344. sso.eulapage.url=/policy-gateway-page
  345. lvm.eulawebpolicypage.url=/eula-web-privacy-policy
  346. sso.eulawebpolicypage.url=/eula-web-privacy-policy
  347.  
  348.  
  349. zendesk.sub.domain=imcentershelp
  350. zendesk.jwt.shared.secret=WFkv74ewAERZvaRjXvSbM33cqxVcJPgBu9zmhVuaUCw5VpMc
  351. zendesk.jwt.expiration=20
  352. zendesk.domain.protocol=https://
  353.  
  354. hippo.cms.jwt.shared.secret=4G7Q+0ZYHalf6e7rHoLwsg==
  355. hippo.cms.jwt.token.expiration.mins=30
  356. hippo.cms.author.host=dev-author-1a-1.imcinternal.com:8080/cms/
  357. hippo.cms.author.protocol=http://
  358.  
  359. # ------------------- IDM - OAuth Properties ------------------------------------
  360. # The endpoint should be contacted to get access token from IDM server
  361. sso.idm.api.oauth.token.url=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/oauth/token
  362. # A Resource Owner's username and password are submitted as part of the request, and a token is issued upon successful authentication.
  363. sso.idm.api.oauth.token.grant.type=password
  364. # The identifier of the client making the OAuth token request.It is configured in RDS "oauth_client_details" table
  365. sso.idm.api.oauth.token.client.id=imcidm
  366. # The client secret is a secret known only to the application and the authorization server. It is configured in RDS "oauth_client_details" table
  367. sso.idm.api.oauth.token.client.secret=imcidm
  368.  
  369. # IDM endpoint to revoke a token after logout
  370. sso.idm.api.revoke.token.endpoint=http://localhost:8085/imc-api-idm//api/v1/token/oauth/token
  371. # OAuth token revocation endpoint expects jwt token. This property configures the expiration time of JWT token
  372. sso.idm.oauth.token.jwt.expiration.in.min=5
  373. # OAuth token revocation endpoint expects jwt token. This property configures the signing keyof JWT token
  374. sso.idm.oauth.token.jwt.shared.key=8vp162oWsT1VhHlgjlQDVg==
  375.  
  376. # ------------------- IDM - OAuth Properties Ends ------------------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement