Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- This is default value. It should be updated only if the context path changes from default.
- ##scheme://server:port/contextPath/saml/login?idp=mySelectedIDP.
- #sso.idp.loginUrl=/saml/login
- #
- ## Entity ID of the SP
- #sso.service.provider.entity.id=com:imc:eplocal:sp
- #
- ##Base URL of SP. Needs to be a URL with protocol, server, port and context path.
- #
- #sso.service.provider.entity.base.url=https://dev-portal.imcinternal.com/
- #
- ## Defines the name identifier formats supported by the identity provider.
- ## Name identifiers are a way for providers to communicate with each other regarding a user.
- #sso.service.provider.entity.name.id=urn:oasis:names:tc:SAML:2.0:nameid-format:imcaccountid
- #
- ##Context provider parameters which overrides request attributes with values of the load-balancer or reverse-proxy in front
- ##of the local application. The settings help to provide correct redirect URls and verify destination URLs during
- ##SAML processing.
- #sso.service.load.balancer.scheme=https
- #sso.service.load.balancer.host=dev-portal.imcinternal.com
- #sso.service.load.balancer.exhibitor.portal.host=dev-portal.imcinternal.com
- #sso.service.load.balancer.admin.portal.host=dev-admin.imcinternal.com
- #sso.service.load.balancer.context.path=/
- #
- ##static sp metadata configuration
- #sso.sp.metadata.exhibitor.portal=classpath:idmconf/dev/exhibitor-portal.xml
- #sso.sp.metadata.admin.portal=classpath:idmconf/dev/admin-portal.xml
- #sso.sp.metadata.exhibitor.portal.path=/idmconf/dev/exhibitor-portal.xml
- #sso.sp.metadata.admin.portal.path=/idmconf/dev/admin-portal.xml
- #
- ##The HTTP parameter to look for the username when performing authentication. Default is "username".
- #lvm.login.field.username=email
- ##The HTTP parameter to look for the password when performing authentication. Default is "password".
- #lvm.login.field.passwordname=password
- ## path where login page in Hippo will be available for LVM
- #lvm.login.page.url=/login
- #lvm.logout.success.redirect.url=https://dev-lvm.imcinternal.com/
- #
- #lvm.rememberme.token.timeout=15552000
- #lvm.authfail=/403
- #lvm.authenticationfail.url=/login?error=
- #
- #
- #sso.site.config=classpath:idmconf/site-config-dev.json
- ##endpoint for getting user for exhibitor portal
- #sso.idm.api.by.id=https://dev-idm.imcinternal.com/imc-api-idm/api/v1/token/{id}
- #sso.idm.api.update.login.attempt=https://dev-idm.imcinternal.com/imc-api-idm/api/v1/lvm/open/loginattempt/{email}/update
- #sso.idm.api.reset.login.attempt=https://dev-idm.imcinternal.com/imc-api-idm/api/v1/lvm/open/resetattempt/{email}/reset
- #
- #
- #
- ##endpoint for getting user for LVM website
- #sso.idm.api.by.email=https://dev-idm.imcinternal.com/imc-api-idm/api/v1/token/{email}/account
- #
- #sso.hippo.scan.package=com.imc.idm.security.core.userdetails
- ### =========== RDS schema config where spring session related tables are present ========================
- #idm.spring.session.database.url=jdbc:mysql://172.16.18.47:3306/idm
- #idm.spring.session.datasource.driverClassName=com.mysql.jdbc.Driver
- #idm.spring.session.datasource.username=idmapp
- #idm.spring.session.datasource.password=idmdev07
- #idm.spring.session.max.interval.seconds=7776000
- #
- ## This is authorization fail page
- #sso.idp.authfail=/403
- #sso.authfail.lease.url=/lease-expired
- #sso.authenticationfail.url=/login?error=
- #
- ## This is account verification email url
- #lvm.accountnotverified.url=/account-not-verified?email=
- #sso.accountnotverified.url=/account-not-verified?email=
- #
- #sso.idp.admin.authfail=/403
- #sso.admin.authfail.lease.url=/lease-expired
- #sso.admin.authenticationfail.url=/login?error=
- #sso.admin.accountnotverified.url=/account-not-verified?email=
- #
- #sso.portal.dashboard.url=https://dev-portal.imcinternal.com/
- #sso.admin.dashboard.url=/
- #
- #sso.idp.logout.url=https://dev-idm-1a-1.imcinternal.com/idp/logout.jsp
- #sso.enterworks.logout.url=https://dev-pim-1a-1.imcinternal.com/webcm/logout.do
- #
- ## This is EULA Page url
- #lvm.eulapage.url=/policy-gateway-page
- #sso.eulapage.url=/policy-gateway-page
- #lvm.eulawebpolicypage.url=/eula-web-privacy-policy
- #sso.eulawebpolicypage.url=/eula-web-privacy-policy
- #
- #
- #zendesk.sub.domain=imcentershelp
- #zendesk.jwt.shared.secret=WFkv74ewAERZvaRjXvSbM33cqxVcJPgBu9zmhVuaUCw5VpMc
- #zendesk.jwt.expiration=20
- #zendesk.domain.protocol=https://
- #
- #hippo.cms.jwt.shared.secret=4G7Q+0ZYHalf6e7rHoLwsg==
- #hippo.cms.jwt.token.expiration.mins=30
- #hippo.cms.author.host=dev-author-1a-1.imcinternal.com:8080/cms/
- #hippo.cms.author.protocol=http://
- #
- ## ------------------- IDM - OAuth Properties ------------------------------------
- ## The endpoint should be contacted to get access token from IDM server
- #sso.idm.api.oauth.token.url=https://dev-idm.imcinternal.com/imc-api-idm/oauth/token
- ## A Resource Owner's username and password are submitted as part of the request, and a token is issued upon successful authentication.
- #sso.idm.api.oauth.token.grant.type=password
- ## The identifier of the client making the OAuth token request.It is configured in RDS "oauth_client_details" table
- #sso.idm.api.oauth.token.client.id=imcidm
- ## The client secret is a secret known only to the application and the authorization server. It is configured in RDS "oauth_client_details" table
- #sso.idm.api.oauth.token.client.secret=imcidm
- #
- ## IDM endpoint to revoke a token after logout
- #sso.idm.api.revoke.token.endpoint=http://localhost:8085/imc-api-idm//api/v1/token/oauth/token
- ## OAuth token revocation endpoint expects jwt token. This property configures the expiration time of JWT token
- #sso.idm.oauth.token.jwt.expiration.in.min=5
- ## OAuth token revocation endpoint expects jwt token. This property configures the signing keyof JWT token
- #sso.idm.oauth.token.jwt.shared.key=8vp162oWsT1VhHlgjlQDVg==
- #
- ## ------------------- IDM - OAuth Properties Ends ------------------------------------
- ## SSL cert to sign the SAML messages
- #sso.keystore.file=file:/Users/leandrobelluscio/Clientes/Borderless/workspace/imc-lvm_portal/cms/conf/imckeystore/saml/lvdclocal-sso.jks
- ##sso.keystore.file=file:/Users/vsingh/rfprojects/IMC/workstation/source/lvm_portal/lvm_portal/cms/conf/imckeystore/saml/lvdclocal-sso.jks
- #
- ## Alias of the certificate
- #sso.keystore.alias=lvdclocalsso
- ## Passphrase of the keystore
- #sso.keystore.pass=lvdclocalsso
- #
- ## Resource URL for the idp metadata
- #sso.idp.metadata.url=https://dev-idm-1a-1.imcinternal.com/idp/shibboleth
- ##sso.idp.metadata.url=https://dev-gluutest.imcinternal.com/idp/shibboleth
- #
- #
- ## This is default value. It should be updated only if the context path changes from default.
- ##scheme://server:port/contextPath/saml/login?idp=mySelectedIDP.
- #sso.idp.loginUrl=/saml/login
- #
- ## Entity ID of the SP
- #sso.service.provider.entity.id=com:imc:eplocal:sp
- #
- ##Base URL of SP. Needs to be a URL with protocol, server, port and context path.
- #
- #sso.service.provider.entity.base.url=https://dev-portal.imcinternal.com/
- #
- ## Defines the name identifier formats supported by the identity provider.
- ## Name identifiers are a way for providers to communicate with each other regarding a user.
- #sso.service.provider.entity.name.id=urn:oasis:names:tc:SAML:2.0:nameid-format:imcaccountid
- #
- ##Context provider parameters which overrides request attributes with values of the load-balancer or reverse-proxy in front
- ##of the local application. The settings help to provide correct redirect URls and verify destination URLs during
- ##SAML processing.
- #sso.service.load.balancer.scheme=https
- #sso.service.load.balancer.host=dev-portal.imcinternal.com
- #sso.service.load.balancer.exhibitor.portal.host=dev-portal.imcinternal.com
- #sso.service.load.balancer.admin.portal.host=dev-admin.imcinternal.com
- #sso.service.load.balancer.context.path=/
- #
- ##static sp metadata configuration
- #sso.sp.metadata.exhibitor.portal=classpath:idmconf/default/exhibitor-portal.xml
- #sso.sp.metadata.admin.portal=classpath:idmconf/default/admin-portal.xml
- #sso.sp.metadata.exhibitor.portal.path=/idmconf/default/exhibitor-portal.xml
- #sso.sp.metadata.admin.portal.path=/idmconf/default/admin-portal.xml
- #
- ##The HTTP parameter to look for the username when performing authentication. Default is "username".
- #lvm.login.field.username=email
- ##The HTTP parameter to look for the password when performing authentication. Default is "password".
- #lvm.login.field.passwordname=password
- ## path where login page in Hippo will be available for LVM
- #lvm.login.page.url=/login
- #lvm.logout.success.redirect.url=/
- #
- #lvm.rememberme.token.timeout=15552000
- #lvm.authfail=/403
- #lvm.authenticationfail.url=/login?error=
- #
- ### -----------------
- #sso.site.config=classpath:idmconf/site-config-default.json
- #
- ##endpoint for getting user for exhibitor portal
- #sso.idm.api.by.id=http://localhost:8085/imc-api-idm/api/v1/token/{id}
- #
- #
- #
- ##endpoint for getting user for LVM website
- #sso.idm.api.by.email=http://localhost:8085/imc-api-idm/api/v1/token/{email}/account
- #sso.idm.api.update.login.attempt=http://localhost:8085/imc-api-idm/api/v1/lvm/open/loginattempt/{email}/update
- #sso.idm.api.reset.login.attempt=http://localhost:8085/imc-api-idm/api/v1/lvm/open/resetattempt/{email}/reset
- #
- #
- #
- #
- #sso.hippo.scan.package=com.imc.idm.security.core.userdetails
- ### =========== RDS schema config where spring session related tables are present ========================
- ##idm.spring.session.database.url=jdbc:mysql://172.31.188.35:3306/idm?useSSL=false
- ##idm.spring.session.datasource.driverClassName=com.mysql.jdbc.Driver
- ##idm.spring.session.datasource.username=idmapp
- ##idm.spring.session.datasource.password=idmdev07
- ##idm.spring.session.max.interval.seconds=7776000
- #idm.spring.session.database.url=jdbc:mysql://172.16.18.47:3306/idm
- #idm.spring.session.datasource.driverClassName=com.mysql.jdbc.Driver
- #idm.spring.session.datasource.username=idmapp
- #idm.spring.session.datasource.password=idmdev07
- #idm.spring.session.max.interval.seconds=7776000
- #
- ## This is authorization fail page
- #sso.idp.authfail=/403
- #sso.authfail.lease.url=/lease-expired
- #sso.authenticationfail.url=/login?error=
- #
- ## This is account verification email url
- #lvm.accountnotverified.url=/account-not-verified?email=
- #sso.accountnotverified.url=/account-not-verified?email=
- #
- #
- #sso.idp.admin.authfail=/403
- #sso.admin.authfail.lease.url=/lease-expired
- #sso.admin.authenticationfail.url=/login?error=
- #sso.admin.accountnotverified.url=/account-not-verified?email=
- #
- #sso.portal.dashboard.url=/
- #sso.admin.dashboard.url=/
- #
- #sso.idp.logout.url=https://gluu-test.imc.com/idp/logout.jsp
- #sso.enterworks.logout.url=https://ewrazorfish/webcm/logout.do
- #
- ## This is EULA Page url
- #lvm.eulapage.url=/policy-gateway-page
- #sso.eulapage.url=/policy-gateway-page
- #lvm.eulawebpolicypage.url=/eula-web-privacy-policy
- #sso.eulawebpolicypage.url=/eula-web-privacy-policy
- #
- #
- #zendesk.sub.domain=imcentershelp
- #zendesk.jwt.shared.secret=WFkv74ewAERZvaRjXvSbM33cqxVcJPgBu9zmhVuaUCw5VpMc
- #zendesk.jwt.expiration=20
- #zendesk.domain.protocol=https://
- #
- #hippo.cms.jwt.shared.secret=4G7Q+0ZYHalf6e7rHoLwsg==
- #hippo.cms.jwt.token.expiration.mins=30
- #hippo.cms.author.host=dev-local-portal.imcinternal.com:8080/cms/
- #hippo.cms.author.protocol=http://
- #
- ##------------------- IDM - OAuth Properties ------------------------------------
- ## The endpoint should be contacted to get access token from IDM server
- #sso.idm.api.oauth.token.url=https://dev-idm.imcinternal.com/imc-api-idm/oauth/token
- ## A Resource Owner's username and password are submitted as part of the request, and a token is issued upon successful authentication.
- #sso.idm.api.oauth.token.grant.type=password
- ## The identifier of the client making the OAuth token request.It is configured in RDS "oauth_client_details" table
- #sso.idm.api.oauth.token.client.id=imcidm
- ## The client secret is a secret known only to the application and the authorization server. It is configured in RDS "oauth_client_details" table
- #sso.idm.api.oauth.token.client.secret=imcidm
- #
- ## IDM endpoint to revoke a token after logout
- #sso.idm.api.revoke.token.endpoint=http://localhost:8085/imc-api-idm//api/v1/token/oauth/token
- ## OAuth token revocation endpoint expects jwt token. This property configures the expiration time of JWT token
- #sso.idm.oauth.token.jwt.expiration.in.min=5
- ## OAuth token revocation endpoint expects jwt token. This property configures the signing keyof JWT token
- #sso.idm.oauth.token.jwt.shared.key=8vp162oWsT1VhHlgjlQDVg==
- #
- ## ------------------- IDM - OAuth Properties Ends ------------------------------------
- # This is default value. It should be updated only if the context path changes from default.
- #scheme://server:port/contextPath/saml/login?idp=mySelectedIDP.
- sso.idp.loginUrl=/saml/login
- # Entity ID of the SP
- sso.service.provider.entity.id=com:imc:eplocal:sp
- #Base URL of SP. Needs to be a URL with protocol, server, port and context path.
- sso.service.provider.entity.base.url=https://dev-portal.imcinternal.com/
- # Defines the name identifier formats supported by the identity provider.
- # Name identifiers are a way for providers to communicate with each other regarding a user.
- sso.service.provider.entity.name.id=urn:oasis:names:tc:SAML:2.0:nameid-format:imcaccountid
- #Context provider parameters which overrides request attributes with values of the load-balancer or reverse-proxy in front
- #of the local application. The settings help to provide correct redirect URls and verify destination URLs during
- #SAML processing.
- sso.service.load.balancer.scheme=https
- sso.service.load.balancer.host=dev-portal.imcinternal.com
- sso.service.load.balancer.exhibitor.portal.host=dev-portal.imcinternal.com
- sso.service.load.balancer.admin.portal.host=dev-admin.imcinternal.com
- sso.service.load.balancer.context.path=/
- #static sp metadata configuration
- sso.sp.metadata.exhibitor.portal=classpath:idmconf/dev/exhibitor-portal.xml
- sso.sp.metadata.admin.portal=classpath:idmconf/dev/admin-portal.xml
- sso.sp.metadata.exhibitor.portal.path=/idmconf/dev/exhibitor-portal.xml
- sso.sp.metadata.admin.portal.path=/idmconf/dev/admin-portal.xml
- #The HTTP parameter to look for the username when performing authentication. Default is "username".
- lvm.login.field.username=email
- #The HTTP parameter to look for the password when performing authentication. Default is "password".
- lvm.login.field.passwordname=password
- # path where login page in Hippo will be available for LVM
- lvm.login.page.url=/login
- lvm.logout.success.redirect.url=http://dev-idm-1a-1.imcinternal.com:8080/
- lvm.rememberme.token.timeout=15552000
- lvm.authfail=/403
- lvm.authenticationfail.url=/login?error=
- sso.site.config=classpath:idmconf/site-config-dev.json
- #endpoint for getting user for exhibitor portal
- sso.idm.api.by.id=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/api/v1/token/{id}
- sso.idm.api.update.login.attempt=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/api/v1/lvm/open/loginattempt/{email}/update
- sso.idm.api.reset.login.attempt=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/api/v1/lvm/open/resetattempt/{email}/reset
- #endpoint for getting user for LVM website
- sso.idm.api.by.email=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/api/v1/token/{email}/account
- sso.hippo.scan.package=com.imc.idm.security.core.userdetails
- ## =========== RDS schema config where spring session related tables are present ========================
- idm.spring.session.database.url=jdbc:mysql://172.16.18.47:3306/idm
- idm.spring.session.datasource.driverClassName=com.mysql.jdbc.Driver
- idm.spring.session.datasource.username=idmapp
- idm.spring.session.datasource.password=idmdev07
- idm.spring.session.max.interval.seconds=7776000
- # This is authorization fail page
- sso.idp.authfail=/403
- sso.authfail.lease.url=/lease-expired
- sso.authenticationfail.url=/login?error=
- # This is account verification email url
- lvm.accountnotverified.url=/account-not-verified?email=
- sso.accountnotverified.url=/account-not-verified?email=
- sso.idp.admin.authfail=/403
- sso.admin.authfail.lease.url=/lease-expired
- sso.admin.authenticationfail.url=/login?error=
- sso.admin.accountnotverified.url=/account-not-verified?email=
- sso.portal.dashboard.url=https://dev-portal.imcinternal.com:8080/
- sso.admin.dashboard.url=/
- sso.idp.logout.url=https://dev-idm-1a-1.imcinternal.com:8080/idp/logout.jsp
- sso.enterworks.logout.url=https://dev-pim-1a-1.imcinternal.com/webcm/logout.do
- # This is EULA Page url
- lvm.eulapage.url=/policy-gateway-page
- sso.eulapage.url=/policy-gateway-page
- lvm.eulawebpolicypage.url=/eula-web-privacy-policy
- sso.eulawebpolicypage.url=/eula-web-privacy-policy
- zendesk.sub.domain=imcentershelp
- zendesk.jwt.shared.secret=WFkv74ewAERZvaRjXvSbM33cqxVcJPgBu9zmhVuaUCw5VpMc
- zendesk.jwt.expiration=20
- zendesk.domain.protocol=https://
- hippo.cms.jwt.shared.secret=4G7Q+0ZYHalf6e7rHoLwsg==
- hippo.cms.jwt.token.expiration.mins=30
- hippo.cms.author.host=dev-author-1a-1.imcinternal.com:8080/cms/
- hippo.cms.author.protocol=http://
- # ------------------- IDM - OAuth Properties ------------------------------------
- # The endpoint should be contacted to get access token from IDM server
- sso.idm.api.oauth.token.url=http://dev-idm-1a-1.imcinternal.com:8080/imc-api-idm/oauth/token
- # A Resource Owner's username and password are submitted as part of the request, and a token is issued upon successful authentication.
- sso.idm.api.oauth.token.grant.type=password
- # The identifier of the client making the OAuth token request.It is configured in RDS "oauth_client_details" table
- sso.idm.api.oauth.token.client.id=imcidm
- # The client secret is a secret known only to the application and the authorization server. It is configured in RDS "oauth_client_details" table
- sso.idm.api.oauth.token.client.secret=imcidm
- # IDM endpoint to revoke a token after logout
- sso.idm.api.revoke.token.endpoint=http://localhost:8085/imc-api-idm//api/v1/token/oauth/token
- # OAuth token revocation endpoint expects jwt token. This property configures the expiration time of JWT token
- sso.idm.oauth.token.jwt.expiration.in.min=5
- # OAuth token revocation endpoint expects jwt token. This property configures the signing keyof JWT token
- sso.idm.oauth.token.jwt.shared.key=8vp162oWsT1VhHlgjlQDVg==
- # ------------------- IDM - OAuth Properties Ends ------------------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement