Advertisement
Guest User

Untitled

a guest
Aug 17th, 2019
86
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.74 KB | None | 0 0
  1. ## Configure the uaa client
  2. uaac target ${uaa-url} --skip-ssl-validation # set the UAA api endpoint
  3. uaac token client get admin -s $uaa_admin_client_secret # authenticate as the UAA admin (any client with the 'clients.read' authority will do)
  4.  
  5. ## If any of the following queries finds matching clients, your UAA server was likely attacked using CVE-2019-11270.
  6. # Check for UAA management scopes:
  7. uaac clients "client_id eq 'clients' or client_id eq 'scim' or client_id eq 'groups' or client_id sw 'zones'"
  8. uaac clients "client_id eq 'password' or client_id eq 'idps' or client_id eq 'oauth'"
  9. # Check for Cloud Foundry scopes:
  10. uaac clients "client_id eq 'cloud_controller' or client_id eq 'routing' or client_id eq 'doppler' or client_id eq 'notifications'"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement