/
Example configuration (tia® Connect)

Example configuration (tia® Connect)

server: port: 8080 ssl: enabled: true key-store-type: PKCS12 key-store: <path>\<file>.p12 key-store-password: <password> key-alias: <alias> tia: security: oidc: type: authorization_code sslBundleName: selfsignedcertificate instances: default: sharepoint: encryptionkeydefinitions: - id: "1" encryptionKey: <key> - id: "2" encryptionKey: <key> custom: sharepoint: archiveFolder: <path> sharedLinks: accessMode: oidc cmis: url: localhost:8081/browser protocol: http repositoryid: <repository id> auth: type: oauth2 oauth2: clientRegistrationId: cmisauth cmiswithcertificate: url: localhost:8081/browser protocol: http repositoryid: <repository id> auth: type: oauth2 oauth2: clientRegistrationId: cmisauthwithcertificate spring: security: oauth2: client: provider: azure: issuer-uri: https://login.microsoftonline.com/<tenant id>/v2.0 user-name-attribute: name registration: sharedlinkauth: provider: azure client-id: <client id> client-secret: <client secret> authorization-grant-type: authorization_code scope: - openid - email - profile cmisauth: provider: azure client-id: <client id> client-secret: <client secret> authorization-grant-type: client_credentials scope: <client id>/.default cmisauthwithcertificate: provider: azure client-id: <client id> client-authentication-method: self_signed_tls_client_auth authorization-grant-type: client_credentials scope: <client id>/.default resourceserver: jwt: issuer-uri: https://login.microsoftonline.com/<tenant id>/v2.0 audience: <audience> master-tenant-id: <tenant id> ssl: bundle: jks: selfsignedcertificate: key: alias: <key alias> password: <key password> keystore: location: <path to>\<keystore>.p12 password: <keystore password> type: PKCS12

Related content

Security configuration (tia® Connect)
Security configuration (tia® Connect)
More like this
which KeyStore type is used when ? (tC)
which KeyStore type is used when ? (tC)
More like this