/
Example configuration (tia® Connect)
Example configuration (tia® Connect)
server:
port: 8080
ssl:
enabled: true
key-store-type: PKCS12
key-store: <path>\<file>.p12
key-store-password: <password>
key-alias: <alias>
tia:
security:
oidc:
type: authorization_code
sslBundleName: selfsignedcertificate
instances:
default:
sharepoint:
encryptionkeydefinitions:
- id: "1"
encryptionKey: <key>
- id: "2"
encryptionKey: <key>
custom:
sharepoint:
archiveFolder: <path>
sharedLinks:
accessMode: oidc
cmis:
url: localhost:8081/browser
protocol: http
repositoryid: <repository id>
auth:
type: oauth2
oauth2:
clientRegistrationId: cmisauth
cmiswithcertificate:
url: localhost:8081/browser
protocol: http
repositoryid: <repository id>
auth:
type: oauth2
oauth2:
clientRegistrationId: cmisauthwithcertificate
spring:
security:
oauth2:
client:
provider:
azure:
issuer-uri: https://login.microsoftonline.com/<tenant id>/v2.0
user-name-attribute: name
registration:
sharedlinkauth:
provider: azure
client-id: <client id>
client-secret: <client secret>
authorization-grant-type: authorization_code
scope:
- openid
- email
- profile
cmisauth:
provider: azure
client-id: <client id>
client-secret: <client secret>
authorization-grant-type: client_credentials
scope: <client id>/.default
cmisauthwithcertificate:
provider: azure
client-id: <client id>
client-authentication-method: self_signed_tls_client_auth
authorization-grant-type: client_credentials
scope: <client id>/.default
resourceserver:
jwt:
issuer-uri: https://login.microsoftonline.com/<tenant id>/v2.0
audience: <audience>
master-tenant-id: <tenant id>
ssl:
bundle:
jks:
selfsignedcertificate:
key:
alias: <key alias>
password: <key password>
keystore:
location: <path to>\<keystore>.p12
password: <keystore password>
type: PKCS12
, multiple selections available,
Related content
Security configuration (tia® Connect)
Security configuration (tia® Connect)
More like this
which KeyStore type is used when ? (tC)
which KeyStore type is used when ? (tC)
More like this