Cfgauth configuration
The following configuration items set up authentication and permissioning information for Liberator’s cfgauth auth module
The cfgauth module is not suitable for use in production. |
Cfgauth enables you to configure authentication for Liberator users and establish simple permissions for the types of objects they access.
For background information, see the Liberator Features and Concepts page about User authentication and permissioning.
The general auth module configuration also applies to cfgauth. In particular, you use an auth-module configuration item to specify that Liberator is to use the cfgauth module.
auth-module cfgauth
The cfgauth.conf configuration file
The configuration for cfgauth is kept in a separate configuration file called cfgauth.conf
. If you’re not using the Caplin Deployment Framework, you should put the cfgauth configuration items you require into this file.
Setting up cfgauth
To set up cfgauth:
-
Deactivate the OpenPermissioning blade:
./dfw deactivate OpenPermissioning
-
Add the cfgauth module to
<Framework-root>/global_config/overrides/servers/Liberator/etc/rttp.conf
:auth-module cfgauth
-
Create a configuration file called
cfgauth.conf
in<Framework-root>/global_config/overrides/servers/Liberator/etc/cfgauth.conf
and put the cfgauth configuration you require in there.
There’s an example cfgauth.conf file in <Framework-root>/kits/Liberator\Liberator-<version>/etc. If you want to add more users and permissions to cfgauth, you can copy this file to <Framework-root>/global_config/overrides/servers/Liberator/etc/ and edit that copy. Don’t edit the cfgauth.conf file directly in <Framework-root>/kits/Liberator\Liberator-<version>/etc
|
add-user
add-user
specifes a Liberator user who will be authenticated by cfgauth, and the access permissions for that user. If the sigcheck option is supplied, cfgauth always authenticates the user against the signature in a credentials token, otherwise it authenticates against the user’s password.
Syntax:
Option | Type | Default | Description | ||
---|---|---|---|---|---|
string |
|
Specifies a start date from which this user is allowed access to the Liberator and the duration in days for which access is valid. The format is |
|||
boolean |
|
When |
|||
integer |
|
The maximum number of concurrent Liberator sessions that a licenced user can have. |
|||
string |
[none] |
The password for this user. If encrypted-passwords is set to 1, the passwords must be encrypted using the cfgpass utility
To run cfgpass:
|
|||
string |
[none] |
A prefix that’s added to every subject this user subscribes to, before the subscription is actioned. This effectively personalises the subscription request. Example: add-user username UserA ... prefix /TIER1 end-user add-user username UserB ... prefix /TIER2 end-user When But when |
|||
array of integers |
[none] |
A space-separated list of the object types that this user can read. The supported object types are:
Unknown Objects are objects that have been requested from an active DataSource application. The actual type of such an object may not be known until the DataSource application returns the object together with information about its type. System Information Objects include |
|||
boolean |
|
||||
string |
[none] (But option doesn’t apply unless sigcheck is |
A signature key used to authenticate this user against the signature in a credentials token supplied by KeyMaster. If sigcheck is set to |
|||
string |
[none] |
The username for this user. |
|||
array of integers |
[none] |
A space-separated list of the object types that this user can write to. The supported object types are:
Unknown Objects are objects that have been requested from an active DataSource application. The actual type of such an object may not be known until the DataSource application returns the object together with information about its type. System Information Objects include |
encrypted-passwords
encrypted-passwords
specifies whether or not the passwords specified in the password option of each add-user item are encrypted.
-
encrypted password 1
means the passwords are encrypted. -
encrypted password 0
means the passwords are plain text.
Syntax: encrypted-passwords <0-or-1>
Type: integer
Default value: 0
(passwords are plain text)
See also: