Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

Like all SOAJS microservices, OAuth microservice has different layers of configuration. Local configuration, tenant-level configuration if the microservice is a multitenant one, and registry configuration. Moreover, OAuth can have a custom separate database for tokens and users. 


Configuration Layers

1 - Tenant configuration

Provisioning is a configuration that all SOAJS micro-services can acquire once you turn on multi-tenant for them. Once a service becomes multi-tenant, you can provide custom tenant configuration to it at run time. If you have 2 tenants that can access the oAuth service, then the provisioned configuration for each tenant will be loaded once that tenant invokes an API in oAuth.

The below configuration is supported by the oAuth micro-service and can be configured & changed at the tenant level under the Manage Pillar.

Code Block
languagejs
titleConfiguration Sample
linenumberstrue
collapsetrue
{
    _id: "%tenant_id%",
    ...
    oauth: {
        secret: "tenant_oauth_secret",
        pin: {
            "%product_name%": {
                enabled: true
            }
        },
        disabled: 0, //OAuth enabled or not
        type: 2,//OAuth type
        loginMode: "%login_mode%"
    },
    ....
}

Follow the Configuration Steps to add and update tenant configuration for OAuth


You can change the values of the below variables to customize secret, type, and loginMode


NameTypeDescriptionExample
secretStringOAuth secret variable"secret"
typeNumberOAuth type1 or 2
loginModeStringOauth Login ModeURAC or miniURAC




2 - Environment configuration (registry)

This configuration is on the environment level. OAuth configuration can be added from SOAJS Console.

Code Block
languagejs
titleConfiguration Sample
linenumberstrue
collapsetrue
{
	_id: "%environment_id%",
	services: {
		...
		config: {
			...
			oauth: {
				grants: [
					"password",
					"refresh_token"
				],
				debug: false,
				getUserFromToken: true,
				accessTokenLifetime: 7200),
				refreshTokenLifetime: 1209600
			},
			...
		}
	}
}

Follow the Configuration Steps to add and update environment configuration for OAuth


You can change the values of the below variables to customize grants, debug, getUserFromToken, accessTokenLifetime, and refreshTokenLifetime


NameTypeDescriptionExample
grantsArrayGrant types["password"]
debugBooleanDebugfalse or true
getUserFromTokenBooleanallow to get information about user directly from tokenfalse or true
accessTokenLifetimeNumberaccess token lifetime7200
refreshTokenLifetimeNumberrefresh token lifetime1209600




3 - Custom registry configuration

oAuth supports pin login. So what is is pin login?



4 - Separate Database for tokens and users

OAuth can have a separate database that can be added from Deploy tab in SOAJS Console → Databases


Follow the Configuration Steps below to create a database for OAuth

The database should have the name "oauth" to be used.


4

5 - Tenant Key Configuration (provision)


Info
titleLocation

In provision - key configuration


Code Block
languagejs
titleIn Provision Config sample
linenumberstrue
collapsetrue
oauth: {
	loginMode: "urac", //oauth login mode,
	roaming: {
		whitelistips: [
			"192.168.0.1",
			"127.0.0.1"
		]
	},
	passportLogin: { // 3rd party integrations using passport
	    "github": {...},
		"facebook": {...},
		"twitter": {...},
		"google": {...},
	},
	azure: {...},
	openam: {...},
	ldapServer: {...}
}               

Follow the Configuration Steps to add and update the key configuration for OAuth


You can change the values of the below variables to customize loginMode and passportLogin


NameTypeDescriptionExample
loginModeStringOauth Login ModeURAC or miniURAC
roamingObjectThe object contains whitelistips which is an array of strings
roaming: {
whitelistips: [
"192.168.0.1",
"127.0.0.1"
]
}
passportLoginObjectIncludes configuration of Facebook, Twitter, Google, and Github in case of 3rd party integrationDetails and examples in Passport Login
azureObjectAzure configuration object Details and examples in /wiki/spaces/OAUT/pages/1433927681

openam

Objectopen-source access management configurationDetails and examples in OpenAM login

ldapServer

Objectactive directory login configurationDetails and examples in LDAP




Passport Login: Define application keys for passport integration. Currently supporting Github, Twitter, Facebook, and Google. Go to the link for more information and an example of the configuration.

/wiki/spaces/OAUT/pages/1433927681: Azure Active Directory Authentication Libraries allow the integration with Azure AD.

OpenAM login: SSO (Single Sign-On).

LDAP (Lightweight Directory Access Protocol) login: Active directory login.