Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 18 Next »

Introduction

URAC micro-service V3 configuration variables that are needed and can be customized 

1. Password generation configuration

You can change the values of the below variables to customize iterations, seeding, and the algorithm used to hash passwords.


NameTypeDescription

Example

hashIterationsintegerHashing iteration value used by SOAJS hasher to encrypt/compare passwords16
seedLengthintegerSeed length value used by SOAJS hasher to encrypt/compare passwords32

optionalAlgorithm

string

Password Hashing algorithm name

"aes-128-cbc-hmac-sha256" or "des". You can go to List of Crypto Algorithms to find the name of the algorithm that you can use.

2. 3rd party login configuration

URAC allows third party login via one of the below methods:

  1. Passport Login: Define application keys for passport integration. Currently supporting Azure, Github, Twitter, Facebook, and Google. Got to the link for more information and an example of the configuration.
  2. OpenAM login: SSO (Single Sign-On).
  3. LDAP (Lightweight Directory Access Protocol) login: Active directory login.

3. Mail Configuration

Mail configuration can be found under two configuration objects:

  1. Under common fields in order to be used in other microservices not only in URAC. This includes the transport configuration for the mail provider.
  2. Under URAC configuration in order to customize mail options to handle URAC requirements. This includes links and content of emails sent in each stage.


More information about Variables used, custom data fields used in "content", and examples of the configuration can be found under Mail Notification Configuration

Examples: 

Mail Configuration in Common Fields
"commonFields" : {
  "mail": { // to control the smtp configuration
      "from": 'me@localhost.com',
      "transport": {...}
  }
}
Mail Configuration in URAC Config
"urac" : {
  "links": {...}, // this object to control the links in the emails
  "mail": { // this object to control the content of the emails
    "join": {...}, // Join - mail content configuration
    "forgotPassword": {...}, // Forgot password mail - content configuration
    "addUser": {...}, // Add User - mail content configuration
    "changeUserStatus": {...}, // Change User Status - mail content configuration
    "changeEmail": {...} // Change Email - mail content configuration
  }	
}

4. Pin login configuration

Pin code adds a second layer of authentication to URAC. For example, having restaurants with multiple branches and multiple positions. User should put a password and should use a pin code to gain access. For full information go to Pin Configuration.

5. Data configuration

Resources and database creation steps can be found under Database needed by URAC. More information can be found under the registry configuration layer below.


Configuration priority and the default values

This table illustrates the configuration that can be overridden at a different layer of configuration 

Priority

Local → Registry → Tenant 

  1. Local Configuration
  2. Custom Registry
  3. Service Configuration (Tenant)



Name


Local Configuration (Default)

config.js

Registry Configuration (Per Environment)

req.soajs.registry


Tenant Configuration (Per Tenant Per Environment)

SettingsCustom
pinConfiguration
model¹"mongo"

hashIterations

24

seedLength12

model¹: We currently only support mongo models.

  • No labels