Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 37 Next »

Introduction

URAC micro-service V3 configuration variables that are needed and can be customized 

1. Password generation configuration

Location

In custom registry - urac

You can change the values of the below variables to customize iterations, seeding, and the algorithm used to hash passwords.

NameTypeDescription

Example

hashIterationsintegerHashing iteration value used by SOAJS hasher to encrypt/compare passwords12

optionalAlgorithm

string

Password Hashing algorithm name. "aes256" or "des".

You can go to List of Crypto Algorithms to find the name of the algorithm that you can use.

You do not need to set this configuration if you do not want to specify an algorithm

 aes256

dbCodesObjectTo consolidate the main tenant users and create roaming capabilities among them by invitation only

{

"TTTT": ["tCODE1", "tCODE2"]

"XXXX": ["tCODE4", "tCODE5"]

}





More information can be found in the Complete Example

2. Join & Membership

Location

In provision - key configuration

In custom registry - urac

You can change the values of the below variables to customize if you want the user to validate their email once they join or not.

NameTypeDescriptionExample
validateJoinBooleanThis configuration controllers the status of a user after joining. aka ('pendingJoin' : 'active')
 
true
membershipObjectThis configuration allows you to configure different type of membership that can be set while joining to drive different user configuration like group (make sure the group is available) we only support an array of 1 group for now.
{
	"basic":{
		"groups": ["starter"]
	}
}

3. Mail Configuration

Location

In provision - key configuration

In custom registry  - mail & urac

Mail configuration can be found under two configuration objects:

  1. SMTP Configuration: Under common fields in order to be used in other microservices not only in URAC. This includes the transport configuration for the mail provider.
  2. Email Content Configuration: Under URAC configuration in order to customize mail options to handle URAC requirements. This includes links and content of emails sent in each stage.

More information about Variables used, custom data fields used in "content", and examples of the configuration can be found under Mail Configuration

Examples: In provision

In provision
"commonFields" : {
  "mail": { // to control the smtp configuration
      "from": 'me@localhost.com',
      "transport": {...}
  }
},
"urac" : {
  "links": {...}, // this object to control the links in the emails
  "mail": { // this object to control the content of the emails
    "join": {...}, // Join - mail content configuration
    "forgotPassword": {...}, // Forgot password mail - content configuration
    "addUser": {...}, // Add User - mail content configuration
    "changeUserStatus": {...}, // Change User Status - mail content configuration
    "changeEmail": {...} // Change Email - mail content configuration
  }	
}

Examples: In custom registry

You should create to entries under custom registry (one for mail and one for urac) as follow:

with the following configuration content:

mail
{ // to control the smtp configuration
      "from": 'me@localhost.com',
      "transport": {...}
}
URAC
{
  "links": {...}, // this object to control the links in the emails
  "mail": { // this object to control the content of the emails
    "addUser": {...}, 
    "changeEmail": {...}, 
    "changePin": {...}, 
    "changeUserStatus": {...}, 
    "forgotPassword": {...}, 
    "invitePin": {...}, 
    "join": {...},
    "resetPin": {...}
  }	
}

4. Mail token configuration

Location

In provision - key configuration

In custom registry - urac

The URAC sends verification mail with links containing token with expiration date.

NameTypeDescriptionExample

tokenExpiryTTL

millisecondsThis configuration controllers the expiration period for the email links token.
 

172800000

5. Pin login configuration

Location

In provision - key configuration

In custom registry 

Pin code adds a second layer of authentication to URAC. For example, in the hospitality business you want the manager to login and turn on pin login. This way a user can key in a ping and get access. For more information go to Pin login Configuration.

6. Data configuration

You should add a database configuration to the environment where you deployed URAC. for more information go to Data Configuration.

  • No labels

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.