![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |
1.
2. Type asg-configui command to start the Config UI.
5. On the Home page on the Config UI, select the Gateway Engine Properties from the drop-down list.
6. Expand the Gateway Engine Properties node.
7. Click the SECURITY > Security tab.
8. Expand the OAuth node to see the OAuth server properties.
9.
• The OAuth server properties described in the Security Properties can be set in the ASG_CONFIG_HOME/asg.properties file. See Runtime Properties of Core Engine for OAuth server properties names and description.
• Refer to the ASG_CONFIG_HOME/asg.properties file for the example values of OAuth server related properties.
•
•
2. On the home page on the Config UI, select the Gateway Engine Properties from the drop-down list.
3. Expand the Gateway Engine Properties node.
4. Click the SECURITY > Security tab.
5. Expand the OAuth node.
Table 114 Owner Adapter Properties for File
7. Click the Save button to save changes.
8.
1.
2. Edit the asg.properties file in a text editor.
4. Save changes to the asg.properties file.
1.
2. Edit the asg.properties file in a text editor.
Table 115 LDAP Server Connection Parameters For example, ldapserver.api.tibco.com For example, 10389 For example, uid=admin,ou=system For example, root@123 For example, search filter is specified as: Objectclass=* For example, ou=people,ou=na,dc=example,dc=org For example, uid={0},ou=employee,ou=tsi,o=tibcoIn this string, the variable {0} represents the name of the user. The code substitutes the user name for this variable, and passes the resulting boolean expression to the LDAP server. The LDAP server matches that search expression against user objects to find a match. The search result must contain exactly one match. This is required for bind mode (not in admin (search) mode).
5. Save changes to the asg.properties file.
2. On the home page on the Config UI, select the Gateway Engine Properties from the drop-down list.
3. Expand the Gateway Engine Properties node.
4. Click the SECURITY > Security tab.
5. Expand the OAuth node.
Table 116 Client Adapter Properties for File
7. Click the Save button to save changes.
8. Set the properties for the client adapter in the ASG_HOME\examples\OAuth\resources\client.properties file.
The client adapter properties can also be set in the ASG_CONFIG_HOME/asg.properties file, as follows:
1.
2. Edit the asg.properties file in a text editor.
4. Save changes to the asg.properties file.
2. On the home page on the Config UI, select the Gateway Engine Properties from the drop-down list.
3. Expand the Gateway Engine Properties node.
4. Click the SECURITY > Security tab.
5. Expand the OAuth node.
where, portal_host_name is the name of machine running the portal engine of TIBCO API Exchange Manager
−
2. On the home page on the Config UI, select the Gateway Engine Properties from the drop-down list.
3. Expand the Gateway Engine Properties node.
4. Click the SECURITY > Security tab.
5. Expand the OAuth node.
Table 118 Scope Adapter Properties for File
7. Click the Save button to save changes.
8. Set the properties for the scope adapter in the ASG_HOME\examples\OAuth\resources\scope.properties file.
The scope adapter properties can also be set in the ASG_CONFIG_HOME/asg.properties file, as follows:
1.
2. Edit the asg.properties file in a text editor.
4. Save changes to the asg.properties file.
1.
2. Edit the asg.properties file in a text editor.See OAuth Service Provider Interface chapter for details.
2. asg-engine -u asg-caching-core -a ASG_Configuration./asg-engine -u asg-caching-core -a ASG_Configuration
![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |