Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Code Block
languageyaml
oauth2:
  feign:
    client-id: ${modelop.mm.client-id}
    client-secret: ${modelop.mm.client-secret}
    access-token-uri: ${modelop.provider.token-uri}
    scopes: ${modelop.mm.scope}
  group-base-access:
    oauth2-group-claim-name: memberOf
    admin-default-access-group: admin
    default-access-groups: ${oauth2.group-base-access.default-access-group}modelop

...

JWT RS configurations

JWT RS is straight forward, only jwt profile is required.

...

Code Block
languageyaml
oauth2:
  # Values for Resource Servers.
  resource-server:
  
    # Specifically opaque-queryparam is for a specific client needs that supports 2 OAuth2 providers at the same time...
    opaque-queryparam:
      queryparam: otoken
      introspection-uri: https://authorization.server/rs/validate/AppIdClaim
      client-registration-id: feign
      introspection-method: POST

...

Token Claims to User Attributes Mapping

...

Please note that the configuration above is overriding one claim name only, but multiple or all claim names can be overridden, if necessary.

User Groups

ModelOp Center has the capability to filter user groups arriving as part of the token. When enabled, user groups that do not match the specified regex filter will not be displayed in ModelOp Center. To enable such group filtering, please add the following configuration properties:

Code Block
languageyaml
oauth2:
  group-base-access:
    group-authorities-regex-filter: "Your group filter here"

If users without any group(s) should be allowed access to ModelOp Center, please set the following configuration property:

Code Block
languageyaml
oauth2:
  group-base-access:
    block-user-access-without-groups: false

Please note users without any group(s) will not be allowed access to ModelOp Center by default.