All Downloads are FREE. Search and download functionalities are using the official Maven repository.

amework.security.auth-gateway.5.0.15.source-code.application.properties Maven / Gradle / Ivy

The newest version!
server.port=9999
audit.client.enabled=false
#Session settings
server.servlet.session.cookie.name=GATEWAYSID
spring.session.store-type=none
#Redis session store settings
spring.redis.database=0
spring.redis.host=localhost
spring.redis.port=6378
spring.redis.password=
spring.redis.timeout=6000
spring.main.allow-bean-definition-overriding=true
#DB
spring.jpa.database-platform=org.hibernate.dialect.PostgreSQL9Dialect
spring.jpa.properties.hibernate.temp.use_jdbc_metadata_defaults=false
spring.jpa.open-in-view=false
spring.liquibase.change-log=classpath:/db/changelog-master.xml
spring.datasource.url=jdbc:postgresql://localhost:5432/security
spring.datasource.username=postgres
spring.datasource.password=postgres
spring.datasource.driver-class-name=org.postgresql.Driver

# INTERNATIONALIZATION
spring.messages.basename=messages
spring.mvc.locale=en
#LOGGING
logging.level.root=INFO

spring.quartz.properties.org.quartz.jobStore.isClustered=false

spring.activemq.broker-url=tcp://localhost:61616
spring.activemq.packages.trusted=net.n2oapp.security.admin.api.model,ru.inovus.ms.rdm.api.model.refdata,java.util

# JAXRS
cxf.path=/api
cxf.jaxrs.component-scan=true
cxf.servlet.init.service-list-path=/info
jaxrs.swagger.enabled=true
jaxrs.swagger.title=Security Admin REST Services
jaxrs.swagger.version=1.0
jaxrs.swagger.resource-package=net.n2oapp.security.admin.rest
jaxrs.swagger.auth.name=oauth2
jaxrs.swagger.auth.token-uri=http://localhost:${server.port}/oauth/token

# ENDPOINTS
spring.jmx.enabled=false
endpoints.enabled=false
endpoints.jmx.enabled=false
endpoints.jmx.unique-names=true

#url аудит-сервиса
audit.service.url=http://yandex.develop:8902/audit/service/api
audit.client.sourceApplication=access
rdm.sync.enabled=false

#Импорт из НСИ
rdm.client.sync.url=http://localhost:8081/rdm/api
#Экспорт в НСИ
rdm.client.export.url=http://localhost:8081/rdm/api
rdm.cron.export=0 * * ? * *
rdm.cron.import.region=0 */15 * ? * *
rdm.cron.import.organization=0 */15 * ? * *
rdm.cron.import.department=0 */15 * ? * *
rdm_sync.change_data_mode=async

#Настройки кодов справочников для синхронизации
rdm.sync.ref-book-code.department=S001
rdm.sync.ref-book-code.region=S002
rdm.sync.ref-book-code.organization=S003
rdm.sync.ref-book-code.system=SYS001
rdm.sync.ref-book-code.application=APP001

#режим работы с организациями
access.organization-persist-mode=sync

#url точки авторизации
access.auth.login-entry-point=/login/keycloak
#Переадресация авторизованного пользователя на указанный путь, вместо index.html
access.auth.authenticated-user-redirect-url=/

access.keycloak.server-url=https://keycloak8.i-novus.ru/auth
access.keycloak.realm=security-admin
access.keycloak.auth-server-uri=${access.keycloak.server-url}/realms/${access.keycloak.realm}/protocol/openid-connect
access.keycloak.client.client-id=auth-gateway
access.keycloak.client.client-secret=0a889967-3fa4-4dd7-898c-7625e99bd793
access.keycloak.client.access-token-uri=${access.keycloak.auth-server-uri}/token
access.keycloak.client.user-authorization-uri=${access.keycloak.auth-server-uri}/auth
access.keycloak.client.client-authentication-scheme=form
access.keycloak.resource.user-info-uri=${access.keycloak.auth-server-uri}/userinfo
access.keycloak.logout-uri=${access.keycloak.auth-server-uri}/logout
access.keycloak.admin-client-id=${access.keycloak.client.client-id}
access.keycloak.admin-client-secret=${access.keycloak.client.client-secret}

access.auth.keystore.key-id=hYyfxVDkchN9wXuLLjSLe5kQ2EUrW4Mr

#Открывает доступ к эндпоинту, отдающему публичный ключ
security.oauth2.authorization.token-key-access=permitAll()

access.esia.auth-server-uri=https://esia-portal1.test.gosuslugi.ru
access.esia.client.client-id=EPMPS_EPBA
access.esia.client.access-token-uri=${access.esia.auth-server-uri}/aas/oauth2/te
access.esia.client.user-authorization-uri=${access.esia.auth-server-uri}/aas/oauth2/ac
access.esia.client.client-authentication-scheme=form
access.esia.client.scope=openid,snils,fullname,usr_org
access.esia.resource.user-info-uri=${access.esia.auth-server-uri}/rs/prns
access.esia.logout-uri=${access.esia.auth-server-uri}/idp/ext/Logout?client_id=${access.esia.client.client-id}

access.token.include-claims=roles,systems
access.userinfo.include-claims=simple,organization,department,region,roles,systems,permissions
access.permission.enabled=true
access.email-as-username=false
access.keycloak.synchronize-enabled=false
access.keycloak.sync-persistence-enabled=true




© 2015 - 2024 Weber Informatics LLC | Privacy Policy