Found 175 results for "appserver authentication"

The search executed in 0.001568707 seconds. That's fast.

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / LinkedIn

LinkedIn Cloud CMS provides integrated authentication and single-sign-on (SSO) with LinkedIn. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against LinkedIn. For more information on Authentication within the App Server, see App Server Authentication / SSO. LinkedIn API Keys You will need to configure a LinkedIn application and have the follo

Score: 4.509239

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / Twitter

Twitter Cloud CMS provides integrated authentication and single-sign-on (SSO) with Twitter. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against Twitter. For more information on Authentication within the App Server, see App Server Authentication / SSO. Twitter API Keys You will need to configure a Twitter application and have the following

Score: 4.509239

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / GitHub

GitHub Cloud CMS provides integrated authentication and single-sign-on (SSO) with GitHub. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against GitHub. For more information on Authentication within the App Server, see App Server Authentication / SSO. GitHub API Keys You will need to configure a GitHub application and have the following infor

Score: 4.509239

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / Google

Google Cloud CMS provides integrated authentication and single-sign-on (SSO) with Google. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against Google. For more information on Authentication within the App Server, see App Server Authentication / SSO. Google API Keys You will need to configure a Google application and have the following infor

Score: 4.509239

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / LinkedIn

LinkedIn Cloud CMS provides integrated authentication and single-sign-on (SSO) with LinkedIn. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against LinkedIn. For more information on Authentication within the App Server, see App Server Authentication / SSO. LinkedIn API Keys You will need to configure a LinkedIn application and have the follo

Score: 4.509239

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / Twitter

Twitter Cloud CMS provides integrated authentication and single-sign-on (SSO) with Twitter. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against Twitter. For more information on Authentication within the App Server, see App Server Authentication / SSO. Twitter API Keys You will need to configure a Twitter application and have the following

Score: 4.509239

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / Facebook

Facebook The Facebook Authentication Provider enables the Cloud CMS Application Server to authenticate, validate tokens and load user profile information against Facebook. For more information on Authentication within the App Server, see App Server Authentication / SSO. Facebook API Keys To use this provider, you will first need to set up a Developers Account within Facebook and create an application therein. Doing so will give you a set of API tokens: appId - the Facebook application ID token a

Score: 4.427306

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / Facebook

Facebook The Facebook Authentication Provider enables the Cloud CMS Application Server to authenticate, validate tokens and load user profile information against Facebook. For more information on Authentication within the App Server, see App Server Authentication / SSO. Facebook API Keys To use this provider, you will first need to set up a Developers Account within Facebook and create an application therein. Doing so will give you a set of API tokens: appId - the Facebook application ID token a

Score: 4.427306

Definitions for Date format

Our definitions are based on JSON schema and, as such, the default is to use strings for dates. The date controls in our forms engine let you customize the format string so that you can store ISO 8601 or other formats (perhaps simplified formats) as per your preference. The advantage here is simplicity with these controls and compatibility with JSON schema. The disadvantage is that MongoDB provides a lot of very powerful capabilities for range query and sorting that do not play as nicely with th

Score: 4.3710923

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / SAML 2.0

SAML 2.0 The SAML Authentication Provider enables the Cloud CMS Application Server to authenticate, validate tokens and load user profile information against servers that are SAML 2.0 compatible. SAML stands for Security Assertion Markup Language. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured: "auth": { "providers": { "myProvider": { "type": "saml",

Score: 4.1589913

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / SAML 2.0

SAML 2.0 The SAM Authentication Provider enables the Cloud CMS Application Server to authenticate, validate tokens and load user profile information against servers that are SAML 2.0 compatible. SAML stands for Security Assertion Markup Language. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured: "auth": { "providers": { "myProvider": { "type": "saml",

Score: 4.1589913

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / Custom

Custom This page provides some guidance on how to define your own custom Authentication Provider class for use within the Application Server. Note: If you're looking information on how to easily integrate a third-party Authentication Provider into the Application Server, we recommend first taking a look at the Local Provider as it can be configured to work with third-party endpoints pretty easily. Implementation Class We recommend extending the AbstractProvider class. The basic skeleton of the c

Score: 4.135907

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / Custom

Custom This page provides some guidance on how to define your own custom Authentication Provider class for use within the Application Server. Note: If you're looking information on how to easily integrate a third-party Authentication Provider into the Application Server, we recommend first taking a look at the Local Provider as it can be configured to work with third-party endpoints pretty easily. Implementation Class We recommend extending the AbstractProvider class. The basic skeleton of the c

Score: 4.135907

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Adapters / Default

Default The default request adapter parses simple header and cookie information. It is generic adapter that can be used to interrogate the most common elements in an HTTP request. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "default", "config": { "header": "{headerName}", "cookie": "{cookieName}", "trusted": false } } } } T

Score: 4.11989

Gitana / 4.0 / Developers / Application Server / Authentication / Adapters / Default

Default The default request adapter parses simple header and cookie information. It is generic adapter that can be used to interrogate the most common elements in an HTTP request. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "default", "config": { "header": "{headerName}", "cookie": "{cookieName}", "trusted": false } } } } T

Score: 4.11989

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / Local

Local The Local Authentication Provider enables the Cloud CMS Application Server to connect to a locally implemented identity provider. The identity provider can be implemented within your own Node.js application or as part of a separate application using a completely different technology. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured (default values are shown): "auth": {

Score: 4.095026

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / Local

Local The Local Authentication Provider enables the Cloud CMS Application Server to connect to a locally implemented identity provider. The identity provider can be implemented within your own Node.js application or as part of a separate application using a completely different technology. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured (default values are shown): "auth": {

Score: 4.095026

Gitana / 3.2 / Guide / Guide / Integrations / DUO

DUO Cloud CMS provides out-of-the-box integration with Duo Security. Duo Security connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Duo Security, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Duo mobile application. This provides an additional security check in addition to the user's password. Duo Security and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure.

Score: 3.8888278

Gitana / 3.2 / Guide / Guide / Integrations / Authy

Authy Cloud CMS provides out-of-the-box integration with Authy. Authy connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Authy, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Authy mobile application. This provides an additional security check in addition to the user's password. Authy and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure. For more information, s

Score: 3.8178046

Gitana / 3.2 / Guide / Guide / Application Server / Tags / @form

@form A form can be rendered from Cloud CMS by identifying the definition and form key. Forms are rendered on the client-side using Alpaca Forms. For a working example, see: https://github.com/gitana/sdk/tree/master/app-server/appserver-form-sample Parameters parameter required description definition yes the type definition QName form yes the form key list no the data list to populate successUrl no the URL to redirect to upon success failureUrl no the URL to redirect to upon failure formId no ov

Score: 2.9193544

Gitana / 4.0 / Developers / Application Server / Tags / @form

@form A form can be rendered from Cloud CMS by identifying the definition and form key. Forms are rendered on the client-side using Alpaca Forms. For a working example, see: https://github.com/gitana/sdk/tree/master/app-server/appserver-form-sample Parameters parameter required description definition yes the type definition QName form yes the form key list no the data list to populate successUrl no the URL to redirect to upon success failureUrl no the URL to redirect to upon failure formId no ov

Score: 2.9193544

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Adapters / JWT

JWT The JWT request adapter is similar to the default adapter in that it lets you pull a JWT token from either a named header or a cookie. JWT stands for JSON Web Token. JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties. You can read more about them at the official JWT web site. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "jwt", "

Score: 2.7815213

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Adapters / Session

Session The session adapter checks the session to find user profile information. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "session" } } } The value {adapterId} can be any unique ID across the adapters. This is the ID that you reference from within your strategy configuration. Usage To grab authenticated user profile from the session, you might do: { "adapters": { "{adapterId}": {

Score: 2.7815213

Gitana / 4.0 / Developers / Application Server / Authentication / Adapters / JWT

JWT The JWT request adapter is similar to the default adapter in that it lets you pull a JWT token from either a named header or a cookie. JWT stands for JSON Web Token. JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties. You can read more about them at [jwt.io](the official JWT web site). Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "jwt",

Score: 2.7815213

Gitana / 4.0 / Developers / Application Server / Authentication / Adapters / Session

Session The session adapter checks the session to find user profile information. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "session" } } } The value {adapterId} can be any unique ID across the adapters. This is the ID that you reference from within your strategy configuration. Usage To grab authenticated user profile from the session, you might do: { "adapters": { "{adapterId}": {

Score: 2.7815213