Found 175 results for "appserver authentication"
The search executed in 0.001568707 seconds. That's fast.
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / LinkedInLinkedIn Cloud CMS provides integrated authentication and single-sign-on (SSO) with LinkedIn. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against LinkedIn. For more information on Authentication within the App Server, see App Server Authentication / SSO. LinkedIn API Keys You will need to configure a LinkedIn application and have the follo
Score: 4.509239
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / TwitterTwitter Cloud CMS provides integrated authentication and single-sign-on (SSO) with Twitter. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against Twitter. For more information on Authentication within the App Server, see App Server Authentication / SSO. Twitter API Keys You will need to configure a Twitter application and have the following
Score: 4.509239
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Providers / GitHubGitHub Cloud CMS provides integrated authentication and single-sign-on (SSO) with GitHub. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against GitHub. For more information on Authentication within the App Server, see App Server Authentication / SSO. GitHub API Keys You will need to configure a GitHub application and have the following infor
Score: 4.509239
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Providers / GoogleGoogle Cloud CMS provides integrated authentication and single-sign-on (SSO) with Google. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against Google. For more information on Authentication within the App Server, see App Server Authentication / SSO. Google API Keys You will need to configure a Google application and have the following infor
Score: 4.509239
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Providers / LinkedInLinkedIn Cloud CMS provides integrated authentication and single-sign-on (SSO) with LinkedIn. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against LinkedIn. For more information on Authentication within the App Server, see App Server Authentication / SSO. LinkedIn API Keys You will need to configure a LinkedIn application and have the follo
Score: 4.509239
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Providers / TwitterTwitter Cloud CMS provides integrated authentication and single-sign-on (SSO) with Twitter. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against Twitter. For more information on Authentication within the App Server, see App Server Authentication / SSO. Twitter API Keys You will need to configure a Twitter application and have the following
Score: 4.509239
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / FacebookFacebook The Facebook Authentication Provider enables the Cloud CMS Application Server to authenticate, validate tokens and load user profile information against Facebook. For more information on Authentication within the App Server, see App Server Authentication / SSO. Facebook API Keys To use this provider, you will first need to set up a Developers Account within Facebook and create an application therein. Doing so will give you a set of API tokens: appId - the Facebook application ID token a
Score: 4.427306
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Providers / FacebookFacebook The Facebook Authentication Provider enables the Cloud CMS Application Server to authenticate, validate tokens and load user profile information against Facebook. For more information on Authentication within the App Server, see App Server Authentication / SSO. Facebook API Keys To use this provider, you will first need to set up a Developers Account within Facebook and create an application therein. Doing so will give you a set of API tokens: appId - the Facebook application ID token a
Score: 4.427306
|
|
Definitions for Date formatOur definitions are based on JSON schema and, as such, the default is to use strings for dates. The date controls in our forms engine let you customize the format string so that you can store ISO 8601 or other formats (perhaps simplified formats) as per your preference. The advantage here is simplicity with these controls and compatibility with JSON schema. The disadvantage is that MongoDB provides a lot of very powerful capabilities for range query and sorting that do not play as nicely with th
Score: 4.3710923
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / SAML 2.0SAML 2.0 The SAML Authentication Provider enables the Cloud CMS Application Server to authenticate, validate tokens and load user profile information against servers that are SAML 2.0 compatible. SAML stands for Security Assertion Markup Language. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured: "auth": { "providers": { "myProvider": { "type": "saml",
Score: 4.1589913
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Providers / SAML 2.0SAML 2.0 The SAM Authentication Provider enables the Cloud CMS Application Server to authenticate, validate tokens and load user profile information against servers that are SAML 2.0 compatible. SAML stands for Security Assertion Markup Language. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured: "auth": { "providers": { "myProvider": { "type": "saml",
Score: 4.1589913
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / CustomCustom This page provides some guidance on how to define your own custom Authentication Provider class for use within the Application Server. Note: If you're looking information on how to easily integrate a third-party Authentication Provider into the Application Server, we recommend first taking a look at the Local Provider as it can be configured to work with third-party endpoints pretty easily. Implementation Class We recommend extending the AbstractProvider class. The basic skeleton of the c
Score: 4.135907
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Providers / CustomCustom This page provides some guidance on how to define your own custom Authentication Provider class for use within the Application Server. Note: If you're looking information on how to easily integrate a third-party Authentication Provider into the Application Server, we recommend first taking a look at the Local Provider as it can be configured to work with third-party endpoints pretty easily. Implementation Class We recommend extending the AbstractProvider class. The basic skeleton of the c
Score: 4.135907
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Adapters / DefaultDefault The default request adapter parses simple header and cookie information. It is generic adapter that can be used to interrogate the most common elements in an HTTP request. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "default", "config": { "header": "{headerName}", "cookie": "{cookieName}", "trusted": false } } } } T
Score: 4.11989
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Adapters / DefaultDefault The default request adapter parses simple header and cookie information. It is generic adapter that can be used to interrogate the most common elements in an HTTP request. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "default", "config": { "header": "{headerName}", "cookie": "{cookieName}", "trusted": false } } } } T
Score: 4.11989
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / LocalLocal The Local Authentication Provider enables the Cloud CMS Application Server to connect to a locally implemented identity provider. The identity provider can be implemented within your own Node.js application or as part of a separate application using a completely different technology. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured (default values are shown): "auth": {
Score: 4.095026
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Providers / LocalLocal The Local Authentication Provider enables the Cloud CMS Application Server to connect to a locally implemented identity provider. The identity provider can be implemented within your own Node.js application or as part of a separate application using a completely different technology. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured (default values are shown): "auth": {
Score: 4.095026
|
|
Gitana / 3.2 / Guide / Guide / Integrations / DUODUO Cloud CMS provides out-of-the-box integration with Duo Security. Duo Security connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Duo Security, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Duo mobile application. This provides an additional security check in addition to the user's password. Duo Security and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure.
Score: 3.8888278
|
|
Gitana / 3.2 / Guide / Guide / Integrations / AuthyAuthy Cloud CMS provides out-of-the-box integration with Authy. Authy connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Authy, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Authy mobile application. This provides an additional security check in addition to the user's password. Authy and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure. For more information, s
Score: 3.8178046
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Tags / @form@form A form can be rendered from Cloud CMS by identifying the definition and form key. Forms are rendered on the client-side using Alpaca Forms. For a working example, see: https://github.com/gitana/sdk/tree/master/app-server/appserver-form-sample Parameters parameter required description definition yes the type definition QName form yes the form key list no the data list to populate successUrl no the URL to redirect to upon success failureUrl no the URL to redirect to upon failure formId no ov
Score: 2.9193544
|
|
Gitana / 4.0 / Developers / Application Server / Tags / @form@form A form can be rendered from Cloud CMS by identifying the definition and form key. Forms are rendered on the client-side using Alpaca Forms. For a working example, see: https://github.com/gitana/sdk/tree/master/app-server/appserver-form-sample Parameters parameter required description definition yes the type definition QName form yes the form key list no the data list to populate successUrl no the URL to redirect to upon success failureUrl no the URL to redirect to upon failure formId no ov
Score: 2.9193544
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Adapters / JWTJWT The JWT request adapter is similar to the default adapter in that it lets you pull a JWT token from either a named header or a cookie. JWT stands for JSON Web Token. JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties. You can read more about them at the official JWT web site. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "jwt", "
Score: 2.7815213
|
|
Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Adapters / SessionSession The session adapter checks the session to find user profile information. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "session" } } } The value {adapterId} can be any unique ID across the adapters. This is the ID that you reference from within your strategy configuration. Usage To grab authenticated user profile from the session, you might do: { "adapters": { "{adapterId}": {
Score: 2.7815213
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Adapters / JWTJWT The JWT request adapter is similar to the default adapter in that it lets you pull a JWT token from either a named header or a cookie. JWT stands for JSON Web Token. JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties. You can read more about them at [jwt.io](the official JWT web site). Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "jwt",
Score: 2.7815213
|
|
Gitana / 4.0 / Developers / Application Server / Authentication / Adapters / SessionSession The session adapter checks the session to find user profile information. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "session" } } } The value {adapterId} can be any unique ID across the adapters. This is the ID that you reference from within your strategy configuration. Usage To grab authenticated user profile from the session, you might do: { "adapters": { "{adapterId}": {
Score: 2.7815213
|