Found 242 results for "appserver authentication providers keycloak"

The search executed in 0.002133832 seconds. That's fast.

Gitana / 4.0 / Data Engine / Services / Text Analysis / Text Analysis Providers

Text Analysis Providers AWS Comprehend

Score: 5.706677

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / Custom

Custom This page provides some guidance on how to define your own custom Authentication Provider class for use within the Application Server. Note: If you're looking information on how to easily integrate a third-party Authentication Provider into the Application Server, we recommend first taking a look at the Local Provider as it can be configured to work with third-party endpoints pretty easily. Implementation Class We recommend extending the AbstractProvider class. The basic skeleton of the c

Score: 5.453272

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / Custom

Custom This page provides some guidance on how to define your own custom Authentication Provider class for use within the Application Server. Note: If you're looking information on how to easily integrate a third-party Authentication Provider into the Application Server, we recommend first taking a look at the Local Provider as it can be configured to work with third-party endpoints pretty easily. Implementation Class We recommend extending the AbstractProvider class. The basic skeleton of the c

Score: 5.453272

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Providers / Local

Local The Local Authentication Provider enables the Cloud CMS Application Server to connect to a locally implemented identity provider. The identity provider can be implemented within your own Node.js application or as part of a separate application using a completely different technology. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured (default values are shown): "auth": {

Score: 5.3455234

Gitana / 4.0 / Developers / Application Server / Authentication / Providers / Local

Local The Local Authentication Provider enables the Cloud CMS Application Server to connect to a locally implemented identity provider. The identity provider can be implemented within your own Node.js application or as part of a separate application using a completely different technology. For more information on Authentication within the App Server, see App Server Authentication / SSO. Configuration Here are all of the properties that may be configured (default values are shown): "auth": {

Score: 5.3455234

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Adapters / Custom

Custom This page provides some guidance on how to define your own custom Authentication Adapter class for use within the Application Server. Note: If you're looking information on how to easily integrate a third-party Authentication Provider into the Application Server, we recommend first taking a look at the Default Adapter as it can be configured to work with many third-party SSO solutions pretty easily. Implementation Class We recommend extending the AbstractAdapter class. The basic skeleton

Score: 4.720145

Gitana / 4.0 / Developers / Application Server / Authentication / Adapters / Custom

Custom This page provides some guidance on how to define your own custom Authentication Adapter class for use within the Application Server. Note: If you're looking information on how to easily integrate a third-party Authentication Provider into the Application Server, we recommend first taking a look at the Default Adapter as it can be configured to work with many third-party SSO solutions pretty easily. Implementation Class We recommend extending the AbstractAdapter class. The basic skeleton

Score: 4.720145

Definitions for Date format

Our definitions are based on JSON schema and, as such, the default is to use strings for dates. The date controls in our forms engine let you customize the format string so that you can store ISO 8601 or other formats (perhaps simplified formats) as per your preference. The advantage here is simplicity with these controls and compatibility with JSON schema. The disadvantage is that MongoDB provides a lot of very powerful capabilities for range query and sorting that do not play as nicely with th

Score: 4.370619

Gitana / 3.2 / Guide / Guide / Application Server / Authentication / Adapters / Default

Default The default request adapter parses simple header and cookie information. It is generic adapter that can be used to interrogate the most common elements in an HTTP request. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "default", "config": { "header": "{headerName}", "cookie": "{cookieName}", "trusted": false } } } } T

Score: 4.126851

Gitana / 4.0 / Developers / Application Server / Authentication / Adapters / Default

Default The default request adapter parses simple header and cookie information. It is generic adapter that can be used to interrogate the most common elements in an HTTP request. Configuration Here are all of the properties that may be configured: { "adapters": { "{adapterId}": { "type": "default", "config": { "header": "{headerName}", "cookie": "{cookieName}", "trusted": false } } } } T

Score: 4.126851

Gitana / 3.2 / Guide / Guide / Integrations / DUO

DUO Cloud CMS provides out-of-the-box integration with Duo Security. Duo Security connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Duo Security, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Duo mobile application. This provides an additional security check in addition to the user's password. Duo Security and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure.

Score: 3.89945

Gitana / 3.2 / Guide / Guide / Integrations / Authy

Authy Cloud CMS provides out-of-the-box integration with Authy. Authy connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Authy, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Authy mobile application. This provides an additional security check in addition to the user's password. Authy and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure. For more information, s

Score: 3.828469

Gitana / 3.2 / Guide / Guide / API / Data Types / Email Provider

Email Provider Type {{#dataTypeArticle objectTypeId}}{{objectTypeId}}{{/dataTypeArticle}} Datastore Type {{#dataTypeArticle datastoreTypeId}}{{datastoreTypeId}}{{/dataTypeArticle}} Supports {{#article "security/authorities"}}authorities{{/article}}, {{#article "security/permissions"}}permissions{{/article}}, {{#article "transfer"}}transfer{{/article}} Configuration The following table presents you the configuration properties. Property Type Default Read-Only Description host text The host addres

Score: 3.7556028

Gitana / 4.0 / Data Engine / API / Data Types / Email Provider

Email Provider Type {{#dataTypeArticle objectTypeId}}{{objectTypeId}}{{/dataTypeArticle}} Datastore Type {{#dataTypeArticle datastoreTypeId}}{{datastoreTypeId}}{{/dataTypeArticle}} Supports {{#article "security/authorities"}}authorities{{/article}}, {{#article "security/permissions"}}permissions{{/article}}, {{#article "transfer"}}transfer{{/article}} Configuration The following table presents you the configuration properties. Property Type Default Read-Only Description host text The host addres

Score: 3.7556028

Gitana / 3.2 / Guide / Guide / Integrations / Okta

Okta Okta provides cloud software that helps companies manage and secure user authentication into modern applications, and for developers to build identity controls into applications, website web services and into devices. Okta plays the role of an Identity Provider that speaks SAML 2.0 and/or JWT. Cloud CMS integrates via either of these mechanism and can therefore integrate to Okta straight away as an identity provider. Cloud CMS provides Single Sign On (SSO) Enterprise support for a variety o

Score: 3.359262

Gitana / 4.0 / Data Engine / Integrations / Okta

Okta Okta provides cloud software that helps companies manage and secure user authentication into modern applications, and for developers to build identity controls into applications, website web services and into devices. Okta plays the role of an Identity Provider that speaks SAML 2.0 and/or JWT. Cloud CMS integrates via either of these mechanism and can therefore integrate to Okta straight away as an identity provider. Cloud CMS provides Single Sign On (SSO) Enterprise support for a variety o

Score: 3.359262

Gitana / 3.2 / Guide / Guide / Single Sign On (SSO) / Azure Active Directory

Azure Active Directory Azure Active Directory is a Microsoft Azure service which provides identity and access management. Cloud CMS supports single sign on with Azure AD using SAML 2.0. Set up Azure Before configuring the Cloud CMS Single Sign-On, you’ll need to set up a few things on Microsoft Azure Active Directory: Create an Azure Account If not already present, create an Azure Account using the Azure portal. Log into the portal and go to Azure Active Directory. Register your App Click New Re

Score: 3.2987127

Gitana / 4.0 / Data Engine / Authentication / Single Sign On (SSO) / Azure Active Directory

Azure Active Directory Azure Active Directory is a Microsoft Azure service which provides identity and access management. Cloud CMS supports single sign on with Azure AD using SAML 2.0. Set up Azure Before configuring the Cloud CMS Single Sign-On, you’ll need to set up a few things on Microsoft Azure Active Directory: Create an Azure Account If not already present, create an Azure Account using the Azure portal. Log into the portal and go to Azure Active Directory. Register your App Click New Re

Score: 3.2987127

Single Sign On (SSO)

Cloud CMS introduces a Single Sign-On service that will make it easy for the users to connect using their already existing business accounts. Cloud CMS supports two Enterprise SSO features – SAML 2.0 and JWT. These are two popular SSO mechanisms that work with many commercial and open-source identity providers including Microsoft Active Directory Federation Services (ADFS), JBoss Keycloak etc. Using SAML 2.0 and JWT, Cloud CMS can be easily integrated with your corporate security infrastructure.

Score: 3.2792938

Gitana / 3.2 / Guide / Guide / Narration / Narration Providers / AWS Polly

AWS Polly Handles the generation of a Narration audio file for textual content using the AWS Polly Narration Service. The AWS Polly Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Polly within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketName) within

Score: 3.2096577

Gitana / 3.2 / Guide / Guide / Transcription / Transcription Providers / AWS Transcribe

AWS Transcribe Handles the generation of a Transcription text file for audio content using the AWS Transcribe Service. The AWS Transcribe Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Transcribe within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketNa

Score: 3.2096577

Gitana / 4.0 / Data Engine / Services / Narration / Narration Providers / AWS Polly

AWS Polly Handles the generation of a Narration audio file for textual content using the AWS Polly Narration Service. The AWS Polly Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Polly within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketName) within

Score: 3.2096577

Gitana / 4.0 / Data Engine / Services / Transcription / Transcription Providers / AWS Transcribe

AWS Transcribe Handles the generation of a Transcription text file for audio content using the AWS Transcribe Service. The AWS Transcribe Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Transcribe within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketNa

Score: 3.2096577

Gitana / 3.2 / Guide / Guide / Application Server / Tags / @form

@form A form can be rendered from Cloud CMS by identifying the definition and form key. Forms are rendered on the client-side using Alpaca Forms. For a working example, see: https://github.com/gitana/sdk/tree/master/app-server/appserver-form-sample Parameters parameter required description definition yes the type definition QName form yes the form key list no the data list to populate successUrl no the URL to redirect to upon success failureUrl no the URL to redirect to upon failure formId no ov

Score: 2.9184473

Gitana / 4.0 / Developers / Application Server / Tags / @form

@form A form can be rendered from Cloud CMS by identifying the definition and form key. Forms are rendered on the client-side using Alpaca Forms. For a working example, see: https://github.com/gitana/sdk/tree/master/app-server/appserver-form-sample Parameters parameter required description definition yes the type definition QName form yes the form key list no the data list to populate successUrl no the URL to redirect to upon success failureUrl no the URL to redirect to upon failure formId no ov

Score: 2.9184473