Integrating Red Hat Decision Manager with Red Hat Single Sign-On
Abstract
Preface Copy linkLink copied to clipboard!
As a system administrator, you can integrate Red Hat Single Sign-On with Red Hat Decision Manager to secure your Red Hat Decision Manager browser applications with a single authentication method.
Prerequisites
- Red Hat Decision Manager is installed on Red Hat JBoss EAP 7.2. For information, see Installing and configuring Red Hat Decision Manager on Red Hat JBoss EAP 7.2.
Chapter 1. Integration Options Copy linkLink copied to clipboard!
Red Hat Single Sign-On (RH-SSO) is a single sign-on solution that you can use to secure your browser applications with your REST web services and Git access.
When you integrate Red Hat Decision Manager with RH-SSO, you create an SSO and identity management (IDM) environment for Red Hat Decision Manager. The session management feature of RH-SSO enables you to use a single authentication for different Red Hat Decision Manager environments on the internet.
The following chapters describe how you can integrate RH-SSO with Red Hat Decision Manager:
Chapter 4, Authenticating Business Central through RH-SSO
To authenticate Red Hat Decision Manager through an RH-SSO server, you must secure both the Red Hat Decision Manager web client (Business Central) and remote services through RH-SSO.This integration enables you to connect to Red Hat Decision Manager through RH-SSO using either Business Central or a remote service consumer.
Chapter 5, Authenticating Decision Server through RH-SSO
To authenticate Decision Server through an RH-SSO server, you must secure the remote services provided by Decision Server. Doing this enables any remote Red Hat Decision Manager service consumer (user or a service) to authenticate through RH-SSO. Note that Decision Server does not have a web interface.
Chapter 6, Authenticating third-party clients through RH-SSO
If Business Central or Decision Server are using RH-SSO, third-party clients must authenticate themselves using RH-SSO. After authentication, they can consume the remote service endpoints provided by Business Central and Decision Server, such as the REST API or remote file system services.
To facilitate LDAP integration with Red Hat Decision Manager, consider using RH-SSO with LDAP. For information, see the Red Hat Single Sign-On Getting Started Guide.
Chapter 2. Installing and configuring RH-SSO Copy linkLink copied to clipboard!
A realm is a security policy domain defined for a web or application server. Security realms are used to restrict access for different application resources. You should create a new realm whether your RH-SSO instance is private or shared with other products. You can keep the master realm as a place for super administrators to create and manage the realms in your system. If you are integrating with an RH-SSO instance that is shared with other product installations to achieve single sign-on with those applications, all of those applications must use the same realm. To create an RH-SSO realm, download, install, and configure RH-SSO 7.2.
If Business Central and Decision Server are installed on different servers, complete this procedure on both servers.
Procedure
Navigate to the Software Downloads page in the Red Hat Customer Portal (login required), and select the product and version from the drop-down options:
- Product: Red Hat Single Sign-On
- Version: 7.2
-
Download Red Hat Single Sign-on 7.2.0 Server (
rh-sso-7.2.0.zip). To install and configure a basic RH-SSO standalone server, follow the instructions in the "Installing and Booting" chapter of the Red Hat Single Sign On Getting Started Guide. For advanced settings for production environments, see the Red Hat Single Sign On Server Administration Guide.
NoteIf you want to run both RH-SSO and Red Hat Decision Manager servers on the same system, ensure that you avoid port conflicts. by doing one of the following:
Update the
RHSSO_HOME/standalone/configuration/standalone.xmlfile and set a port offset to 100. For example:<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:100}"><socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:100}">Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use an environment variable to run the server:
bin/standalone.sh -Djboss.socket.binding.port-offset=100
bin/standalone.sh -Djboss.socket.binding.port-offset=100Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 3. Adding Red Hat Decision Manager users Copy linkLink copied to clipboard!
Before you can use RH-SSO to authenticate Business Central or Decision Server, you must add users to the realm that you created. To add new users and assign them a role to access Red Hat Decision Manager, complete the following steps:
- Log in to the RH-SSO Admin Console and open the realm that you want to add a user to.
Click the Users menu item under the Manage section.
An empty user list appears on the Users page.
Click the Add User button on the empty user list to start creating your new user.
The Add User page opens.
- On the Add User page, enter the user information and click Save.
- Click the Credentials tab and create a password.
-
Assign the new user one of the roles that allow access to Red Hat Decision Manager. For example, assign the
adminrole to access Business Central or assign thekie-serverrole to access Decision Server. - Define the roles as realm roles in the Realm Roles tab under the Roles section.
- Click the Role Mappings tab on the Users page to assign roles.
Chapter 4. Authenticating Business Central through RH-SSO Copy linkLink copied to clipboard!
This chapter describes how to authenticate Business Central through RH-SSO. It includes the following sections:
- Section 4.1, “Creating the Business Central client for RH-SSO”
- Section 4.2, “Installing the RH-SSO client adapter for Business Central”
- Section 4.3, “Securing Business Central remote service using RH-SSO”
- Section 4.4, “Securing Business Central file system services using RH-SSO”
- Section 4.5, “Enabling user and group management for RH-SSO”
Prerequisites
- Business Central is installed in a Red Hat JBoss EAP 7.2 server, as described in Installing and configuring Red Hat Decision Manager on Red Hat JBoss EAP 7.2.
- RH-SSO is installed as described in Chapter 2, Installing and configuring RH-SSO.
- Business Central users have been added to RH-SSO as described in Chapter 3, Adding Red Hat Decision Manager users.
4.1. Creating the Business Central client for RH-SSO Copy linkLink copied to clipboard!
After the RH-SSO server starts, open http://localhost:8180/auth/admin in a web browser and log in using the admin credentials that you created while installing RH-SSO. When you login for the first time, you can set up the initial user on the new user registration form.
- In the RH-SSO Admin Console, click the Realm Settings menu item.
On the Realm Settings page, click Add Realm.
The Add realm page opens.
- On the Add realm page, provide a name for the realm and click Create.
Click the Clients menu item and click Create.
The Add Client page opens.
On the Add Client page, provide the required information to create a new client for your realm. For example:
- Client ID: kie
- Client protocol: openid-connect
-
Root URL:
http://localhost:8080/decision-central
Click Save to save your changes.
After you create a new client, its Access Type is set to
publicby default. Change it toconfidential.The RH-SSO server is now configured with a realm with a client for Business Central applications and running and listening for HTTP connections at
localhost:8180. This realm provides different users, roles, and sessions for Business Central applications.
4.2. Installing the RH-SSO client adapter for Business Central Copy linkLink copied to clipboard!
After you install RH-SSO, you must install the RH-SSO client adapter for Red Hat JBoss EAP and configure it for Business Central.
Prerequisites
- Business Central is installed in a Red Hat JBoss EAP 7.2 instance, as described in as described in Installing and configuring Red Hat Decision Manager on Red Hat JBoss EAP 7.2.
- RH-SSO is installed as described in Chapter 2, Installing and configuring RH-SSO.
-
A user with the
adminrole has been added to RH-SSO as described in Chapter 3, Adding Red Hat Decision Manager users.
Procedure
Navigate to the Software Downloads page in the Red Hat Customer Portal (login required), and select the product and version from the drop-down options:
- Product: Red Hat Single Sign-On
- Version: 7.2
-
Download Red Hat Single Sign-on 7.2.0 Client Adapter for JBoss EAP 7 (
rh-sso-7.2.0-eap7-adapter.zip). -
Unzip and install
rh-sso-7.2.0-eap7-adapter.zip. For installation instructions, see the "JBoss EAP Adapter" section of the Red Hat Single Sign On Securing Applications and Services Guide. -
Go to
EAP_HOME/standalone/configurationand open thestandalone.xmlandstandalone-full.xmlfiles. -
Delete the
<single-sign-on/>element from both of the files. Navigate to the
EAP_HOME/standalone/configurationdirectory in your Red Hat JBoss EAP installation and edit thestandalone.xmlandstandalone-full.xmlfiles to add the RH-SSO subsystem configuration. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow In this example:
-
secure-deployment nameis the name of your application’s WAR file. -
realmis the name of the realm that you created for the applications to use. -
realm-public-keyis the public key of the realm you created. You can find the key in the Keys tab in the Realm settings page of the realm you created in the RH-SSO Admin Console. If you do not provide a value forrealm-public-key, the server retrieves it automatically. -
auth-server-urlis the URL for the RH-SSO authentication server. -
enable-basic-authis the setting to enable basic authentication mechanism, so that the clients can use both token-based and basic authentication approaches to perform the requests. -
resourceis the name for the client that you created. -
credential nameis the secret key for the client you created. You can find the key in the Credentials tab on the Clients page of the RH-SSO Admin Console. principal-attributeis the login name of the user. If you do not provide this value, your User Id is displayed in the application instead of your user name.NoteThe RH-SSO server converts the user names to lower case. Therefore, after integration with RH-SSO, your user name will appear in lower case in Red Hat Decision Manager. If you have user names in upper case hard coded in business processes, the application might not be able to identify the upper case user.
-
Navigate to
EAP_HOME/bin/and enter the following command to start the Red Hat JBoss EAP server:./standalone.sh -c standalone-full.xml
./standalone.sh -c standalone-full.xmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
You can also configure the RH-SSO adapter for Business Central by updating your application’s WAR file to use the RH-SSO security subsystem. However, Red Hat recommends that you configure the adapter through the RH-SSO subsystem. Doing this updates the Red Hat JBoss EAP configuration instead of applying the configuration on each WAR file.
4.3. Securing Business Central remote service using RH-SSO Copy linkLink copied to clipboard!
Business Central provides different remote service endpoints that can be consumed by third-party clients using a remote API. To authenticate those services through RH-SSO, you must disable the BasicAuthSecurityFilter parameter.
Procedure
Open the Business Central application deployment descriptor file (
WEB-INF/web.xml) and apply the following changes to it:Remove the following lines to remove the servlet filter and its mapping for class
org.uberfire.ext.security.server.BasicAuthSecurityFilter:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following lines to add the
security-constraintparameter for the url-patterns that you have removed from the filter mapping:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
- Save your changes.
4.4. Securing Business Central file system services using RH-SSO Copy linkLink copied to clipboard!
To consume other remote services such as file systems (for example, a remote GIT service), you must specify the correct RH-SSO login module.
Procedure
Generate a JSON configuration file:
- Navigate to the RH-SSO Admin Console located at http://localhost:8180/auth/admin.
- Click Clients.
Create a new client with the following settings:
-
Set Client ID as
kie-git. -
Set Access Type as
confidential. - Disable the Standard Flow Enabled option.
- Enable the Direct Access Grants Enabled option.
-
Set Client ID as
- Click Save.
- Click the Installation tab at the top of the client configuration screen and choose Keycloak OIDC JSON as a Format Option.
- Click Download.
- Move the downloaded JSON file to an accessible directory in the server’s file system or add it to the application class path.
Specify the correct RH-SSO login module in the
EAP_HOME/standalone/configuration/standalone.xmlandstandalone-full.xmlfiles. By default, the security domain in Red Hat Decision Manager is set toother. Replace the default values of thelogin-modulein this security domain with the values in the following example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The JSON file specified in the
module-optionelement contains a client used for securing the remote services. Replace the$EAP_HOME/kie-git.jsonvalue of themodule-optionelement with the absolute path or the class path (classpath:/EXAMPLE_PATH/kie-git.json) to this JSON configuration file.At this point, all users authenticated through the RH-SSO server can clone internal GIT repositories. In the following command, change
USER_NAMEto a RH-SSO user, for exampleadmin:git clone ssh://USER_NAME@localhost:8001/system
git clone ssh://USER_NAME@localhost:8001/systemCopy to Clipboard Copied! Toggle word wrap Toggle overflow
4.5. Enabling user and group management for RH-SSO Copy linkLink copied to clipboard!
This section describes how you can configure Business Central to manage users and groups stored in RH-SSO.
Procedure
Ensure that the following libraries are in the
WEB-INF/libdirectory:uberfire-security-management-api-<latest_artifact_version>.jar uberfire-security-management-backend-<latest_artifact_version>.jar uberfire-security-management-keycloak-<latest_artifact_version>.jar keycloak-core-<latest_artifact_version>.jar keycloak-common-<latest_artifact_version>.jar
uberfire-security-management-api-<latest_artifact_version>.jar uberfire-security-management-backend-<latest_artifact_version>.jar uberfire-security-management-keycloak-<latest_artifact_version>.jar keycloak-core-<latest_artifact_version>.jar keycloak-common-<latest_artifact_version>.jarCopy to Clipboard Copied! Toggle word wrap Toggle overflow Remove third-party security JAR files, for example:
uberfire-security-management-wildfly-<latest_artifact_version>.jar uberfire-security-management-tomcat-<latest_artifact_version>.jar
uberfire-security-management-wildfly-<latest_artifact_version>.jar uberfire-security-management-tomcat-<latest_artifact_version>.jarCopy to Clipboard Copied! Toggle word wrap Toggle overflow Replace the entire contents of the
WEB-INF/classes/security-management.propertiesfile with the following content:org.uberfire.ext.security.management.api.userManagementServices=KCAdapterUserManagementService org.uberfire.ext.security.management.keycloak.authServer=http://localhost:8180/auth
org.uberfire.ext.security.management.api.userManagementServices=KCAdapterUserManagementService org.uberfire.ext.security.management.keycloak.authServer=http://localhost:8180/authCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf the
WEB-INF/classes/security-management.propertiesfile does not exist, create it.Edit the following dependencies and exclusions in the
/META-INF/jboss-deployment-structure.xmlfile:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 5. Authenticating Decision Server through RH-SSO Copy linkLink copied to clipboard!
Decision Server provides a REST API for third-party clients. If you integrate Decision Server with RH-SSO, you can delegate third-party client identity management to the RH-SSO server.
After you create a realm client for Red Hat Decision Manager and set up the RH-SSO client adapter for Red Hat JBoss EAP, you can set up RH-SSO authentication for Decision Server.
Prerequisites
- RH-SSO is installed as described in Chapter 2, Installing and configuring RH-SSO.
-
At lease one user with the
kie-serverrole has been added to RH-SSO as described in Chapter 3, Adding Red Hat Decision Manager users. - Decision Server is installed in a Red Hat JBoss EAP 7.2 instance, as described in Installing and configuring Red Hat Decision Manager on Red Hat JBoss EAP 7.2.
This chapter contains the following sections:
5.1. Creating the Decision Server client on RH-SSO Copy linkLink copied to clipboard!
Use the RH-SSO Admin Console to create a Decision Server client in an exiting realm.
Prerequisites
- Decision Server is installed in a Red Hat JBoss EAP 7.2 server, as described in Installing and configuring Red Hat Decision Manager on Red Hat JBoss EAP 7.2.
- RH-SSO is installed as described in Chapter 2, Installing and configuring RH-SSO.
-
At lease one user with the
kie-serverrole has been added to RH-SSO as described in Chapter 3, Adding Red Hat Decision Manager users.
Procedure
- In the RH-SSO Admin Console, open the security realm that you created in Chapter 2, Installing and configuring RH-SSO.
Click Clients and click Create.
The Add Client page opens.
On the Add Client page, provide the required information to create a Decision Server client for your realm, then click Save. For example:
- Client ID: kie-execution-server
- Root URL: \http://localhost:8080/kie-server
- Client protocol: openid-connect
-
The new client Access Type is set to
publicby default. Change it toconfidentialand click Save again. -
Navigate to the Credentials tab and copy the secret key. The secret key is required to configure the
kie-execution-serverclient.
5.2. Installing and configuring Decision Server with the client adapter Copy linkLink copied to clipboard!
After you install RH-SSO, you must install the RH-SSO client adapter for Red Hat JBoss EAP and configure it for Decision Server.
Prerequisites
- Decision Server is installed in a Red Hat JBoss EAP 7.2 server, as described in Installing and configuring Red Hat Decision Manager on Red Hat JBoss EAP 7.2.
- RH-SSO is installed as described in Chapter 2, Installing and configuring RH-SSO.
-
At lease one user with the
kie-serverrole has been added to RH-SSO as described in Chapter 3, Adding Red Hat Decision Manager users.
If you deployed Decision Server to a different application server than Business Central, install and configure RH-SSO on your second server as well.
Procedure
Navigate to the Software Downloads page in the Red Hat Customer Portal (login required), and select the product and version from the drop-down options:
- Product: Red Hat Single Sign-On
- Version: 7.2
-
Download Red Hat Single Sign-on 7.2.0 Client Adapter for JBoss EAP 7 (
rh-sso-7.2.0-eap7-adapter.zip). -
Unzip and install
rh-sso-7.2.0-eap7-adapter.zip. For installation instructions, see the "JBoss EAP Adapter" section of the Red Hat Single Sign On Securing Applications and Services Guide. -
Go to
EAP_HOME/standalone/configurationand open thestandalone.xmlandstandalone-full.xmlfiles. -
Delete the
<single-sign-on/>element from both of the files. -
Navigate to
EAP_HOME/standalone/configurationdirectory in your Red Hat JBoss EAP installation and edit thestandalone.xmlfile to add the RH-SSO subsystem configuration. For example: Navigate to
EAP_HOME/standalone/configurationin your Red Hat JBoss EAP installation and edit thestandalone.xmlandstandalone-full.xmlfiles to add the RH-SSO subsystem configuration. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow In this example:
-
secure-deployment nameis the name of your application WAR file. -
realmis the name of the realm that you created for the applications to use. -
realm-public-keyis the public key of the realm you created. You can find the key in the Keys tab in the Realm settings page of the realm you created in the RH-SSO Admin Console. If you do not provide a value for this public key, the server retrieves it automatically. -
auth-server-urlis the URL for the RH-SSO authentication server. -
resourceis the name for the server client that you created. -
enable-basic-authis the setting to enable basic authentication mechanism, so that the clients can use both token-based and basic authentication approaches to perform the requests. -
credential nameis the secret key of the server client you created. You can find the key in the Credentials tab on the Clients page of the RH-SSO Admin Console. -
principal-attributeis the login name of the user. If you do not provide this value, your User Id is displayed in the application instead of your user name.
-
- Save your configuration changes.
Use the following command to restart the Red Hat JBoss EAP server and run Decision Server.
EXEC_SERVER_HOME/bin/standalone.sh -Dorg.kie.server.id=<ID> -Dorg.kie.server.user=<USER> -Dorg.kie.server.pwd=<PWD> -Dorg.kie.server.location=<LOCATION_URL> -Dorg.kie.server.controller=<CONTROLLER_URL> -Dorg.kie.server.controller.user=<CONTROLLER_USER> -Dorg.kie.server.controller.pwd=<CONTOLLER_PASSWORD>
EXEC_SERVER_HOME/bin/standalone.sh -Dorg.kie.server.id=<ID> -Dorg.kie.server.user=<USER> -Dorg.kie.server.pwd=<PWD> -Dorg.kie.server.location=<LOCATION_URL> -Dorg.kie.server.controller=<CONTROLLER_URL> -Dorg.kie.server.controller.user=<CONTROLLER_USER> -Dorg.kie.server.controller.pwd=<CONTOLLER_PASSWORD>Copy to Clipboard Copied! Toggle word wrap Toggle overflow For example:
EXEC_SERVER_HOME/bin/standalone.sh -Dorg.kie.server.id=kieserver1 -Dorg.kie.server.user=kieserver -Dorg.kie.server.pwd=password -Dorg.kie.server.location=http://localhost:8080/kie-execution-server/services/rest/server -Dorg.kie.server.controller=http://localhost:8080/decision-central/rest/controller -Dorg.kie.server.controller.user=kiecontroller -Dorg.kie.server.controller.pwd=password
EXEC_SERVER_HOME/bin/standalone.sh -Dorg.kie.server.id=kieserver1 -Dorg.kie.server.user=kieserver -Dorg.kie.server.pwd=password -Dorg.kie.server.location=http://localhost:8080/kie-execution-server/services/rest/server -Dorg.kie.server.controller=http://localhost:8080/decision-central/rest/controller -Dorg.kie.server.controller.user=kiecontroller -Dorg.kie.server.controller.pwd=passwordCopy to Clipboard Copied! Toggle word wrap Toggle overflow When Decision Server is running, enter the following command to check the server status, where
<KIE_SERVER_USER>is a user with thekie-serverrole and<PASSWORD>is the password for that user:curl http://<KIE_SERVER_USER>:<PASSWORD>@localhost:8080/kie-execution-server/services/rest/server/
curl http://<KIE_SERVER_USER>:<PASSWORD>@localhost:8080/kie-execution-server/services/rest/server/Copy to Clipboard Copied! Toggle word wrap Toggle overflow
5.3. Decision Server token-based authentication Copy linkLink copied to clipboard!
You can also use token-based authentication for communication between Red Hat Decision Manager and Decision Server. You can use the complete token as a system property of your application server, instead of the user name and password, for your applications. However, you must ensure that the token will not expire while the applications are interacting because the token is not automatically refreshed. To get the token, see Section 6.2, “Token-based authentication”.
Procedure
To configure Business Central to manage Decision Server using tokens:
-
Set the
org.kie.server.tokenproperty. Make sure that the
org.kie.server.userandorg.kie.server.pwdproperties are not set.Red Hat Decision Manager will then use the
Authorization: Bearer $TOKENauthentication method.
-
Set the
To use the REST API using the token-based authentication:
-
Set the
org.kie.server.controller.tokenproperty. -
Make sure that the
org.kie.server.controller.userandorg.kie.server.controller.pwdproperties are not set.
-
Set the
Because Decision Server is unable to refresh the token, use a high-lifespan token. A token’s lifespan must not exceed January 19 2038. Check with your security best practices to see whether this is a suitable solution for your environment.
Chapter 6. Authenticating third-party clients through RH-SSO Copy linkLink copied to clipboard!
To use the different remote services provided by Business Central or by Decision Server, your client, such as curl, wget, web browser, or a custom REST client, must authenticate through the RH-SSO server and have a valid token to perform the requests. To use the remote services, the authenticated user must have the following roles:
-
rest-allfor using Business Central remote services. -
kie-serverfor using the Decision Server remote services.
Use the RH-SSO Admin Console to create these roles and assign them to the users that will consume the remote services.
Your client can authenticate through RH-SSO using one of these options:
- Basic authentication, if it is supported by the client
- Token-based authentication
6.1. Basic authentication Copy linkLink copied to clipboard!
If you enabled basic authentication in the RH-SSO client adapter configuration for both Business Central and Decision Server, you can avoid the token grant and refresh calls and call the services as shown in the following examples:
For web based remote repositories endpoint:
curl http://admin:password@localhost:8080/decision-central/rest/repositories
curl http://admin:password@localhost:8080/decision-central/rest/repositoriesCopy to Clipboard Copied! Toggle word wrap Toggle overflow For Decision Server:
curl http://admin:password@localhost:8080/kie-execution-server/services/rest/server/
curl http://admin:password@localhost:8080/kie-execution-server/services/rest/server/Copy to Clipboard Copied! Toggle word wrap Toggle overflow
6.2. Token-based authentication Copy linkLink copied to clipboard!
If you want a more secure option of authentication, you can consume the remote services from both Business Central and Decision Server by using a granted token provided by RH-SSO.
Procedure
In the RH-SSO Admin Console, click the Clients menu item and click Create to create a new client.
The Add Client page opens.
On the Add Client page, provide the required information to create a new client for your realm. For example:
- Client ID: kie-remote
- Client protocol: openid-connect
- Click Save to save your changes.
Change the token settings in Realm Settings:
- In the RH-SSO Admin Console, click the Realm Settings menu item.
- Click the Tokens tab.
Change the value for Access Token Lifespan to
15minutes.This gives you enough time to get a token and invoke the service before it expires.
- Click Save to save your changes.
After a public client for your remote clients is created, you can now obtain the token by making an HTTP request to the RH-SSO server’s token endpoint using:
RESULT=`curl --data "grant_type=password&client_id=kie-remote&username=admin&password=password" http://localhost:8180/auth/realms/demo/protocol/openid-connect/token`
RESULT=`curl --data "grant_type=password&client_id=kie-remote&username=admin&password=password" http://localhost:8180/auth/realms/demo/protocol/openid-connect/token`Copy to Clipboard Copied! Toggle word wrap Toggle overflow The user in this command is a Business Central RH-SSO user. For more information, see Chapter 3, Adding Red Hat Decision Manager users.
To view the token obtained from the RH-SSO server, use the following command:
TOKEN=`echo $RESULT | sed 's/.*access_token":"//g' | sed 's/".*//g'`
TOKEN=`echo $RESULT | sed 's/.*access_token":"//g' | sed 's/".*//g'`Copy to Clipboard Copied! Toggle word wrap Toggle overflow
You can now use this token to authorize the remote calls. For example, if you want to check the internal Red Hat Decision Manager repositories, use the token as shown below:
curl -H "Authorization: bearer $TOKEN" http://localhost:8080/decision-central/rest/repositories
curl -H "Authorization: bearer $TOKEN" http://localhost:8080/decision-central/rest/repositories
Appendix A. Versioning information Copy linkLink copied to clipboard!
Documentation last updated on Wednesday, May 8, 2019.