Oauth2 authentication Setup¶
OAuth provides clients a "secure delegated access" to server
resources on behalf of a resource owner.
It specifies a process for resource owners to authorize third-party
access to their server resources without providing credentials.
For more details visit official Oauth2 website.
For Plexus Connect to determine the active authentication server, the configuration file config.properties there needs to be created.
This file needs to be saved on the server. We recommend to use the configuration folder.
- for UNIX ~/.chemaxon/plexus-suite/config.properties
- for Windows ~/chemaxon/plexus-suite/config.properties
This configuration is activating by the following startup option:
Basic content of
config.properties is shown on following example:
From Connect perspective, the authentication server has to have all required services in OpenID Connect Session Management. Connect expect JWT token when trying to authorize against the server.
For JWT token following attributes are mandatory
Roles should be specified for each user individually and sent within
roles attributeWhen following attributes are empty, user will be authorized as ROLE_USER. More about user ROLES here
For logout service implementation following piece of code can be useful:
In the sections below, you can find basic demo tutorial, which helps you to easily set up this security solution for Plexus Conect. Oauth2_tutorial.