broadleaf.auth.security.use-redirect-uri-host
|
Use the same host from the provided successful login redirect uri.
This facilitates a common domain for authorize, login, and application, if desired.
Redirect Uris are always validated against a white list. |
false
|
broadleaf.auth.security.prefixed-domain-whitelist
|
If a tenant enabled installation is in place (i.e. broadleaf.auth.data.tenant.sync.active = true ), this list serves to declare the possible domain names that can be used in conjunction with subdomains registered for applications via the Application#getIdentifierType() of ResolutionIdentifierType#DOMAIN_PREFIX . |
|
broadleaf.auth.security.login-path-or-url
|
Either the path portion only to the login page (e.g. /login), or the absolute url to the login page (e.g. https://security.server.com/login.
If use-redirect-uri-host is true, then this should be the login path only (since the system will be dynamically building the login form url).
Otherwise, this value can be a full URL or relative path as needed. |
/login
|
broadleaf.auth.security.global-domain-whitelist
|
If a tenant enabled installation is in place (i.e. broadleaf.auth.data.tenant.sync.active = true ), this list serves to declare the possible domain names (e.g., all of global.mycompany.com ) that can be used to validate a requested redirect uri that represents a global admin login. |
|
broadleaf.auth.security.global-prefix-whitelist
|
If a tenant enabled installation is in place (i.e. broadleaf.auth.data.tenant.sync.active = true ), this list serves to declare the possible domain name prefixes (e.g., global in global.mycompany.com ) that can be used to validate a requested redirect uri that represents a global admin login. |
["global"]
|
broadleaf.auth.security.frame-options
|
Determines the value and presence of the X-Frame-Options header. |
DENY
|
broadleaf.auth.security.pkce-enabled
|
(Deprecated, not used in 2.0) Whether the Proof-Key-for-Code-Exchange enhancement for the Authorization Code Flow should be enabled. |
false
|
broadleaf.auth.security.logout-redirect-parameter
|
The name of the parameter that indicates the URI to where the user should be forwarded after successful logout. The parameter should be included in logout requests from clients utilizing refresh tokens, eg cross-site websites or embedded apps. |
returnTo
|
broadleaf.auth.security.oauth2.encoded-private-key
|
Base64-encoded version of the private key used to generate tokens.
Used for encrypting both the JWT authorization tokens as well as stateless session cookies. |
|
broadleaf.auth.security.oauth2.encoded-public-key
|
Base64-encoded version of the public key used to generate tokens.
Used for encrypting both the JWT authorization tokens as well as stateless session cookies. |
|
broadleaf.auth.security.oauth2.issuer
|
Used in validation of JWT to ensure that the system that issued the token (this one) is the same as the one passed in the token.
Corresponds to the iss JWT claim |
broadleaf-authentication
|
broadleaf.auth.security.oauth2.additional-audiences
|
Corresponds to the aud JWT claim.
Usually contains the iss claim |
["broadleaf-authentication", "oauth2-resource"]
|
broadleaf.auth.security.oauth2.impersonated-session-duration
|
The max session duration for an impersonated session.
This controls how long a CSR will have a session authenticated as the impersonated user. |
15 Minutes
|
broadleaf.auth.security.oauth2.whitelisted-impersonation-authorities
|
The whitelist of GrantedAuthority that will be inherited when a user is impersonated by a CSR user.
This set of authorities serves as a whitelist of the authorities that are inherited by the impersonated user session.
This set only restricts the authorities permitted, but it will not result in authorities being inherited that the CSR does not originally have. |
["CSR", "ALL_CSR", "PUBLISH_QUOTE"]
|