You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Learn more about custom mock users](../../java/security#custom-mock-users){.learn-more .java}
255
-
[Learn more about custom mock users](../../node.js/authentication#mocked){.learn-more .node}
256
+
[Learn more about custom mock usersin Java.](../../java/security#custom-mock-users){.learn-more}
257
+
[Learn more about custom mock usersin Node.js.](../../node.js/authentication#mocked){.learn-more}
256
258
257
259
258
260
### Automated Testing { #mock-user-testing }
@@ -293,20 +295,15 @@ public class BookServiceOrdersTest {
293
295
Integration tests running in production profile should verify that unauthenticated users cannot access any application endpoints❗
294
296
:::
295
297
296
-
[Learn more about testing with authenticated endpoints](../../node.js/cds-test#authenticated-endpoints){.learn-more .java}
297
-
[Learn more about testing](../../java/developing-applications/testing#testing-cap-java-applications){.learn-more .node}
298
+
[Learn more about testing in Java.](../../java/developing-applications/testing#testing-cap-java-applications){.learn-more .node}
299
+
[Learn more about testing with authenticated endpoints in Node.js.](../../node.js/cds-test#authenticated-endpoints){.learn-more}
300
+
[Learn more about unit testing in Node.js.](../../node.js/cds-test#testing-with-cds-test){.learn-more}
298
301
299
302
300
-
<div class="impl node">
301
-
302
-
[Learn more about unit testing](../../node.js/cds-test#testing-with-cds-test){.learn-more}
303
-
304
-
</div>
305
-
306
303
307
304
## IAS Authentication { #ias-auth }
308
305
309
-
[SAP Identity Authentication Service (IAS)](https://help.sap.com/docs/cloud-identity-services) is the preferred platform service for identity management providing following features:
306
+
[SAP Identity Authentication Service (IAS)](https://help.sap.com/docs/cloud-identity-services) is the preferred platform service for identity management providing the following features:
310
307
- best of breed authentication mechanisms (single sign-on, multi-factor enforcement)
311
308
- federation of corporate identity providers (multiple user stores)
312
309
- cross-landscape user propagation (including on-premise)
@@ -394,7 +391,7 @@ The [binding](../../java/security#bindings) to service instance of type `identit
394
391
</div>
395
392
396
393
The binding provides access to the identity services on behalf of a concrete client.
397
-
**CAP applications can have at most one binding to an IAS instance.** Conversely, multiple CAP applications can share the same IAS intstance.
394
+
**CAP applications can have at most one binding to an IAS instance.** Conversely, multiple CAP applications can share the same IAS instance.
398
395
399
396
Service instance and binding offer the following crucial configuration properties:
400
397
@@ -823,9 +820,9 @@ Role collections can be assigned to end users.
823
820
824
821
For convenience, when adding the XSUAA facet, these artifacts are initially derived from the CDS model:
825
822
826
-
- **XSUAA Scopes**: For every [CAP role](./cap-users#roles) in the CDS model, a dedicated scope is generated with the exact name of the CDS role.
827
-
- **XSUAA attributes** For every [CAP attribute](./authorization#user-attrs) in the CDS model, one attribute is generated.
828
-
- **XSUAA role templates** For every scope, a dedicated role template with the exact name is generated. The role templates are building blocks for concrete role collections that finally can be assigned to users.
823
+
- **XSUAA scopes**: For every [CAP role](./cap-users#roles) in the CDS model, a dedicated scope is generated with the exact name of the CDS role.
824
+
- **XSUAA attributes**: For every [CAP attribute](./authorization#user-attrs) in the CDS model, one attribute is generated.
825
+
- **XSUAA role templates**: For every scope, a dedicated role template with the exact name is generated. The role templates are building blocks for concrete role collections that finally can be assigned to users.
829
826
830
827
```json
831
828
{
@@ -848,9 +845,9 @@ For convenience, when adding the XSUAA facet, these artifacts are initially deri
848
845
]
849
846
}
850
847
```
851
-
[Learn more about XSUAA attributes](https://help.sap.com/docs/btp/sap-business-technology-platform/setting-up-instance-based-authorizations){.learn-more}
852
-
[Lean more about XSUAA security descriptor](https://help.sap.com/docs/btp/sap-business-technology-platform/application-security-descriptor-configuration-syntax){.learn-more}
853
-
[Learn how to setup mTLS for XSUAA](https://help.sap.com/docs/btp/sap-business-technology-platform/enable-mtls-authentication-to-sap-authorization-and-trust-management-service-for-your-application){.learn-more}
848
+
[Learn more about XSUAA attributes.](https://help.sap.com/docs/btp/sap-business-technology-platform/setting-up-instance-based-authorizations){.learn-more}
849
+
[Lean more about XSUAA security descriptor.](https://help.sap.com/docs/btp/sap-business-technology-platform/application-security-descriptor-configuration-syntax){.learn-more}
850
+
[Learn how to setup mTLS for XSUAA.](https://help.sap.com/docs/btp/sap-business-technology-platform/enable-mtls-authentication-to-sap-authorization-and-trust-management-service-for-your-application){.learn-more}
854
851
855
852
At runtime, after successful authentication, the scope prefix `$XSAPPNAME`is removed by the CAP integration to match the corresponding CAP role.
856
853
@@ -1280,7 +1277,9 @@ With `cds.security.authentication.authenticateMetadataEndpoints: false` you can
1280
1277
</div>
1281
1278
1282
1279
<div class="node">
1280
+
1283
1281
Automatic authentication enforcement can be disabled via feature flag <Config>cds.requires.auth.restrict_all_services: false</Config>, or by using [mocked authentication](#mock-user-auth) explicitly in production.
1282
+
1284
1283
</div>
1285
1284
1286
1285
### Overrule Partially { #partially-auth .java }
@@ -1317,7 +1316,7 @@ Be cautious with the configuration of the `HttpSecurity` instance in your custom
1317
1316
1318
1317
### Overrule Fully { #fully-auth }
1319
1318
1320
-
In services meshes such as [Istio](https://istio.io/) the authentication is usually fully delegated to a central ingress gateway and the internal communication with the services is protercted by a secure channel:
1319
+
In services meshes such as [Istio](https://istio.io/) the authentication is usually fully delegated to a central ingress gateway and the internal communication with the services is protected by a secure channel:
1321
1320
1322
1321
{width="500px"}
0 commit comments