You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: guides/security/authentication.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -471,7 +471,7 @@ On SAP BTP Kyma Runtime, you might need to adapt configuration parameter <Config
471
471
:::
472
472
473
473
474
-
### Administrative Console for IAS { #ias-admin }
474
+
#### Administrative Console for IAS { #ias-admin }
475
475
476
476
In the [Administrative Console for Cloud Identity Services](https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/accessing-administration-console?version=Cloud)
477
477
you can see and manage the deployed IAS application. You need a user with administrative privileges in the IAS tenant to access the services at `<ias-tenant>.accounts400.ondemand.com/admin`.
@@ -487,7 +487,7 @@ In BTP Cockpit, service instance `bookshop-ias` appears as a link that allows di
487
487
:::
488
488
489
489
490
-
### Testing IAS on CLI Level
490
+
### CLI Level Testing
491
491
492
492
Due to CAP's autoconfiguration, all CAP endpoints are authenticated and expect valid ID tokens generated for the IAS application.
In the UI scenario, adding an AppRouter as an ingress proxy for authentication simplifies testing a lot because the technical requests for fetching the IAS token are done under the hood.
606
606
@@ -666,7 +666,7 @@ The same is true for the logout flow.
666
666
- federation of corporate identity providers (multiple user stores)
667
667
- create and assign access roles
668
668
669
-
::: tip Notice
669
+
::: tip Info
670
670
In contrast to [IAS](#ias-auth), XSUAA does not allow cross-landscape user propagation out of the box.
671
671
:::
672
672
@@ -690,7 +690,12 @@ to make your application ready for deployment to CF.
690
690
691
691
<div class="impl java">
692
692
693
-
::: tip Notice
693
+
In addition, activate H2 to serve as in-memory DB (**not** recommended for production!):
694
+
```sh
695
+
cds add h2 --for production
696
+
```
697
+
698
+
::: tip Info
694
699
Command `add mta` will enhance the project with `cds-starter-cloudfoundry` and therefore all [dependencies required](../../java/security#maven-dependencies) for security are added transitively.
695
700
:::
696
701
@@ -866,7 +871,7 @@ At startup, the CAP runtime checks the available bindings and activates XSUAA au
866
871
867
872
868
873
869
-
### Testing XSUAA on CLI Level
874
+
### CLI Level Testing
870
875
871
876
Due to CAP's autoconfiguration, all CAP endpoints are authenticated and expect valid ID tokens generated for the IAS application.
In the UI scenario, adding an AppRouter as an ingress proxy for authentication simplifies testing a lot because the technical requests for fetching the XSUAA token are done under the hood.
0 commit comments