You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
All BaSyx components support role-based access control by using Keycloak as identity provider.
4
+
Access rules are defined based on roles. Roles are defined in the Keycloak server.
5
+
6
+
To start the secure setup execute the following command
7
+
8
+
```bash
9
+
docker-compose up -d
10
+
```
11
+
12
+
This will start the BaSyx components and the Keycloak server. The Keycloak server can be found at http://localhost:9097.
13
+
There you can login as admin with username `admin` and password `keycloak-admin`.
14
+

15
+
16
+
The example comes with an already configured realm `BaSyx` and a user `john.doe` with password `johndoe`.
17
+
This user has the `admin` role and can access all BaSyx components and all information about each component.
18
+
19
+
The entry point for accessing the Asset Administration Shells and their Submodels is the AAS Web UI running at http://localhost:3000.
20
+
After opening the page you will be redirected to the Keycloak login page. Use the credentials of user `john.doe` to log in.
21
+

22
+
23
+
From there you can access the AAS and Submodels of the BaSyx components.
24
+
The UI shows the login status in the top right corner.
25
+
To end your session click on the logout button in the top right corner.
26
+

27
+
28
+
There are several other user accounts available, each with different roles. You can use them to test the different levels of access. The password for these users is their username without the dots. You can find them in the [Users](http://localhost:9097/admin/master/console/#/BaSyx/users) tab of the BaSyx realm in Keycloak.
0 commit comments