5.0.0 • Published 3 months ago

@sassoftware/registerclient v5.0.0

Weekly downloads
122
License
Apache-2.0
Repository
github
Last release
3 months ago

registerapp

Application to manange clientids. The application runs as a cli. It can be run in interactive mode or in batch mode. The user of this app must have admin rights.



Install


npm install -g git+https://gitlab.sas.com/kumar/registerapp.git

This installs the registerapp as a global command.

Configuration


Create an env file ( call it register.env) with the following content

VIYA_SERVER=http://<your viyaserver>
AUTHTYPE=password
CLIENTID=sas.ec or a valid clientid( appears that sas.ec is shipped as a default clientid)
CLIENTSECRET=

Now add this enviroment variable

SET RESTAFENV=register.env


Interactive mode


Start the interactive session with this command:

registerapp

This will put you into an interactive session where you can issue commands. Use the exit command to end the session.


Batch mode


This mode is useful when you want to run these commands as part of some process. I use them to setup all my clientids when I am configuring a new server

Create a version of the register.env file with two additional keys - USER and PASSWORD

VIYA_SERVER=http://<your viyaserver>
AUTHTYPE=password
CLIENTID=sas.ec or a valid clientid( appears that sas.ec is shipped as a default clientid)
CLIENTSECRET=
USER=<username>
PASSWORD=<password>

Run the following command

registerapp --file yourcmdfile

The cmd file is a list of the commands(see below). They are executed in order.

list
add app1 -t implicit -r http://localhost:5000/app1
add app2 -t authorization_code -s mysecret -r http://localhost:5000/callback
list

List of commands

  • logon - logon on to Viya server
  • list \<all> - list current clientid. Use all option to include system clientids
  • delete clientid - delete the specified clientid( always returns 404 but work - no idea why)
  • add clienid \< options > - add a new clientid

Options for the add command

  • -t == grant type == typically one of these: password | implicit | authorization_code)
  • -s == secret whatever you want(valid for password and authorization_code)
  • -r == redirect_uri == valid for implicit and authorization_code(if multiple redirects seperate them by comma(,))

Coming soon

  • support for https
  • custom specificiation for the clientid's(see current default below)

Notes

The current configuration for all clientids is shown below:

scope: ['openid', '*'],
resource_ids: 'none',
autoapprove: true,
access_token_validity: 86400,
'use-session': true
6.0.0

3 months ago

5.0.0

3 months ago

4.4.0

11 months ago

4.2.0

1 year ago

4.3.0

1 year ago

4.0.1

1 year ago

4.0.0

1 year ago

4.1.0

1 year ago

4.1.1

1 year ago

3.4.6

2 years ago

3.4.5

2 years ago

3.4.4

2 years ago

3.5.2

2 years ago

3.4.3

2 years ago

3.5.1

2 years ago

3.4.2

2 years ago

3.5.0

2 years ago

3.4.1

2 years ago

3.4.0

3 years ago

3.3.0

3 years ago

3.2.63

3 years ago

3.2.62

3 years ago

3.2.61

3 years ago

3.2.5

3 years ago

3.2.4

3 years ago

3.2.2

3 years ago

3.2.3

3 years ago

3.2.1

3 years ago

3.1.4

3 years ago

3.1.3

3 years ago

3.1.0

3 years ago

3.0.8

3 years ago

3.0.7

3 years ago

3.0.5

3 years ago

3.0.4

3 years ago

3.0.2

3 years ago

2.2.8

4 years ago

2.2.5

4 years ago

2.2.4

4 years ago

2.2.3

4 years ago

2.1.0

4 years ago

2.0.9

4 years ago

2.0.5

4 years ago

2.0.3

4 years ago

2.0.1

4 years ago

2.0.0

4 years ago

1.7.10

4 years ago

1.7.9

4 years ago

1.7.8

4 years ago

1.7.7

4 years ago

1.7.6

4 years ago

1.7.5

4 years ago