Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Minor change to Introduction

...

Excerpt

The JOC Cockpit brings user authentication - usually against an LDAP directory - and authorization to the JobScheduler. Authentication can either take place against a Shiro compliant configuration file or an LDAP compliant directory service. The JOC Cockpit is able to handle authentication of multiple users and their authorization for multiple JobSchedulers simultaneously.

...

  • The JOC Cockpit accepts the user name and password from the login screen and
    • either tries to login to the Active Directory service with the given credentials
    • or tries to verify the credentials from its local configuration file,
    • or checks the credentials in a Shiro compliant database.
  • The credentials are subsequently used for HTTP Authentication with each http HTTP request that is created by the JOC Cockpit to the JobScheduler Web Services.
    • Browsers may cache credentials during a session, i.e. they are re-used for single sign-on when opening the JOC Cockpit in a new browser tab. The credentials cache is cleared on termination of the browser.
    • This behavior might vary depending on the browser and version.

...

  • After successful authentication the JOC Cockpit will check the assignement assignment of roles to the given user
    • either by using a configurable LDAP query that checks membership of the user with a number of Active Directory groups. An LDAP query is configured for each role and in case of a positive match for group membership the user is assigned the respective role.
    • or by using its local configuration file that includes a assignment of users and roles.
  • The assignment of permissions to roles is configured with the local shiro.ini configuration file.
    • By default the JOC Cockpit ships with a number of predefined roles and assigned permission, see below Matrix of Roles and Permissions.
    • Roles can be added.
    • The assignment of permissions to roles can be changed.

...