...
Excerpt |
---|
The JOC Cockpit brings user authentication and authorization to the JobScheduler. Authentication can either take place against an Apache ShiroTM compliant configuration file, an LDAP compliant directory service or information stored in a database. Authorization is defined in Roles - an example set of Roles is provided with the JOC Cockpit installation archive and system administrators are able to define Roles for their Users. The JOC Cockpit is able to handle authentication of multiple users and their authorization for multiple JobSchedulers simultaneously and includes an editor in the Manage Accounts view for the configuration of authentication and authorization. |
...
By default the shiro.ini
configuration file contains an example mapping of Roles and Permissions. This mapping can be used by administrators as a basis for their own configurations with either Shiro or LDAP authentication. This mapping is and the function of individual Permissions are described in the Matrix of Roles and Permissions section of the Authentication and Authorization - Permissions for the JOC Cockpit Web Service Article.
...
- A text editor can be used to directly edit the local
shiro.ini
file. This approach is described in detail in the Authentication and Authorization - Configuration article and can be used with Shiro and LDAP Authentication. - The JOC Cockpit's Manage Accounts configuration editor can be used as described in the JOC Cockpit - Managing Authentication and Authorization for - Managing User Accounts article.
This editor can be used with Shiro and LDAP Authentication. Some the features of this editor are illustrated in the screenshot below:Display feature availability StartingFromRelease 1.11.2 - Database Authentication and Authorization requires that some configuration information is stored in the
shiro.ini
file using a text editor. In addition, database Authentication and Authorization involves administrators writing their own SQL Insert statements. We have neither a GUI for this nor is batch support provided. Example database tables are described in the Authentication and Authorization - Configuration article along with the example configuration information for theshiro.ini
file.
...