Cloud Foundry UAA Authentication (uaa-auth
)
Cloud Foundry UAA authenticates users from an external UAA server. Users authenticate via CLI prompts or are redirected to UAA and given a token for their CLI usage.
Server Configuration Options
url
– the address of the UAA serverpublic_key
– a PEM-formatted public key for verifying JWT tokensclient_id
– the Client ID for authenticating usersclient_secret
– the Client secret for authenticating usersca_certificate
– a PEM-formatted certificate for trusting HTTPS connections to the UAA serverprompts
– a list of prompts to show the user when they are authenticating
Authentication Scopes
All scopes propagated by the UAA server will be available in the user’s authentication token.
UAA Client Configuration
In order for ssoca-client
to connect to UAA, you will need to configure a UAA client for it to use. The following configures uaa
with a ssoca_client
ID (no secret), which is allowed to propagate scopes named env.*
.
uaa:
clients:
ssoca_client:
override: true
authorized-grant-types: "password,refresh_token"
scope: "openid,env.*"
authorities: "uaa.none"
access-token-validity: 120 # 2 min
refresh-token-validity: 86400 # 1 day
secret: ""