...
Gliffy | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
The Client application is impersonating a User1 which is a member of 2 3 groups. Each of these groups has access to one server the respective application that should be accessed by the Client1 applicationaccessible with Client1 application’s client credentials. Authorization policies that can be configured for server applications are omitted from the configuration example as it is not mandatory.If Client1 application is using the token to access to itself then User1 account should be a member of the group which is allowed to access the application.
Configuration
Prerequisites:
Exist in SSO:
Site Example
;
OAuth 2.0 applications: Client1, Server1, Server2
;
Groups: ClientGroup, Group1, Group2
;
User account User1
Application Client1 has
client_credentials
grant type and client IDs of server applications in its metadata (other scopes are also allowed, e.g.openid
):
Code Block | ||
---|---|---|
| ||
...
"grant_types": [
"client_credentials"
],
"scope": "openid Server1 Server2"
... |
Server applications does not have any grant types or scopes:
Code Block language json ... "grant_types": [], "scope": "" ...
...
Create and enable authentication method as described in ​OAuth 2.0 Client Credentials Grant authentication method - SSO
Add this method to site Example.
Allow the method for applications: Client1, Server1 and Server2.
Allow ClientGroup to access Client1 application.
Allow Group1 to access application Server1.
Allow Group2 to access application Server2.
Allow the method for user account User1.
Make User1 a member of ClientGroup, Group1 and Group2.
Add Client1 application to the list of applications impersonating an account User1.
...