General properties - CustomerID
These configurations are available in the eidm2.properties file. This is the main configuration file of Ubisecure CustomerID. Changes to this file require a server restart.
- 1 general.url.base
- 2 general.default.returnUrl
- 3 general.default.logoutReturnUrl
- 4 general.requestcycle.timeout
- 5 general.move.roles.with.user
- 6 general.mail.session
- 7 general.main.ldap.directory
- 8 general.login.generation
- 9 general.login.attribute
- 10 general.group.samaccountname.generation
- 11 general.admin.organization.roles.restricted
- 12 general.admin.organization.roles.protected
- 13 general.admin.organization.roles.reservednames
- 14 general.admin.organization.users.includerolemembers
- 15 general.admin.user.roles.protected
- 16 general.user.self.enable.account
- 17 general.organization.name.oid
- 18 general.authprovider.enabled
- 19 general.approval.reject.promptforreason
- 20 general.accepted.origin.whitelist
general.url.base
The base URL defines the beginning of the remote address related to Ubisecure CustomerID services. The setting is used, for example, in hyperlinks incorporated in emails. The context path of the address must be /eidm2/. Usually this property is included in the eidm2_generated.properties file and there is no reason to modify it or reset it.
Default is https://localhost:7443/eidm2/
Example:
general.url.base = https://www.example.com/eidm2/general.default.returnUrl
The user is directed to the address specified in general.default.returnUrl, if:
An error occurs
The application cannot use any other return URL address
The user exits a Ubisecure CustomerID service using the return link
You can use a variable for including user locale, for example: https://www.ubisecure.com?language=${locale}
Default is https://www.ubisecure.com
Example:
general.default.returnUrl = https://www.ubisecure.comgeneral.default.logoutReturnUrl
The default logout return URL defines the URL address where the user is redirected when a logout is requested.
You can use a variable for including user locale, for example: https://www.ubisecure.com?language=${locale}
Default is https://www.ubisecure.com
Example:
general.default.logoutReturnUrl = https://www.ubisecure.comgeneral.requestcycle.timeout
This property defines the Wicket request cycle timeout value. The default value is 60 seconds. The value is given in seconds. Adjust this value if e.g organization listings timeout.
Default is 60.
Example:
general.requestcycle.timeout = 60general.move.roles.with.user
This setting will activate a behavior that will reassign user roles when the user is moved from one organization to another. If the source organization and target organization have the same roles enabled that are assigned to user, the roles assigned from source organization are deassigned and replaced by those of the target organization. Roles which do not exist in target organization or those assigned from other organizations will remain unmodified. If role assignments fail for some reason, deassignment is not performed. This test is performed individually for each reassignable role. There are two possible values:
true: Roles will be reassigned.false: Roles are not changed.
Default is false.
Example:
general.move.roles.with.user = falsegeneral.mail.session
This property defines the JNDI name with which the MailSession configured in Tomcat's context.xml is available.
Default is java:comp/env/mail/mailSession.
Example:
general.mail.session = java:comp/env/mail/MailSessiongeneral.main.ldap.directory
This property defines the main LDAP user authentication data repository. Valid values are
ud: Ubisecure Directoryad: Active DirectoryDefault is
ud.Example:
general.main.ldap.directory = ud
general.login.generation
This property defines how the main user authentication data repository specific login attribute is generated. Valid values are
random: A random string is generated (this value can be used with Ubisecure Directory and Active Directory).mail: Email address is used (this value can be used with Ubisecure Directory).custom1: A customer specific generation rule is used (this value can be used with Active Directory).
Default is mail.
Example:
general.login.generation = mailgeneral.login.attribute
This property defines the attribute that is used as the username in authentication methods. Any attribute name is a valid value.
If you change this property you also need to change your authentication method configuration correspondingly.
Common values are:
uid: The uid attribute is commonly used with Ubisecure Directory.sAMAccountName: The sAMAccountName attribute is commonly used with Active Directory. This is also the default value if Active Directory is used as the user information storage.mail: The mail attribute is commonly used with both Ubisecure Directory and Active Directory.
Default is uid.
Example:
general.login.attribute = uidgeneral.group.samaccountname.generation
This property defines how the sAMAccountName attribute for a group is generated in Active Directory. Valid values are
auto: Active Directory generates the sAMAccountName attribute automaticallyrandom: A random string is generatedreadable: The first 15 letters come from the CN and the last 5 are random to achieve uniqueness.
Default is random.
Example:
general.group.samaccountname.generation = randomgeneral.admin.organization.roles.restricted
This property defines roles that can be assigned only to users who are in the same organization. In the example below, the user can only get the OrganizationMainUser role in his/her home organization. When you give several values, use the roles' relative name values and separate them with commas.
Default is <empty>.
Example:
general.admin.organization.roles.restricted = OrganizationMainUsergeneral.admin.organization.roles.protected
This property defines a list of roles that cannot be deleted from organizations.
Default is eIDMMainUser, OrganizationAdmin, OrganizationMainUser, OrganizationMandates, OrganizationOwner.
Example:
general.admin.organization.roles.protected = eIDMMainUser, OrganizationAdmin, OrganizationMainUser, OrganizationMandates, OrganizationOwnergeneral.admin.organization.roles.reservednames
This property defines a list of role names that cannot be given to a role when creating a new role.
Default is OrganizationMainUser, OrganizationOwner, OrganizationMandates.
Example:
general.admin.organization.roles.reservednames = SuperUsergeneral.admin.organization.users.includerolemembers
This property defines whether users should be included in the organization user list by role memberships or only by user's location. It also defines if mandate delegation is possible for those users in the same organization. There are two possible values:
true: Users are members in organizations if they have received a role or a mandate delegation from the organization.
false: Users are members in organizations if they are directly stored in them.
Default is false.
Example:
general.admin.organization.users.includerolemembers = truegeneral.admin.user.roles.protected
This property defines a list of roles that cannot be removed from users.
Default is <empty>.
Example:
general.admin.user.roles.protected = OrganizationMainUsergeneral.user.self.enable.account
This property defines if the user is able to re-register to enable his/her account when the account is disabled.
Default is true.
Example:
general.user.self.enable.account = true
general.organization.name.oid
This property defines if company IDs are saved in OID format. Organizations' names that are company IDs are converted to OID format. There are two possible values:
true: Company IDs are saved in OID format.false: No conversion will be made.
Default is false.
Example:
general.organization.name.oid = falsegeneral.authprovider.enabled
This property can be used to disable authentication provider feature (saml.ap.custid authentication method), which is useful in registration workflows where user's became active automatically.
If the SAML AP authentication method is enabled you might want to hide it from the Ubisecure SSO login screen by modifying the used Ubisecure SSO template a little. You can use external method grouping for this purpose. What you need to do is described below:
In the template properties file set
usemethodgroupsto true.In the template properties file set
methodgroupsfor example to visibleexternalmethods.In the template properties file add the following new property:
visibleexternalmethods.membersand add the names of all the external methods that you want to be visible. For example like this:visibleexternalmethods.members = tupas.op.1, tupas.nordea.1
In the
uas_<locale code>.propertiesfiles define the corresponding language key:GROUP_VISIBLEEXTERNALMETHODS_TITLE. The value can be left empty if you don't want an additional title to be presented.
There are two possible values:
true: SAML AP is enabled.false: SAML AP is disabled.
Default is true.
Example:
general.authprovider.enabled = truegeneral.approval.reject.promptforreason
This property can be used to enforce or enable a free text reject message for the event of rejecting user applications. There are two possible values:
optional: The Reject button will display a modal window with a text area component where the reason for the rejection can be entered. Pressing the modal window's Reject button will complete the rejection whether the text area is filled or empty.required: The Reject button will display a modal window with a text area component where the reason for the rejection can be entered. Pressing the modal window's Reject button while the text area is empty will display an error message on the modal window and the action can only be completed when some text has been entered.
Default is optional.
Example:
general.approval.reject.promptforreason = requiredgeneral.accepted.origin.whitelist
This property defines a list of domains that are just accepted without any further examination when checking for CSRF issues.
Default is <empty>.
Example:
general.accepted.origin.whitelist = example.com, example.org