Skip to content

Commit 44e5949

Browse files
committed
update umapi and admin console configs to use S2S
1 parent 17ccad4 commit 44e5949

File tree

2 files changed

+18
-72
lines changed

2 files changed

+18
-72
lines changed

examples/config files - basic/connector-adobe-console.yml

Lines changed: 5 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@
99
# While you are at it, you will likely want to remove a lot of this commentary,
1010
# in order to enhance the readability of your file.
1111

12+
authentication_method: oauth
13+
1214
# (optional) UMAPI server settings (defaults as shown)
1315
# The host and endpoint settings specify the Adobe endpoints which
1416
# host the UMAPI services and those which provide authorization.
@@ -22,58 +24,30 @@
2224
server:
2325
#host: usermanagement.adobe.io
2426
#endpoint: /v2/usermanagement
25-
#ims_host: ims-na1.adobelogin.com
26-
#ims_endpoint_jwt: /ims/exchange/jwt
27+
#auth_host: ims-na1.adobelogin.com
28+
#auth_endpoint: /ims/exchange/jwt
2729
#timeout: 120
2830
#retries: 3
2931

3032
# (required) integration settings
3133
# You must specify all five of these settings. Consult the
3234
# Adobe UMAPI documentation and the Adobe I/O Console to determine
3335
# the correct settings for your enterprise organization.
34-
# [NOTE: the priv_key_path setting can be an absolute or relative pathname;
35-
# if relative, it is interpreted relative to this configuration file.]
3636
integration:
3737
org_id: "Org ID goes here"
3838
client_id: "Client ID goes here"
3939
client_secret: "Client secret goes here"
40-
tech_acct_id: "Tech account ID goes here"
41-
priv_key_path: "private.key"
42-
43-
# (optional) As an alternative to priv_key_path, you can place the private key
44-
# data directly in this file. To do this, remove the priv_key_path entry above
45-
# and uncomment the following entry. Replace the sample data with the data
46-
# from your private key file (which will be much longer).
47-
#priv_key_data: |
48-
# -----BEGIN RSA PRIVATE KEY-----
49-
# MIIf74jfd84oAgEA6brj4uZ2f1Nkf84j843jfjjJGHYJ8756GHHGGz7jLyZWSscH
50-
# CoifurKJY763GHKL98mJGYxWSBvhlWskdjdatagoeshere986fKFUNGd74kdfuEH
51-
# -----END RSA PRIVATE KEY-----
5240

5341
# (optional) You can store credentials in the operating system credential store
5442
# (Windows Credential Manager, Mac Keychain, Linux Freedesktop Secret Service
5543
# or KWallet - these will be built into the Linux distribution).
5644
# To use this feature, uncomment the following entries and remove the
57-
#client_id, client_secret, and priv_key_data above.
45+
#client_id, and client_secret above.
5846
# The actual credential values are placed in the credential store with the
5947
# username as the org_id value, and the key name (perhaps called internet
6048
# or network address) as one of the values below.
6149
#secure_client_id_key: umapi_client_id
6250
#secure_client_secret_key: umapi_client_secret
63-
#secure_priv_key_data_key: umapi_private_key_data
64-
# Note: the Windows credential store generally can't store data as large as a private
65-
# key, so the recommended path for securing your private key on windows is given next.
66-
67-
# (optional): You can secure your private key data by encrypting it, as with
68-
# openssl pkcs8 -in private.key -topk8 -v2 des3 -out private-encrypted.key
69-
# which prompts for a passphrase and creates a passphrase-encrypted file in PKCS#8 format.
70-
# Having done this, you can use the setting priv_key_pass to specify the passphrase needed
71-
# by User Sync to decrypt the private key file (or private key data), as in:
72-
#priv_key_pass: "my passphrase for my private key"
73-
# For better security, you should save your passphrase into the secure credential store
74-
# on your platform (username = your org ID, service/internet address = "umapi_private_key_passphrase")
75-
# and then uncomment this setting:
76-
#secure_priv_key_pass_key: umapi_private_key_passphrase
7751

7852
# (optional) identity_type_filter (default value is all)
7953
# By default, connector will automatically load users from all identity type to be load as directory users.

examples/config files - basic/connector-umapi.yml

Lines changed: 13 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,16 @@
99
# While you are at it, you will likely want to remove a lot of this commentary,
1010
# in order to enhance the readability of your file.
1111

12+
authentication_method: oauth
13+
14+
# (optional) ssl_verify
15+
# Allows you to disable the SSL verification used by the requests module. This can
16+
# come in handy for troubleshooting or working around network / proxy related issues when
17+
# the following error is encountered:
18+
# 'UMAPI connection to org id failed: [SSL: CERTIFICATE_VERIFY_FAILED]'
19+
# It is recommended to leave this set to default (True), since it leaves UST potentially
20+
# vulnerable to middle man attacks and set to False only if absolutely needed.
21+
1222
# (optional) UMAPI server settings (defaults as shown)
1323
# The host and endpoint settings specify the Adobe endpoints which
1424
# host the UMAPI services and those which provide authorization.
@@ -19,68 +29,30 @@
1929
# alternate values by Adobe as part of a support engagement. It is
2030
# highly recommended that you leave these values commented out
2131
# so that the default values are guaranteed to be used.
22-
23-
# (optional) ssl_verify
24-
# Allows you to disable the SSL verification used by the requests module. This can
25-
# come in handy for troubleshooting or working around network / proxy related issues when
26-
# the following error is encountered:
27-
28-
# 'UMAPI connection to org id failed: [SSL: CERTIFICATE_VERIFY_FAILED]'
29-
30-
# It is recommended to leave this set to default (True), since it leaves UST potentially
31-
# vulnerable to middle man attacks and set to False only if absolutely needed.
3232
server:
3333
#host: usermanagement.adobe.io
3434
#endpoint: /v2/usermanagement
35-
#ims_host: ims-na1.adobelogin.com
36-
#ims_endpoint_jwt: /ims/exchange/jwt
35+
#auth_host: ims-na1.adobelogin.com
36+
#auth_endmpoint: /ims/exchange/jwt
3737
#timeout: 120
3838
#retries: 3
3939

4040
# (required) enterprise organization settings
4141
# You must specify all five of these settings. Consult the
4242
# Adobe UMAPI documentation and the Adobe I/O Console to determine
4343
# the correct settings for your enterprise organization.
44-
# [NOTE: the priv_key_path setting can be an absolute or relative pathname;
45-
# if relative, it is interpreted relative to this configuration file.]
4644
enterprise:
4745
org_id: "Org ID goes here"
4846
client_id: "Client ID goes here"
4947
client_secret: "Client secret goes here"
50-
tech_acct_id: "Tech account ID goes here"
51-
priv_key_path: "private.key"
52-
53-
# (optional) As an alternative to priv_key_path, you can place the private key
54-
# data directly in this file. To do this, remove the priv_key_path entry above
55-
# and uncomment the following entry. Replace the sample data with the data
56-
# from your private key file (which will be much longer).
57-
#priv_key_data: |
58-
# -----BEGIN RSA PRIVATE KEY-----
59-
# MIIf74jfd84oAgEA6brj4uZ2f1Nkf84j843jfjjJGHYJ8756GHHGGz7jLyZWSscH
60-
# CoifurKJY763GHKL98mJGYxWSBvhlWskdjdatagoeshere986fKFUNGd74kdfuEH
61-
# -----END RSA PRIVATE KEY-----
6248

6349
# (optional) You can store credentials in the operating system credential store
6450
# (Windows Credential Manager, Mac Keychain, Linux Freedesktop Secret Service
6551
# or KWallet - these will be built into the Linux distribution).
6652
# To use this feature, uncomment the following entries and remove the
67-
# client_id, client_secret, and priv_key_data above.
53+
# client_id, and client_secret above.
6854
# The actual credential values are placed in the credential store with the
6955
# username as the org_id value, and the key name (perhaps called internet
7056
# or network address) as one of the values below.
7157
#secure_client_id_key: umapi_client_id
7258
#secure_client_secret_key: umapi_client_secret
73-
#secure_priv_key_data_key: umapi_private_key_data
74-
# Note: the Windows credential store generally can't store data as large as a private
75-
# key, so the recommended path for securing your private key on windows is given next.
76-
77-
# (optional): You can secure your private key data by encrypting it, as with
78-
# openssl pkcs8 -in private.key -topk8 -v2 des3 -out private-encrypted.key
79-
# which prompts for a passphrase and creates a passphrase-encrypted file in PKCS#8 format.
80-
# Having done this, you can use the setting priv_key_pass to specify the passphrase needed
81-
# by User Sync to decrypt the private key file (or private key data), as in:
82-
#priv_key_pass: "my passphrase for my private key"
83-
# For better security, you should save your passphrase into the secure credential store
84-
# on your platform (username = your org ID, service/internet address = "umapi_private_key_passphrase")
85-
# and then uncomment this setting:
86-
#secure_priv_key_pass_key: umapi_private_key_passphrase

0 commit comments

Comments
 (0)