realm.json 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149
  1. {
  2. "realm": "${realm_name}",
  3. "enabled": true,
  4. "sslRequired": "external",
  5. "registrationAllowed": false,
  6. "registrationEmailAsUsername": false,
  7. "rememberMe": false,
  8. "verifyEmail": false,
  9. "resetPasswordAllowed": false,
  10. "requiredCredentials": [
  11. "password"
  12. ],
  13. "clients": [
  14. {
  15. "clientId": "https://console.cloud.yandex.ru/federations/${federation_id}",
  16. "baseUrl": "https://console.cloud.yandex.ru/federations/${federation_id}",
  17. "enabled": true,
  18. "redirectUris": [
  19. "https://console.cloud.yandex.ru/federations/${federation_id}"
  20. ],
  21. "webOrigins": [
  22. "https://console.cloud.yandex.ru"
  23. ],
  24. "bearerOnly": false,
  25. "consentRequired": false,
  26. "standardFlowEnabled": true,
  27. "implicitFlowEnabled": false,
  28. "directAccessGrantsEnabled": false,
  29. "serviceAccountsEnabled": false,
  30. "publicClient": false,
  31. "frontchannelLogout": true,
  32. "protocol": "saml",
  33. "attributes": {
  34. "saml_idp_initiated_sso_relay_state": "https://console.cloud.yandex.ru/federations/${federation_id}",
  35. "saml.force.post.binding": "true",
  36. "saml.multivalued.roles": "false",
  37. "frontchannel.logout.session.required": "false",
  38. "oauth2.device.authorization.grant.enabled": "false",
  39. "backchannel.logout.revoke.offline.tokens": "false",
  40. "saml.server.signature.keyinfo.ext": "false",
  41. "use.refresh.tokens": "true",
  42. "saml.signing.certificate": "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",
  43. "oidc.ciba.grant.enabled": "false",
  44. "backchannel.logout.session.required": "false",
  45. "client_credentials.use_refresh_token": "false",
  46. "saml.signature.algorithm": "RSA_SHA256",
  47. "require.pushed.authorization.requests": "false",
  48. "saml.client.signature": "true",
  49. "saml.allow.ecp.flow": "false",
  50. "saml.server.signature.keyinfo.xmlSigKeyInfoKeyNameTransformer": "CERT_SUBJECT",
  51. "id.token.as.detached.signature": "false",
  52. "saml.assertion.signature": "true",
  53. "saml.encrypt": "true",
  54. "saml.server.signature": "true",
  55. "exclude.session.state.from.auth.response": "false",
  56. "saml.artifact.binding": "false",
  57. "saml_force_name_id_format": "false",
  58. "acr.loa.map": "{}",
  59. "saml.encryption.certificate": "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",
  60. "tls.client.certificate.bound.access.tokens": "false",
  61. "saml.authnstatement": "true",
  62. "display.on.consent.screen": "false",
  63. "saml_name_id_format": "username",
  64. "token.response.type.bearer.lower-case": "false",
  65. "saml.onetimeuse.condition": "false",
  66. "saml_signature_canonicalization_method": "http://www.w3.org/2001/10/xml-exc-c14n#"
  67. },
  68. "authenticationFlowBindingOverrides": {},
  69. "fullScopeAllowed": true,
  70. "nodeReRegistrationTimeout": -1,
  71. "protocolMappers": [
  72. {
  73. "name": "role list",
  74. "protocol": "saml",
  75. "protocolMapper": "saml-role-list-mapper",
  76. "consentRequired": false,
  77. "config": {
  78. "single": "true",
  79. "attribute.nameformat": "Basic",
  80. "attribute.name": "Role"
  81. }
  82. },
  83. {
  84. "name": "X500 email",
  85. "protocol": "saml",
  86. "protocolMapper": "saml-user-property-mapper",
  87. "consentRequired": false,
  88. "config": {
  89. "attribute.nameformat": "urn:oasis:names:tc:SAML:2.0:attrname-format:uri",
  90. "user.attribute": "email",
  91. "friendly.name": "email",
  92. "attribute.name": "urn:oid:1.2.840.113549.1.9.1"
  93. }
  94. },
  95. {
  96. "name": "X500 givenName",
  97. "protocol": "saml",
  98. "protocolMapper": "saml-user-property-mapper",
  99. "consentRequired": false,
  100. "config": {
  101. "attribute.nameformat": "urn:oasis:names:tc:SAML:2.0:attrname-format:uri",
  102. "user.attribute": "firstName",
  103. "friendly.name": "givenName",
  104. "attribute.name": "urn:oid:2.5.4.42"
  105. }
  106. },
  107. {
  108. "name": "X500 surname",
  109. "protocol": "saml",
  110. "protocolMapper": "saml-user-property-mapper",
  111. "consentRequired": false,
  112. "config": {
  113. "attribute.nameformat": "urn:oasis:names:tc:SAML:2.0:attrname-format:uri",
  114. "user.attribute": "lastName",
  115. "friendly.name": "surname",
  116. "attribute.name": "urn:oid:2.5.4.4"
  117. }
  118. }
  119. ],
  120. "defaultClientScopes": [
  121. "role_list"
  122. ],
  123. "optionalClientScopes": []
  124. }
  125. ],
  126. "clientScopes": [
  127. {
  128. "name": "role_list",
  129. "description": "SAML role list",
  130. "protocol": "saml",
  131. "protocolMappers": [
  132. {
  133. "name": "role list",
  134. "protocol": "saml",
  135. "protocolMapper": "saml-role-list-mapper",
  136. "consentRequired": false,
  137. "config": {
  138. "single": "true",
  139. "attribute.nameformat": "Basic",
  140. "attribute.name": "Role"
  141. }
  142. }
  143. ]
  144. }
  145. ],
  146. "internationalizationEnabled": false,
  147. "supportedLocales": []
  148. }