Skip to content

Commit fb7e19b

Browse files
authored
Merge pull request #21 from IBM-Security/v24.03-assets
IAG v24.03 release updates
2 parents 81d43dd + 20a2085 commit fb7e19b

File tree

220 files changed

+2146
-2049
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

220 files changed

+2146
-2049
lines changed

openapi/advanced.yaml

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -14,23 +14,26 @@ advanced:
1414
1515
This entry is an array and can be used to specify multiple tuning
1616
parameters.
17-
18-
19-
Example:
20-
21-
advanced:
22-
configuration:
23-
- stanza: server
24-
entry: web-http-port
25-
operation: set
26-
value: ["80"]
27-
- stanza: server
28-
entry: web-https-port
29-
operation: set
30-
value: ["443"]
17+
x-examples:
18+
- advanced:
19+
configuration:
20+
- stanza: server
21+
entry: web-http-port
22+
operation: set
23+
value: ["80"]
24+
- stanza: server
25+
entry: web-https-port
26+
operation: set
27+
value: ["443"]
3128
type: array
3229
items:
30+
title: AdvancedConfiguration
3331
type: object
32+
x-openapi-required:
33+
- stanza
34+
- entry
35+
- operation
36+
- value
3437
properties:
3538
stanza:
3639
description: >

openapi/authorization.yaml

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -40,15 +40,18 @@ authorization:
4040
(AZN_CRED_PRINCIPAL_NAME = "user_a") | Match when the credential attribute "AZN_CRED_PRINCIPAL_NAME" is equal to "user_a".
4141
4242
43-
Example:
44-
45-
authorization:
46-
rules:
47-
- name: ruleA
48-
rule: (any groupIds = "administrator")
43+
x-examples:
44+
- authorization:
45+
rules:
46+
- name: ruleA
47+
rule: (any groupIds = "administrator")
4948
type: array
5049
items:
50+
title: AuthorizationRules
5151
type: object
52+
x-openapi-required:
53+
- name
54+
- rule
5255
properties:
5356
name:
5457
description: >

openapi/ci_oidc.yaml

Lines changed: 20 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -81,29 +81,26 @@ ci_oidc:
8181
When an ID token is received each claim will be evaluated against each rule in sequence until a match is found.
8282
The corresponding code (+|-) will then be used to determine whether the claim will be added to the credential or not.
8383
If the claim name does not match a configured rule it will by default be added to the credential.
84-
85-
86-
Example:
87-
88-
identity:
89-
ci_oidc:
90-
hostname: www.test.com
91-
client_id: 11111111-2222-3333-4444-5a5a5a5a5a5a5a
92-
client_secret: 1a2b3c4d5e
93-
mapped_identity: "{sub}"
94-
redirect_uri_host: www.test2.com
95-
response_type: code
96-
response_mode: query
97-
proxy: https://www.testproxy.com:443
98-
scopes:
99-
- profile
100-
- email
101-
allowed_query_args:
102-
- "oidc_test=value"
103-
bearer_token_attrs:
104-
- "-access_token"
105-
id_token_attrs:
106-
- "-email"
84+
x-examples:
85+
- identity:
86+
ci_oidc:
87+
hostname: www.test.com
88+
client_id: 11111111-2222-3333-4444-5a5a5a5a5a5a5a
89+
client_secret: 1a2b3c4d5e
90+
mapped_identity: "{sub}"
91+
redirect_uri_host: www.test2.com
92+
response_type: code
93+
response_mode: query
94+
proxy: https://www.testproxy.com:443
95+
scopes:
96+
- profile
97+
- email
98+
allowed_query_args:
99+
- "oidc_test=value"
100+
bearer_token_attrs:
101+
- "-access_token"
102+
id_token_attrs:
103+
- "-email"
107104
type: object
108105
x-name: CI OIDC (deprecated)
109106
properties:

openapi/eai.yaml

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -20,19 +20,20 @@ eai:
2020
also have the same protocol (http[s] = TCP/SSL) and have the
2121
same `virtual-host-name` and `port` as the trigger.
2222
23-
Example:
24-
25-
identity:
26-
eai:
27-
triggers:
28-
# Path-based application
29-
- /auth_app/login_complete
30-
- /auth_app/login_complete_v2
31-
# Virtual Host application
32-
- https://auth.ibm.com:9443/eai/login
33-
- https://auth.ibm.com:9443/eai/login_v2
23+
x-examples:
24+
- identity:
25+
eai:
26+
triggers:
27+
# Path-based application
28+
- /auth_app/login_complete
29+
- /auth_app/login_complete_v2
30+
# Virtual Host application
31+
- https://auth.ibm.com:9443/eai/login
32+
- https://auth.ibm.com:9443/eai/login_v2
3433
type: object
3534
x-name: EAI
35+
x-openapi-required:
36+
- triggers
3637
properties:
3738
triggers:
3839
description: >

openapi/identity.yaml

Lines changed: 71 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -13,23 +13,20 @@ identity:
1313
1414
If an OIDC identity source is configured, this entry will default to
1515
the OIDC authentication URI "/pkmsoidc?iss=default".
16-
17-
18-
Example:
19-
20-
identity:
21-
auth_challenge_redirect:
22-
url: /eai/login_start
23-
parameters:
24-
- source: macro
25-
value: HOSTNAME
26-
name: host
27-
- source: credential
28-
value: AZN_CRED_NETWORK_ADDRESS_STR
29-
name: origin
30-
- source: header
31-
value: X-IBM-Proxy
32-
name: proxy
16+
x-examples:
17+
- identity:
18+
auth_challenge_redirect:
19+
url: /eai/login_start
20+
parameters:
21+
- source: macro
22+
value: HOSTNAME
23+
name: host
24+
- source: credential
25+
value: AZN_CRED_NETWORK_ADDRESS_STR
26+
name: origin
27+
- source: header
28+
value: X-IBM-Proxy
29+
name: proxy
3330
type: object
3431
properties:
3532
url:
@@ -44,7 +41,11 @@ identity:
4441
query string arguments.
4542
type: array
4643
items:
44+
title: IdentityAuthChallengeRedirectParameters
4745
type: object
46+
x-openapi-required:
47+
- source
48+
- value
4849
properties:
4950
source:
5051
description: >
@@ -89,23 +90,20 @@ identity:
8990
These entries can be used to override the default post authentication
9091
URL which clients will be redirected to once they have successfully
9192
authenticated.
92-
93-
94-
Example:
95-
96-
identity:
97-
auth_complete_redirect:
98-
url: /landing
99-
parameters:
100-
- source: macro
101-
value: HOSTNAME
102-
name: host
103-
- source: credential
104-
value: AZN_CRED_NETWORK_ADDRESS_STR
105-
name: origin
106-
- source: header
107-
value: X-IBM-Proxy
108-
name: proxy
93+
x-examples:
94+
- identity:
95+
auth_complete_redirect:
96+
url: /landing
97+
parameters:
98+
- source: macro
99+
value: HOSTNAME
100+
name: host
101+
- source: credential
102+
value: AZN_CRED_NETWORK_ADDRESS_STR
103+
name: origin
104+
- source: header
105+
value: X-IBM-Proxy
106+
name: proxy
109107
type: object
110108
properties:
111109
url:
@@ -120,7 +118,11 @@ identity:
120118
query string arguments.
121119
type: array
122120
items:
121+
title: IdentityAuthCompleteRedirectParameters
123122
type: object
123+
x-openapi-required:
124+
- source
125+
- value
124126
properties:
125127
source:
126128
description: >
@@ -158,7 +160,10 @@ identity:
158160
type: string
159161

160162
oidc:
161-
$ref: "oidc.yaml#/oidc"
163+
title: Oidc
164+
type: array
165+
items:
166+
$ref: "oidc.yaml#/oidc"
162167
oauth:
163168
description: |
164169
The configuration entries in this section allow the reverse proxy to accept an OAuth bearer token and use the configured OAuth introspection endpoints to validate the token and create an authenticated session.
@@ -184,40 +189,37 @@ identity:
184189
When an introspection response token is received each JSON data element will be evaluated against each rule in sequence until a match is found.
185190
The corresponding code (+|-) will then be used to determine whether the JSON data will be added to the credential or not.
186191
If the JSON data name does not match a configured rule it will by default be added to the credential.
187-
188-
189-
Example:
190-
191-
identity:
192-
oauth:
193-
- name: verify_introspection
194-
restricted: false
195-
introspection_endpoint: https://ibm-app-gw.verify.ibm.com/v1.0/endpoint/default/introspect
196-
client_id: 11111111-2222-3333-4444-5a5a5a5a5a5a5a
197-
client_secret: 1a2b3c4d5e
198-
auth_method: client_secret_post
199-
proxy: https://www.testproxy.com:443
200-
token_type_hint: "access_token"
201-
ssl:
202-
certificate:
203-
- "@www-test-com-ca.pem"
204-
mapped_identity: "{sub}"
205-
attributes:
206-
- "+scope"
207-
- "+client_id"
208-
- "+iat"
209-
- "+exp"
210-
multi_valued_scope: true
211-
headers:
212-
- source: header
213-
value: host
214-
name: X-Forwarded-For
215-
- source: credential
216-
value: AZN_CRED_NETWORK_ADDRESS_STR
217-
name: origin
218-
- source: text
219-
value: green
220-
name: X-Deployment-Status
192+
x-examples:
193+
- identity:
194+
oauth:
195+
- name: verify_introspection
196+
restricted: false
197+
introspection_endpoint: https://ibm-app-gw.verify.ibm.com/v1.0/endpoint/default/introspect
198+
client_id: 11111111-2222-3333-4444-5a5a5a5a5a5a5a
199+
client_secret: 1a2b3c4d5e
200+
auth_method: client_secret_post
201+
proxy: https://www.testproxy.com:443
202+
token_type_hint: "access_token"
203+
ssl:
204+
certificate:
205+
- "@www-test-com-ca.pem"
206+
mapped_identity: "{sub}"
207+
attributes:
208+
- "+scope"
209+
- "+client_id"
210+
- "+iat"
211+
- "+exp"
212+
multi_valued_scope: true
213+
headers:
214+
- source: header
215+
value: host
216+
name: X-Forwarded-For
217+
- source: credential
218+
value: AZN_CRED_NETWORK_ADDRESS_STR
219+
name: origin
220+
- source: text
221+
value: green
222+
name: X-Deployment-Status
221223

222224
type: array
223225
items:

0 commit comments

Comments
 (0)