Standard authentication using standard Spring authentication mechanism. No extra actions needed to use it, it is available by default.
Default authentication using a standard Spring authentication mechanism. No extra actions are needed to use it, it is available by default. You can choose from the following password encoder security algorithms:
To select a pbkdf2 algorithms, you must set hyperon.security.basic.password-encoder property in the application.properties file as follows:
What's more, you can choose the complexity of bcrypt algorithm. In order to do that, a hyperon.security.basic.bcrypt.complexity property in the application.properties must be set. Values between 4 and 31 are accepted, 5 is used by default. The bigger the value the safer algorithm is, but the performance impact is also increasing.
To use Active Directory authentication, 4 properties must be specified in application.properties file:
Also for versions 1.X.X hyperon.runtime-test.security.type environment variable must be set to "ad".
Hyperon supports role management. Roles defined in Active Directory must be compatible with roles in Hyperon structure.
It is possible to create own roles in AD but remember to create same roles in Hyperon structure. It's necessary to proper authentication process.
For Hyperon runtime application set hyperon.runtime-rest.security.type=jwt property.
To use JWT Token authentication, a hyperon.security.jwt.secret-key property must be set in Hyperon Studio's application.properties file as well as Hyperon Runtime REST. What's more, it must be the same key in both places.
You can generate a new token in Hyperon Studio. A view to see all existing tokens as well as a button to generate a new one can be found in Menu's Tools tab. When creating a new token, you can specify the expiry date. Admin users may also specify a user that a newly generated token will be assigned to.
To use generated token in REST API calls, you need to add an Authorization header with the following format:
Authorization: Bearer your_jwt_token
for example:
Authorization: Bearer eyJhbGciOiJIUzI1N