External Authentication Site Parameters
Following are the external authentication site parameters:
|
Parameter |
Description |
|---|---|
|
ALLOW_HTTP_METHOD_OVERRIDE |
This parameter controls whether to allow REST API requests with X-HTTP-Method-Override header. If this parameter is set to Y, REST API requests with X-HTTP-Method-Override header are allowed. If this parameter is set to N or is not defined, REST API requests with X-HTTP-Method-Override header are not allowed. The default is N. |
|
ALLOW_WEBUI_HTTP_METHOD_OVERRIDE |
This parameter controls whether to allow HTTP method override. If this parameter is set to Y, HTTP method can be overridden. If this parameter is set to N or is not defined, HTTP method override is not allowed. The default is N. |
| EXTERNAL_AUTH_MODE |
Determines if external authentication is invoked (Y). Default: N This parameter can be set in the Authentication Settings screen. Note: Configure other parameters before switching OpenText Application Quality Management to external authentication mode, otherwise you can lose OpenText Application Quality Management connectivity. |
| EXTERNAL_AUTH_HEADER_NAME |
The name of the header in the HTTP request that contains the string from which OpenText Application Quality Management extracts the user search key for the external authentication. This parameter is used for SSO authentication. Default: SM_USER Note: This parameter and EXTERNAL_AUTH_CERT_HEADER_NAME cannot both be set. |
| EXTERNAL_AUTH_CERT_HEADER_NAME |
The name of the header in the HTTP request that contains the PEM encoded public client certificate from which OpenText Application Quality Management extracts the user search key for the external authentication. ALM extracts the user search key from the subject field of the certificate. This parameter is used for smart card authentication. Default: CERT Note: This parameter and EXTERNAL_AUTH_HEADER_NAME cannot both be set. |
| EXTERNAL_AUTH_TYPE | Set this parameter to CAC for smart card authentication. |
| EXTERNAL_AUTH_USER_FIELD_TYPE |
Determines how the user is identified in the external authentication data (email, name, or email+name). Default: email+name This parameter can be set in the External Authentication Advanced Settings screen. |
| EXTERNAL_AUTH_USER_FIELD_PATTERN |
Determines how to extract authentication data from the HTTP header specified by the EXTERNAL_AUTH_HEADER_NAME or the EXTERNAL_AUTH_CERT_HEADER_NAME parameter. Default:
This parameter can be set in the External Authentication Advanced Settings screen. |
| EXTERN_AUTH_VALIDATE_USER_IN_LDAP |
Determines whether OpenText Application Quality Management contacts the LDAP server (if it exists) to ensure that this user is active. Default: N |
| EXTERNAL_AUTH_CERTIFICATES_FILE |
The name of the file that holds all the CA and Intermediate certificates trusted by ALM. The file must contain PEM format concatenated certificates. |
| EXTERNAL_AUTH_CERTIFICATE_CRL_CHECK |
Determines whether to enable or disable the online certificate revocation list (CRL) check. Default: Y Note: For smart card authentication, if the online certification revocation list (CRLDP) is required, set this parameter to Y. |
| EXTERNAL_AUTH_CERTIFICATE_LOCAL_CRL_CHECK |
Determines whether to enable or disable the local CRL check. Default: Y |
| EXTERNAL_AUTH_MATCH_DELTACRL_BY_ISSUER |
Determines OpenText Application Quality Management behavior when the folder in EXTERNAL_AUTH_CERTIFICATE_CRL_FOLDER contains delta CRL files without base CRL files. If this parameter is valued with Y, login is disabled for users if the delta CRL file is issued by same issuer. If this parameter is valued with N, then login is disabled even if there is one delta CRL file in the folder. Default: Y |
| EXTERNAL_AUTH_CERTIFICATE_CRL_FOLDER |
The full path to the folder containing the CRL files. Note: For smart card authentication, if delta CRL validation is needed, value this parameter with the location of the folder on the server that contains the CRL files. This parameter does not replace the parameter in the Apache configuration file. Both Apache and the ALM server check the CRL files. |
| EXTERNAL_AUTH_CERTIFICATE_DATE_CHECK |
Determines whether to enable or disable the certificate date check. Default: Y |
| EXTERNAL_AUTH_CERTIFICATE_POLICY_CHECK |
Determines whether to enable or disable the certificate policy check. Default: Y |
| EXTERNAL_AUTH_CERTIFICATE_VALID_POLICY |
The list of valid certificate policy IDs. Note: For smart card authentication, if certificate policy validation is needed, value this parameter. |
| EXTERNAL_AUTH_IS_POLICY_REQUIRED |
Determines if each client certificate is required to have a policy. Default: Y Note: If the value is Y, each client certificate must have a valid policy which matches the EXTERNAL_AUTH_CERTIFICATE_VALID_POLICY parameter. If the value is N, the client certificate does not need to have a policy. However, whenever a policy is defined in the certificate, it must always match the EXTERNAL_AUTH_CERTIFICATE_VALID_POLICY. |
| EXTERNAL_AUTH_HARDWARE_CARD_IS_REQUIRED |
Determines whether each client certificate is required to have a hardware extended key (relevant for Interactive and Not Specified client execution modes). Default: Y |
| EXTERNAL_AUTH_EXTENDED_HARDWARE_KEYS |
The valid hardware extended keys, separated by commas. Default: 1.3.6.1.4.1.311.20.2.2 |
| EXTERNAL_AUTH_EXECUTION_MODE_HEADER_NAME |
The name of the header in the HTTP request that holds the execution mode of the client (NOT_SPECIFIED, INTERACTIVE, NON_INTERACTIVE). Default: NOT_SPECIFIED |
| EXTERNAL_AUTH_CERTIFICATE_OCSP_CHECK |
Determines whether to enable or disable the online certificate status protocol (OCSP) check. Default: N |
| EXTERNAL_AUTH_CERTIFICATE_OCSP_REQUIRED |
Determines whether each client certificate is required to have an OCSP link. Default: Y |

