diff --git a/bundles.yml b/bundles.yml index 9e44418..b409794 100644 --- a/bundles.yml +++ b/bundles.yml @@ -1,13 +1,12 @@ schemaVersion: "1.0" bundles: -- "nevisadmin-plugin-nevisproxy:8.2405.0.6" -- "nevisadmin-plugin-base-generation:8.2405.0.6" -- "nevisadmin-plugin-nevisdetect:8.2405.0.6" -- "nevisadmin-plugin-marketplace:8.2405.0.6" -- "nevisadmin-plugin-mobile-auth:8.2405.0.6" -- "nevisadmin-plugin-authcloud:8.2405.0.6" -- "nevisadmin-plugin-nevisdp:8.2405.0.6" -- "nevisadmin-plugin-fido2:8.2405.0.6" -- "nevisadmin-plugin-nevisidm:8.2405.0.6" -- "nevisadmin-plugin-oauth:8.2405.0.6" -- "nevisadmin-plugin-nevisauth:8.2405.0.6" +- "nevisadmin-plugin-oauth:8.2405.3.0" +- "nevisadmin-plugin-authcloud:8.2405.3.0" +- "nevisadmin-plugin-nevisidm:8.2405.3.0" +- "nevisadmin-plugin-mobile-auth:8.2405.3.0" +- "nevisadmin-plugin-fido2:8.2405.3.0" +- "nevisadmin-plugin-nevisdp:8.2405.3.0" +- "nevisadmin-plugin-nevisauth:8.2405.3.0" +- "nevisadmin-plugin-nevisproxy:8.2405.3.0" +- "nevisadmin-plugin-nevisdetect:8.2405.3.0" +- "nevisadmin-plugin-base-generation:8.2405.3.0" diff --git a/patterns/5f192f6e91687b30b5868750_authStatesFile/ob-realm-dispatch-cred-type.xml b/patterns/5f192f6e91687b30b5868750_authStatesFile/ob-realm-dispatch-cred-type.xml new file mode 100644 index 0000000..93198a1 --- /dev/null +++ b/patterns/5f192f6e91687b30b5868750_authStatesFile/ob-realm-dispatch-cred-type.xml @@ -0,0 +1,12 @@ + + + + + + + + + + + + \ No newline at end of file diff --git a/patterns/_ob-realm-accessapp-registration_25bdd7e6f5b76694f6688ab8.yml b/patterns/_ob-realm-accessapp-registration_25bdd7e6f5b76694f6688ab8.yml new file mode 100644 index 0000000..e04f726 --- /dev/null +++ b/patterns/_ob-realm-accessapp-registration_25bdd7e6f5b76694f6688ab8.yml @@ -0,0 +1,14 @@ +schemaVersion: "1.0" +pattern: + id: "25bdd7e6f5b76694f6688ab8" + className: "ch.nevis.admin.v4.plugin.nevisfido.outofband.patterns.OutOfBandMobileRegistration" + name: " ob-realm-accessapp-registration" + properties: + host: + - "pattern://346a2bebb04a0b74c7c9b5b9" + onSuccess: + - "pattern://0955c277bc073d31fb27ef21" + onCancel: + - "pattern://e1784eecf2db74484dd1e1bb" + nevisfido: + - "pattern://d990accd4fedae1acbc7109d" diff --git a/patterns/agov-work-internal-trust-store_6d7b43fa096a87eaa1a44952.yml b/patterns/agov-work-internal-trust-store_6d7b43fa096a87eaa1a44952.yml new file mode 100644 index 0000000..3cb42ac --- /dev/null +++ b/patterns/agov-work-internal-trust-store_6d7b43fa096a87eaa1a44952.yml @@ -0,0 +1,7 @@ +schemaVersion: "1.0" +pattern: + id: "6d7b43fa096a87eaa1a44952" + className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.AutomaticTrustStoreProvider" + name: "agov-work-internal-trust-store" + properties: + truststoreFile: "var://agov-work-internal-trust-store-additional-trusted-certificates" diff --git a/patterns/b10d246bc151306dba28de4a_resources/readme.txt b/patterns/b10d246bc151306dba28de4a_resources/readme.txt new file mode 100644 index 0000000..95d09f2 --- /dev/null +++ b/patterns/b10d246bc151306dba28de4a_resources/readme.txt @@ -0,0 +1 @@ +hello world \ No newline at end of file diff --git a/patterns/be8f8436b2ec70e9d601fdd3_authStatesFile/ob-mock-me-auth-processor.xml b/patterns/be8f8436b2ec70e9d601fdd3_authStatesFile/ob-mock-me-auth-processor.xml new file mode 100644 index 0000000..7a2f748 --- /dev/null +++ b/patterns/be8f8436b2ec70e9d601fdd3_authStatesFile/ob-mock-me-auth-processor.xml @@ -0,0 +1,43 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/patterns/be8f8436b2ec70e9d601fdd3_resources/mock-me-processing.groovy b/patterns/be8f8436b2ec70e9d601fdd3_resources/mock-me-processing.groovy new file mode 100644 index 0000000..fb5db5e --- /dev/null +++ b/patterns/be8f8436b2ec70e9d601fdd3_resources/mock-me-processing.groovy @@ -0,0 +1,23 @@ +import ch.nevis.esauth.auth.engine.AuthResponse + +if (inargs['SAMLResponse']) { + response.setNote('SAMLResponse', inargs['SAMLResponse']) + request.getInArgs().remove('SAMLResponse') + response.setResult('processResponse') + return +} + + +if (inargs['back'] && inargs['back'] == 'go') { + response.setStatus(AuthResponse.AUTH_ERROR) + if (session['ch.nevis.auth.saml.assertion.authnContextClassRef'] && session['ch.nevis.auth.saml.assertion.authnContextClassRef'] == 'urn:qa.agov.ch:names:tc:ac:classes:recovery') { + response.setTransferDestination(parameters['idp-recovery-url']) + } else { + response.setTransferDestination(parameters['idp-sso-url']) + } + response.setIsRedirectTransfer(true) + return +} + +// if we reach this line, display the GUI +response.setStatus(AuthResponse.AUTH_CONTINUE) \ No newline at end of file diff --git a/patterns/nevisFido-techuser-key_540faa8b8de855d32f179dac.yml b/patterns/nevisFido-techuser-key_540faa8b8de855d32f179dac.yml new file mode 100644 index 0000000..411259c --- /dev/null +++ b/patterns/nevisFido-techuser-key_540faa8b8de855d32f179dac.yml @@ -0,0 +1,8 @@ +schemaVersion: "1.0" +pattern: + id: "540faa8b8de855d32f179dac" + className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.PemKeyStoreProvider" + name: "nevisFido-techuser-key" + properties: + keystoreFiles: "var://nevisfido-techuser-key-key-store-content" + keyPass: "var://nevisfido-techuser-key-private-key-passphrase" diff --git a/patterns/no-LoginRenderer_97ccf58a92ea008e353d6af7.yml b/patterns/no-LoginRenderer_97ccf58a92ea008e353d6af7.yml new file mode 100644 index 0000000..674b468 --- /dev/null +++ b/patterns/no-LoginRenderer_97ccf58a92ea008e353d6af7.yml @@ -0,0 +1,6 @@ +schemaVersion: "1.0" +pattern: + id: "97ccf58a92ea008e353d6af7" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.NevisProxyLogrend" + name: "no-LoginRenderer" + properties: {} diff --git a/patterns/ob-SecToken-for-work-IDM_1961ee3e6021268b5b99f355.yml b/patterns/ob-SecToken-for-work-IDM_1961ee3e6021268b5b99f355.yml new file mode 100644 index 0000000..165aa6d --- /dev/null +++ b/patterns/ob-SecToken-for-work-IDM_1961ee3e6021268b5b99f355.yml @@ -0,0 +1,6 @@ +schemaVersion: "1.0" +pattern: + id: "1961ee3e6021268b5b99f355" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.SecToken" + name: "ob-SecToken-for-work-IDM" + properties: {} diff --git a/patterns/ob-auth-log-settings_25dbf93ef96abab8182ebefc.yml b/patterns/ob-auth-log-settings_25dbf93ef96abab8182ebefc.yml new file mode 100644 index 0000000..234d250 --- /dev/null +++ b/patterns/ob-auth-log-settings_25dbf93ef96abab8182ebefc.yml @@ -0,0 +1,14 @@ +schemaVersion: "1.0" +pattern: + id: "25dbf93ef96abab8182ebefc" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.CustomAuthLogFile" + name: "ob-auth-log-settings" + properties: + logLevel: "WARN" + levels: + - Script: "DEBUG" + - OpTrace: "INFO" + - AuthEngine: "INFO" + - AuthPerf: "INFO" + - Vars: "INFO" + - HttpClient: "DEBUG" diff --git a/patterns/ob-auth-signer-trust-store_17743e3041d86717f2697c1c.yml b/patterns/ob-auth-signer-trust-store_17743e3041d86717f2697c1c.yml new file mode 100644 index 0000000..4726750 --- /dev/null +++ b/patterns/ob-auth-signer-trust-store_17743e3041d86717f2697c1c.yml @@ -0,0 +1,7 @@ +schemaVersion: "1.0" +pattern: + id: "17743e3041d86717f2697c1c" + className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.PemTrustStoreProvider" + name: "ob-auth-signer-trust-store" + properties: + truststoreFile: "var://ob-auth-signer-trust-store" diff --git a/patterns/ob-auth-signer_f94db670348c3abce35d473a.yml b/patterns/ob-auth-signer_f94db670348c3abce35d473a.yml new file mode 100644 index 0000000..9c53e15 --- /dev/null +++ b/patterns/ob-auth-signer_f94db670348c3abce35d473a.yml @@ -0,0 +1,8 @@ +schemaVersion: "1.0" +pattern: + id: "f94db670348c3abce35d473a" + className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.PemKeyStoreProvider" + name: "ob-auth-signer" + properties: + keystoreFiles: "var://ob-auth-signer-key-store" + keyPass: "var://ob-auth-signer-private-key-passphrase" diff --git a/patterns/ob-auth_d00b0dcbe241793d30daf91c.yml b/patterns/ob-auth_d00b0dcbe241793d30daf91c.yml new file mode 100644 index 0000000..2a2ca39 --- /dev/null +++ b/patterns/ob-auth_d00b0dcbe241793d30daf91c.yml @@ -0,0 +1,13 @@ +schemaVersion: "1.0" +pattern: + id: "d00b0dcbe241793d30daf91c" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.NevisAuthDeployable" + name: "ob-auth" + deploymentHosts: "ob-auth" + properties: + logging: + - "pattern://25dbf93ef96abab8182ebefc" + backendTrustStore: + - "pattern://6d7b43fa096a87eaa1a44952" + signerKeyStore: + - "pattern://f94db670348c3abce35d473a" diff --git a/patterns/ob-evisIDM-REST-Service_136d83ad842c5b255417cd87.yml b/patterns/ob-evisIDM-REST-Service_136d83ad842c5b255417cd87.yml new file mode 100644 index 0000000..0a0a0af --- /dev/null +++ b/patterns/ob-evisIDM-REST-Service_136d83ad842c5b255417cd87.yml @@ -0,0 +1,14 @@ +schemaVersion: "1.0" +pattern: + id: "136d83ad842c5b255417cd87" + className: "ch.nevis.admin.v4.plugin.nevisidm.patterns.NevisIDMRESTServiceAccess" + name: "ob-evisIDM-REST-Service" + properties: + host: + - "pattern://346a2bebb04a0b74c7c9b5b9" + nevisIDM: + - "pattern://30b947532c14be9f85f63a55" + realm: + - "pattern://a005869dc3d479c2323115d0" + token: + - "pattern://1961ee3e6021268b5b99f355" diff --git a/patterns/ob-fido-uaf-instance-settings_a3e412c0c4aaf7217c8f5994.yml b/patterns/ob-fido-uaf-instance-settings_a3e412c0c4aaf7217c8f5994.yml new file mode 100644 index 0000000..8640666 --- /dev/null +++ b/patterns/ob-fido-uaf-instance-settings_a3e412c0c4aaf7217c8f5994.yml @@ -0,0 +1,6 @@ +schemaVersion: "1.0" +pattern: + id: "a3e412c0c4aaf7217c8f5994" + className: "ch.nevis.admin.v4.plugin.nevisfido.deployable.patterns.GenericNevisFIDOSettings" + name: "ob-fido-uaf-instance-settings" + properties: {} diff --git a/patterns/ob-fido-uaf-log-settings_2c2ffee41da5095996e1f131.yml b/patterns/ob-fido-uaf-log-settings_2c2ffee41da5095996e1f131.yml new file mode 100644 index 0000000..9ae4028 --- /dev/null +++ b/patterns/ob-fido-uaf-log-settings_2c2ffee41da5095996e1f131.yml @@ -0,0 +1,10 @@ +schemaVersion: "1.0" +pattern: + id: "2c2ffee41da5095996e1f131" + className: "ch.nevis.admin.v4.plugin.nevisfido.deployable.patterns.NevisFIDOLogSettings" + name: "ob-fido-uaf-log-settings" + properties: + logLevel: "WARN" + levels: + - OpTrace: "INFO" + - ch.nevis.auth.fido.api.uaf: "DEBUG" diff --git a/patterns/ob-fido-uaf_d990accd4fedae1acbc7109d.yml b/patterns/ob-fido-uaf_d990accd4fedae1acbc7109d.yml new file mode 100644 index 0000000..cc79f05 --- /dev/null +++ b/patterns/ob-fido-uaf_d990accd4fedae1acbc7109d.yml @@ -0,0 +1,24 @@ +schemaVersion: "1.0" +pattern: + id: "d990accd4fedae1acbc7109d" + className: "ch.nevis.admin.v4.plugin.nevisfido.deployable.patterns.NevisFIDODeployable" + name: "ob-fido-uaf" + deploymentHosts: "ob-fido-uaf" + properties: + logging: + - "pattern://2c2ffee41da5095996e1f131" + frontendAddress: "https://auth.agov-w.azure.adnovum.net" + signerTrustStore: + - "pattern://17743e3041d86717f2697c1c" + database: + - "pattern://e891ec2f4f924135261d22ce" + link: "Custom URI" + customURILink: "ch.agov.access-t://x-callback-url/authenticate" + nevisidm: + - "pattern://30b947532c14be9f85f63a55" + backendKeyStore: + - "pattern://540faa8b8de855d32f179dac" + backendTrustStore: + - "pattern://6d7b43fa096a87eaa1a44952" + addons: + - "pattern://a3e412c0c4aaf7217c8f5994" diff --git a/patterns/ob-fido2_a2d03bb46b87b90160dc83d7.yml b/patterns/ob-fido2_a2d03bb46b87b90160dc83d7.yml new file mode 100644 index 0000000..f5021c5 --- /dev/null +++ b/patterns/ob-fido2_a2d03bb46b87b90160dc83d7.yml @@ -0,0 +1,19 @@ +schemaVersion: "1.0" +pattern: + id: "a2d03bb46b87b90160dc83d7" + className: "ch.nevis.admin.v4.plugin.fido2.patterns.NevisFIDODeployable" + name: "ob-fido2" + deploymentHosts: "ob-fido2" + properties: + signerTrustStore: + - "pattern://17743e3041d86717f2697c1c" + relyingPartyName: "var://nevisfido2-relying-party-name" + relyingPartyId: "var://nevisfido2-relying-party-id" + relyingPartyOrigins: "var://nevisfido2-relying-party-origins" + idm: + - "pattern://30b947532c14be9f85f63a55" + client: "var://agov-client-id" + clientKeyStore: + - "pattern://540faa8b8de855d32f179dac" + serverTrustStore: + - "pattern://6d7b43fa096a87eaa1a44952" diff --git a/patterns/ob-logrend_bed300e1196a171ca12db431.yml b/patterns/ob-logrend_bed300e1196a171ca12db431.yml new file mode 100644 index 0000000..24b19b9 --- /dev/null +++ b/patterns/ob-logrend_bed300e1196a171ca12db431.yml @@ -0,0 +1,7 @@ +schemaVersion: "1.0" +pattern: + id: "bed300e1196a171ca12db431" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.NevisLogrendDeployable" + name: "ob-logrend" + deploymentHosts: "ob-logrend" + properties: {} diff --git a/patterns/ob-me-mock-application_ab2d7423513108f96767a0ec.yml b/patterns/ob-me-mock-application_ab2d7423513108f96767a0ec.yml new file mode 100644 index 0000000..c32064d --- /dev/null +++ b/patterns/ob-me-mock-application_ab2d7423513108f96767a0ec.yml @@ -0,0 +1,11 @@ +schemaVersion: "1.0" +pattern: + id: "ab2d7423513108f96767a0ec" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.AuthenticationFlow" + name: "ob-me-mock-application" + properties: + host: + - "pattern://346a2bebb04a0b74c7c9b5b9" + path: "/mock-me/" + realm: + - "pattern://14b02056879c3b8991597d2b" diff --git a/patterns/ob-mock-me-auth-processor_be8f8436b2ec70e9d601fdd3.yml b/patterns/ob-mock-me-auth-processor_be8f8436b2ec70e9d601fdd3.yml new file mode 100644 index 0000000..02519ba --- /dev/null +++ b/patterns/ob-mock-me-auth-processor_be8f8436b2ec70e9d601fdd3.yml @@ -0,0 +1,11 @@ +schemaVersion: "1.0" +pattern: + id: "be8f8436b2ec70e9d601fdd3" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.GenericAuthenticationStep" + name: "ob-mock-me-auth-processor" + properties: + authStatesFile: "res://be8f8436b2ec70e9d601fdd3#authStatesFile" + parameters: "idp-sso-url: https://auth.agov-w.azure.adnovum.net/SAML2/SSO/\nidp-recovery-url:\ + \ https://auth.agov-w.azure.adnovum.net/AUTH/RECOVERY/\nmock-me-acs-url: https://ob.agov-w.azure.adnovum.net/mock-me/process\n\ + mock-me-audienceRegex: https://ob.agov-w.azure.adnovum.net/mock-me/.+" + resources: "res://be8f8436b2ec70e9d601fdd3#resources" diff --git a/patterns/ob-mock-me-realm_14b02056879c3b8991597d2b.yml b/patterns/ob-mock-me-realm_14b02056879c3b8991597d2b.yml new file mode 100644 index 0000000..0e2a13e --- /dev/null +++ b/patterns/ob-mock-me-realm_14b02056879c3b8991597d2b.yml @@ -0,0 +1,12 @@ +schemaVersion: "1.0" +pattern: + id: "14b02056879c3b8991597d2b" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.NevisAuthRealm" + name: "ob-mock-me-realm" + properties: + authenticate: + - "pattern://be8f8436b2ec70e9d601fdd3" + auth: + - "pattern://d00b0dcbe241793d30daf91c" + logrend: + - "pattern://bed300e1196a171ca12db431" diff --git a/patterns/ob-nevisIDM-SOAP-Service_a922939d935fd9bfc7643530.yml b/patterns/ob-nevisIDM-SOAP-Service_a922939d935fd9bfc7643530.yml new file mode 100644 index 0000000..d174ca8 --- /dev/null +++ b/patterns/ob-nevisIDM-SOAP-Service_a922939d935fd9bfc7643530.yml @@ -0,0 +1,14 @@ +schemaVersion: "1.0" +pattern: + id: "a922939d935fd9bfc7643530" + className: "ch.nevis.admin.v4.plugin.nevisidm.patterns.NevisIDMSOAPServiceAccess" + name: "ob-nevisIDM-SOAP-Service" + properties: + host: + - "pattern://346a2bebb04a0b74c7c9b5b9" + nevisIDM: + - "pattern://30b947532c14be9f85f63a55" + realm: + - "pattern://a005869dc3d479c2323115d0" + token: + - "pattern://1961ee3e6021268b5b99f355" diff --git a/patterns/ob-proxy_b4d2da2fa2d0b060752a1fe2.yml b/patterns/ob-proxy_b4d2da2fa2d0b060752a1fe2.yml new file mode 100644 index 0000000..342dad1 --- /dev/null +++ b/patterns/ob-proxy_b4d2da2fa2d0b060752a1fe2.yml @@ -0,0 +1,9 @@ +schemaVersion: "1.0" +pattern: + id: "b4d2da2fa2d0b060752a1fe2" + className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.NevisProxyDeployable" + name: "ob-proxy" + deploymentHosts: "ob-proxy" + properties: + defaultHostContext: + - "pattern://346a2bebb04a0b74c7c9b5b9" diff --git a/patterns/ob-realm-dispatch-cred-type_5f192f6e91687b30b5868750.yml b/patterns/ob-realm-dispatch-cred-type_5f192f6e91687b30b5868750.yml new file mode 100644 index 0000000..50e4f25 --- /dev/null +++ b/patterns/ob-realm-dispatch-cred-type_5f192f6e91687b30b5868750.yml @@ -0,0 +1,10 @@ +schemaVersion: "1.0" +pattern: + id: "5f192f6e91687b30b5868750" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.GenericAuthenticationStep" + name: "ob-realm-dispatch-cred-type" + properties: + authStatesFile: "res://5f192f6e91687b30b5868750#authStatesFile" + nextSteps: + - "pattern://3d382e0cf987535b6fa989b4" + - "pattern://25bdd7e6f5b76694f6688ab8" diff --git a/patterns/ob-realm-fido2-registration_3d382e0cf987535b6fa989b4.yml b/patterns/ob-realm-fido2-registration_3d382e0cf987535b6fa989b4.yml new file mode 100644 index 0000000..3e98eea --- /dev/null +++ b/patterns/ob-realm-fido2-registration_3d382e0cf987535b6fa989b4.yml @@ -0,0 +1,17 @@ +schemaVersion: "1.0" +pattern: + id: "3d382e0cf987535b6fa989b4" + className: "ch.nevis.admin.v4.plugin.fido2.patterns.FIDO2Onboarding" + name: "ob-realm-fido2-registration" + properties: + fido: + - "pattern://a2d03bb46b87b90160dc83d7" + onSuccess: + - "pattern://0955c277bc073d31fb27ef21" + onUnsupported: + - "pattern://e1784eecf2db74484dd1e1bb" + onCancel: + - "pattern://e1784eecf2db74484dd1e1bb" + residentKey: "required" + userVerification: "required" + attestation: "direct" diff --git a/patterns/ob-realm-idm-pwd-login_e1784eecf2db74484dd1e1bb.yml b/patterns/ob-realm-idm-pwd-login_e1784eecf2db74484dd1e1bb.yml new file mode 100644 index 0000000..bffc68d --- /dev/null +++ b/patterns/ob-realm-idm-pwd-login_e1784eecf2db74484dd1e1bb.yml @@ -0,0 +1,22 @@ +schemaVersion: "1.0" +pattern: + id: "e1784eecf2db74484dd1e1bb" + className: "ch.nevis.admin.v4.plugin.nevisidm.patterns2.NevisIDMPasswordLogin" + name: "ob-realm-idm-pwd-login" + properties: + nevisIDM: + - "pattern://30b947532c14be9f85f63a55" + onSuccess: + - "pattern://5f192f6e91687b30b5868750" + attributes: + - "extId" + - "loginId" + - "firstName" + - "name" + - "email" + - "language" + passwordResetEnabled: "enabled" + separateScreens: "disabled" + clientInput: "enabled" + loginType: "EMAIL" + useDefaultProfile: "enabled" diff --git a/patterns/ob-realm-registration-done_0955c277bc073d31fb27ef21.yml b/patterns/ob-realm-registration-done_0955c277bc073d31fb27ef21.yml new file mode 100644 index 0000000..bd56fe3 --- /dev/null +++ b/patterns/ob-realm-registration-done_0955c277bc073d31fb27ef21.yml @@ -0,0 +1,6 @@ +schemaVersion: "1.0" +pattern: + id: "0955c277bc073d31fb27ef21" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.AuthenticationDone" + name: "ob-realm-registration-done" + properties: {} diff --git a/patterns/ob-realm_6e7b5a087711bd0ada9985fe.yml b/patterns/ob-realm_6e7b5a087711bd0ada9985fe.yml new file mode 100644 index 0000000..ae88fae --- /dev/null +++ b/patterns/ob-realm_6e7b5a087711bd0ada9985fe.yml @@ -0,0 +1,12 @@ +schemaVersion: "1.0" +pattern: + id: "6e7b5a087711bd0ada9985fe" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.NevisAuthRealm" + name: "ob-realm" + properties: + authenticate: + - "pattern://e1784eecf2db74484dd1e1bb" + auth: + - "pattern://d00b0dcbe241793d30daf91c" + logrend: + - "pattern://bed300e1196a171ca12db431" diff --git a/patterns/ob-register-service-trigger_54c2d90d05f13df1b90bc6b2.yml b/patterns/ob-register-service-trigger_54c2d90d05f13df1b90bc6b2.yml new file mode 100644 index 0000000..25ed96b --- /dev/null +++ b/patterns/ob-register-service-trigger_54c2d90d05f13df1b90bc6b2.yml @@ -0,0 +1,7 @@ +schemaVersion: "1.0" +pattern: + id: "54c2d90d05f13df1b90bc6b2" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.AuthorizationPolicy" + name: "ob-register-service-trigger" + properties: + level: "2" diff --git a/patterns/ob-register-service_b10d246bc151306dba28de4a.yml b/patterns/ob-register-service_b10d246bc151306dba28de4a.yml new file mode 100644 index 0000000..eb3ff2d --- /dev/null +++ b/patterns/ob-register-service_b10d246bc151306dba28de4a.yml @@ -0,0 +1,14 @@ +schemaVersion: "1.0" +pattern: + id: "b10d246bc151306dba28de4a" + className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.HostingService" + name: "ob-register-service" + properties: + host: + - "pattern://346a2bebb04a0b74c7c9b5b9" + path: "/register/" + resources: "res://b10d246bc151306dba28de4a#resources" + realm: + - "pattern://6e7b5a087711bd0ada9985fe" + addons: + - "pattern://54c2d90d05f13df1b90bc6b2" diff --git a/patterns/ob-service-auth-realm_a005869dc3d479c2323115d0.yml b/patterns/ob-service-auth-realm_a005869dc3d479c2323115d0.yml new file mode 100644 index 0000000..d9cf58d --- /dev/null +++ b/patterns/ob-service-auth-realm_a005869dc3d479c2323115d0.yml @@ -0,0 +1,14 @@ +schemaVersion: "1.0" +pattern: + id: "a005869dc3d479c2323115d0" + className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.NevisAuthRealm" + name: "ob-service-auth-realm" + properties: + authenticate: + - "pattern://e1784eecf2db74484dd1e1bb" + tokens: + - "pattern://1961ee3e6021268b5b99f355" + auth: + - "pattern://d00b0dcbe241793d30daf91c" + logrend: + - "pattern://bed300e1196a171ca12db431" diff --git a/patterns/ob-vhost_346a2bebb04a0b74c7c9b5b9.yml b/patterns/ob-vhost_346a2bebb04a0b74c7c9b5b9.yml new file mode 100644 index 0000000..f57d9a2 --- /dev/null +++ b/patterns/ob-vhost_346a2bebb04a0b74c7c9b5b9.yml @@ -0,0 +1,9 @@ +schemaVersion: "1.0" +pattern: + id: "346a2bebb04a0b74c7c9b5b9" + className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.HostContext" + name: "ob-vhost" + properties: + proxy: + - "pattern://b4d2da2fa2d0b060752a1fe2" + addresses: "https://ob.agov-w.azure.adnovum.net/" diff --git a/patterns/work-idm-connector_30b947532c14be9f85f63a55.yml b/patterns/work-idm-connector_30b947532c14be9f85f63a55.yml new file mode 100644 index 0000000..e7c2250 --- /dev/null +++ b/patterns/work-idm-connector_30b947532c14be9f85f63a55.yml @@ -0,0 +1,9 @@ +schemaVersion: "1.0" +pattern: + id: "30b947532c14be9f85f63a55" + className: "ch.nevis.admin.v4.plugin.nevisidm.patterns.NevisIDMConnector" + name: "work-idm-connector" + properties: + url: "idm:8989" + kubernetes: "other_namespace" + kubernetesNamespace: "adn-agov-nevisidm-01-uat" diff --git a/patterns/work-mariadb-session-store_e891ec2f4f924135261d22ce.yml b/patterns/work-mariadb-session-store_e891ec2f4f924135261d22ce.yml new file mode 100644 index 0000000..9c1fe27 --- /dev/null +++ b/patterns/work-mariadb-session-store_e891ec2f4f924135261d22ce.yml @@ -0,0 +1,14 @@ +schemaVersion: "1.0" +pattern: + id: "e891ec2f4f924135261d22ce" + className: "ch.nevis.admin.v4.plugin.nevisfido.patterns.NevisFIDODatabase" + name: "work-mariadb-session-store" + properties: + type: "MariaDB" + hosts: "var://fido-session-store-database-host" + database: "var://fido-session-store-database-name-uaf" + rootCredential: "var://fido-session-store-root-credential" + rootCredentialNamespace: "var://fido-session-store-root-credential-namespace" + user: "var://fido-session-store-database-user" + password: "var://fido-session-store-database-password" + databaseManagement: "complete" diff --git a/variables.yml b/variables.yml new file mode 100644 index 0000000..08dd464 --- /dev/null +++ b/variables.yml @@ -0,0 +1,120 @@ +schemaVersion: "1.0" +variables: + agov-client-id: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 1 + maxAllowed: 1 + value: "100" + requireOverloading: true + agov-work-internal-trust-store-additional-trusted-certificates: + className: "ch.nevis.admin.v4.plugin.base.generation.property.AttachmentProperty" + parameters: + minRequired: 0 + value: null + requireOverloading: true + fido-session-store-database-host: + className: "ch.nevis.admin.v4.plugin.base.generation.property.HostPortProperty" + parameters: + minRequired: 0 + maxAllowed: 2 + portRequired: false + value: "mariadb-session-store-service.adn-agov-nevisidm-ob-01-uat:3306" + requireOverloading: true + fido-session-store-database-name-uaf: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 1 + maxAllowed: 1 + value: "nevisfido_uaf" + requireOverloading: true + fido-session-store-database-password: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 0 + maxAllowed: 1 + secret: true + value: "sample password" + requireOverloading: true + fido-session-store-database-user: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 0 + maxAllowed: 1 + value: "uaf" + requireOverloading: true + fido-session-store-root-credential: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 0 + maxAllowed: 1 + value: "root-mariadb-session-store" + requireOverloading: true + fido-session-store-root-credential-namespace: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 0 + maxAllowed: 1 + value: "ns" + requireOverloading: true + nevisfido-techuser-key-key-store-content: + className: "ch.nevis.admin.v4.plugin.base.generation.property.AttachmentProperty" + parameters: + minRequired: 0 + secretPreserving: true + value: null + requireOverloading: true + nevisfido-techuser-key-private-key-passphrase: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 0 + maxAllowed: 1 + secret: true + value: "sample password" + requireOverloading: true + nevisfido2-relying-party-id: + className: "ch.nevis.admin.v4.plugin.base.generation.property.HostProperty" + parameters: + minRequired: 1 + maxAllowed: 1 + value: "adnovum.net" + requireOverloading: true + nevisfido2-relying-party-name: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 1 + maxAllowed: 1 + value: "AGOV" + requireOverloading: true + nevisfido2-relying-party-origins: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 1 + value: + - "https://ob.agov-w.azure.adnovum.net" + - "https://me.agov-w.azure.adnovum.net" + - "https://nevisidm.agov-w.azure.adnovum.net" + - "https://auth.agov-w.azure.adnovum.net" + requireOverloading: true + ob-auth-signer-key-store: + className: "ch.nevis.admin.v4.plugin.base.generation.property.AttachmentProperty" + parameters: + minRequired: 0 + secretPreserving: true + value: null + requireOverloading: true + ob-auth-signer-private-key-passphrase: + className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty" + parameters: + minRequired: 0 + maxAllowed: 1 + secret: true + value: "sample password" + requireOverloading: true + ob-auth-signer-trust-store: + className: "ch.nevis.admin.v4.plugin.base.generation.property.AttachmentProperty" + parameters: + minRequired: 0 + secretPreserving: true + value: null + requireOverloading: true