diff --git a/bundles.yml b/bundles.yml
index 9e44418..b409794 100644
--- a/bundles.yml
+++ b/bundles.yml
@@ -1,13 +1,12 @@
schemaVersion: "1.0"
bundles:
-- "nevisadmin-plugin-nevisproxy:8.2405.0.6"
-- "nevisadmin-plugin-base-generation:8.2405.0.6"
-- "nevisadmin-plugin-nevisdetect:8.2405.0.6"
-- "nevisadmin-plugin-marketplace:8.2405.0.6"
-- "nevisadmin-plugin-mobile-auth:8.2405.0.6"
-- "nevisadmin-plugin-authcloud:8.2405.0.6"
-- "nevisadmin-plugin-nevisdp:8.2405.0.6"
-- "nevisadmin-plugin-fido2:8.2405.0.6"
-- "nevisadmin-plugin-nevisidm:8.2405.0.6"
-- "nevisadmin-plugin-oauth:8.2405.0.6"
-- "nevisadmin-plugin-nevisauth:8.2405.0.6"
+- "nevisadmin-plugin-oauth:8.2405.3.0"
+- "nevisadmin-plugin-authcloud:8.2405.3.0"
+- "nevisadmin-plugin-nevisidm:8.2405.3.0"
+- "nevisadmin-plugin-mobile-auth:8.2405.3.0"
+- "nevisadmin-plugin-fido2:8.2405.3.0"
+- "nevisadmin-plugin-nevisdp:8.2405.3.0"
+- "nevisadmin-plugin-nevisauth:8.2405.3.0"
+- "nevisadmin-plugin-nevisproxy:8.2405.3.0"
+- "nevisadmin-plugin-nevisdetect:8.2405.3.0"
+- "nevisadmin-plugin-base-generation:8.2405.3.0"
diff --git a/patterns/5f192f6e91687b30b5868750_authStatesFile/ob-realm-dispatch-cred-type.xml b/patterns/5f192f6e91687b30b5868750_authStatesFile/ob-realm-dispatch-cred-type.xml
new file mode 100644
index 0000000..93198a1
--- /dev/null
+++ b/patterns/5f192f6e91687b30b5868750_authStatesFile/ob-realm-dispatch-cred-type.xml
@@ -0,0 +1,12 @@
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/patterns/_ob-realm-accessapp-registration_25bdd7e6f5b76694f6688ab8.yml b/patterns/_ob-realm-accessapp-registration_25bdd7e6f5b76694f6688ab8.yml
new file mode 100644
index 0000000..e04f726
--- /dev/null
+++ b/patterns/_ob-realm-accessapp-registration_25bdd7e6f5b76694f6688ab8.yml
@@ -0,0 +1,14 @@
+schemaVersion: "1.0"
+pattern:
+ id: "25bdd7e6f5b76694f6688ab8"
+ className: "ch.nevis.admin.v4.plugin.nevisfido.outofband.patterns.OutOfBandMobileRegistration"
+ name: " ob-realm-accessapp-registration"
+ properties:
+ host:
+ - "pattern://346a2bebb04a0b74c7c9b5b9"
+ onSuccess:
+ - "pattern://0955c277bc073d31fb27ef21"
+ onCancel:
+ - "pattern://e1784eecf2db74484dd1e1bb"
+ nevisfido:
+ - "pattern://d990accd4fedae1acbc7109d"
diff --git a/patterns/agov-work-internal-trust-store_6d7b43fa096a87eaa1a44952.yml b/patterns/agov-work-internal-trust-store_6d7b43fa096a87eaa1a44952.yml
new file mode 100644
index 0000000..3cb42ac
--- /dev/null
+++ b/patterns/agov-work-internal-trust-store_6d7b43fa096a87eaa1a44952.yml
@@ -0,0 +1,7 @@
+schemaVersion: "1.0"
+pattern:
+ id: "6d7b43fa096a87eaa1a44952"
+ className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.AutomaticTrustStoreProvider"
+ name: "agov-work-internal-trust-store"
+ properties:
+ truststoreFile: "var://agov-work-internal-trust-store-additional-trusted-certificates"
diff --git a/patterns/b10d246bc151306dba28de4a_resources/readme.txt b/patterns/b10d246bc151306dba28de4a_resources/readme.txt
new file mode 100644
index 0000000..95d09f2
--- /dev/null
+++ b/patterns/b10d246bc151306dba28de4a_resources/readme.txt
@@ -0,0 +1 @@
+hello world
\ No newline at end of file
diff --git a/patterns/be8f8436b2ec70e9d601fdd3_authStatesFile/ob-mock-me-auth-processor.xml b/patterns/be8f8436b2ec70e9d601fdd3_authStatesFile/ob-mock-me-auth-processor.xml
new file mode 100644
index 0000000..7a2f748
--- /dev/null
+++ b/patterns/be8f8436b2ec70e9d601fdd3_authStatesFile/ob-mock-me-auth-processor.xml
@@ -0,0 +1,43 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/patterns/be8f8436b2ec70e9d601fdd3_resources/mock-me-processing.groovy b/patterns/be8f8436b2ec70e9d601fdd3_resources/mock-me-processing.groovy
new file mode 100644
index 0000000..fb5db5e
--- /dev/null
+++ b/patterns/be8f8436b2ec70e9d601fdd3_resources/mock-me-processing.groovy
@@ -0,0 +1,23 @@
+import ch.nevis.esauth.auth.engine.AuthResponse
+
+if (inargs['SAMLResponse']) {
+ response.setNote('SAMLResponse', inargs['SAMLResponse'])
+ request.getInArgs().remove('SAMLResponse')
+ response.setResult('processResponse')
+ return
+}
+
+
+if (inargs['back'] && inargs['back'] == 'go') {
+ response.setStatus(AuthResponse.AUTH_ERROR)
+ if (session['ch.nevis.auth.saml.assertion.authnContextClassRef'] && session['ch.nevis.auth.saml.assertion.authnContextClassRef'] == 'urn:qa.agov.ch:names:tc:ac:classes:recovery') {
+ response.setTransferDestination(parameters['idp-recovery-url'])
+ } else {
+ response.setTransferDestination(parameters['idp-sso-url'])
+ }
+ response.setIsRedirectTransfer(true)
+ return
+}
+
+// if we reach this line, display the GUI
+response.setStatus(AuthResponse.AUTH_CONTINUE)
\ No newline at end of file
diff --git a/patterns/nevisFido-techuser-key_540faa8b8de855d32f179dac.yml b/patterns/nevisFido-techuser-key_540faa8b8de855d32f179dac.yml
new file mode 100644
index 0000000..411259c
--- /dev/null
+++ b/patterns/nevisFido-techuser-key_540faa8b8de855d32f179dac.yml
@@ -0,0 +1,8 @@
+schemaVersion: "1.0"
+pattern:
+ id: "540faa8b8de855d32f179dac"
+ className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.PemKeyStoreProvider"
+ name: "nevisFido-techuser-key"
+ properties:
+ keystoreFiles: "var://nevisfido-techuser-key-key-store-content"
+ keyPass: "var://nevisfido-techuser-key-private-key-passphrase"
diff --git a/patterns/no-LoginRenderer_97ccf58a92ea008e353d6af7.yml b/patterns/no-LoginRenderer_97ccf58a92ea008e353d6af7.yml
new file mode 100644
index 0000000..674b468
--- /dev/null
+++ b/patterns/no-LoginRenderer_97ccf58a92ea008e353d6af7.yml
@@ -0,0 +1,6 @@
+schemaVersion: "1.0"
+pattern:
+ id: "97ccf58a92ea008e353d6af7"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.NevisProxyLogrend"
+ name: "no-LoginRenderer"
+ properties: {}
diff --git a/patterns/ob-SecToken-for-work-IDM_1961ee3e6021268b5b99f355.yml b/patterns/ob-SecToken-for-work-IDM_1961ee3e6021268b5b99f355.yml
new file mode 100644
index 0000000..165aa6d
--- /dev/null
+++ b/patterns/ob-SecToken-for-work-IDM_1961ee3e6021268b5b99f355.yml
@@ -0,0 +1,6 @@
+schemaVersion: "1.0"
+pattern:
+ id: "1961ee3e6021268b5b99f355"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.SecToken"
+ name: "ob-SecToken-for-work-IDM"
+ properties: {}
diff --git a/patterns/ob-auth-log-settings_25dbf93ef96abab8182ebefc.yml b/patterns/ob-auth-log-settings_25dbf93ef96abab8182ebefc.yml
new file mode 100644
index 0000000..234d250
--- /dev/null
+++ b/patterns/ob-auth-log-settings_25dbf93ef96abab8182ebefc.yml
@@ -0,0 +1,14 @@
+schemaVersion: "1.0"
+pattern:
+ id: "25dbf93ef96abab8182ebefc"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.CustomAuthLogFile"
+ name: "ob-auth-log-settings"
+ properties:
+ logLevel: "WARN"
+ levels:
+ - Script: "DEBUG"
+ - OpTrace: "INFO"
+ - AuthEngine: "INFO"
+ - AuthPerf: "INFO"
+ - Vars: "INFO"
+ - HttpClient: "DEBUG"
diff --git a/patterns/ob-auth-signer-trust-store_17743e3041d86717f2697c1c.yml b/patterns/ob-auth-signer-trust-store_17743e3041d86717f2697c1c.yml
new file mode 100644
index 0000000..4726750
--- /dev/null
+++ b/patterns/ob-auth-signer-trust-store_17743e3041d86717f2697c1c.yml
@@ -0,0 +1,7 @@
+schemaVersion: "1.0"
+pattern:
+ id: "17743e3041d86717f2697c1c"
+ className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.PemTrustStoreProvider"
+ name: "ob-auth-signer-trust-store"
+ properties:
+ truststoreFile: "var://ob-auth-signer-trust-store"
diff --git a/patterns/ob-auth-signer_f94db670348c3abce35d473a.yml b/patterns/ob-auth-signer_f94db670348c3abce35d473a.yml
new file mode 100644
index 0000000..9c53e15
--- /dev/null
+++ b/patterns/ob-auth-signer_f94db670348c3abce35d473a.yml
@@ -0,0 +1,8 @@
+schemaVersion: "1.0"
+pattern:
+ id: "f94db670348c3abce35d473a"
+ className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.PemKeyStoreProvider"
+ name: "ob-auth-signer"
+ properties:
+ keystoreFiles: "var://ob-auth-signer-key-store"
+ keyPass: "var://ob-auth-signer-private-key-passphrase"
diff --git a/patterns/ob-auth_d00b0dcbe241793d30daf91c.yml b/patterns/ob-auth_d00b0dcbe241793d30daf91c.yml
new file mode 100644
index 0000000..2a2ca39
--- /dev/null
+++ b/patterns/ob-auth_d00b0dcbe241793d30daf91c.yml
@@ -0,0 +1,13 @@
+schemaVersion: "1.0"
+pattern:
+ id: "d00b0dcbe241793d30daf91c"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.NevisAuthDeployable"
+ name: "ob-auth"
+ deploymentHosts: "ob-auth"
+ properties:
+ logging:
+ - "pattern://25dbf93ef96abab8182ebefc"
+ backendTrustStore:
+ - "pattern://6d7b43fa096a87eaa1a44952"
+ signerKeyStore:
+ - "pattern://f94db670348c3abce35d473a"
diff --git a/patterns/ob-evisIDM-REST-Service_136d83ad842c5b255417cd87.yml b/patterns/ob-evisIDM-REST-Service_136d83ad842c5b255417cd87.yml
new file mode 100644
index 0000000..0a0a0af
--- /dev/null
+++ b/patterns/ob-evisIDM-REST-Service_136d83ad842c5b255417cd87.yml
@@ -0,0 +1,14 @@
+schemaVersion: "1.0"
+pattern:
+ id: "136d83ad842c5b255417cd87"
+ className: "ch.nevis.admin.v4.plugin.nevisidm.patterns.NevisIDMRESTServiceAccess"
+ name: "ob-evisIDM-REST-Service"
+ properties:
+ host:
+ - "pattern://346a2bebb04a0b74c7c9b5b9"
+ nevisIDM:
+ - "pattern://30b947532c14be9f85f63a55"
+ realm:
+ - "pattern://a005869dc3d479c2323115d0"
+ token:
+ - "pattern://1961ee3e6021268b5b99f355"
diff --git a/patterns/ob-fido-uaf-instance-settings_a3e412c0c4aaf7217c8f5994.yml b/patterns/ob-fido-uaf-instance-settings_a3e412c0c4aaf7217c8f5994.yml
new file mode 100644
index 0000000..8640666
--- /dev/null
+++ b/patterns/ob-fido-uaf-instance-settings_a3e412c0c4aaf7217c8f5994.yml
@@ -0,0 +1,6 @@
+schemaVersion: "1.0"
+pattern:
+ id: "a3e412c0c4aaf7217c8f5994"
+ className: "ch.nevis.admin.v4.plugin.nevisfido.deployable.patterns.GenericNevisFIDOSettings"
+ name: "ob-fido-uaf-instance-settings"
+ properties: {}
diff --git a/patterns/ob-fido-uaf-log-settings_2c2ffee41da5095996e1f131.yml b/patterns/ob-fido-uaf-log-settings_2c2ffee41da5095996e1f131.yml
new file mode 100644
index 0000000..9ae4028
--- /dev/null
+++ b/patterns/ob-fido-uaf-log-settings_2c2ffee41da5095996e1f131.yml
@@ -0,0 +1,10 @@
+schemaVersion: "1.0"
+pattern:
+ id: "2c2ffee41da5095996e1f131"
+ className: "ch.nevis.admin.v4.plugin.nevisfido.deployable.patterns.NevisFIDOLogSettings"
+ name: "ob-fido-uaf-log-settings"
+ properties:
+ logLevel: "WARN"
+ levels:
+ - OpTrace: "INFO"
+ - ch.nevis.auth.fido.api.uaf: "DEBUG"
diff --git a/patterns/ob-fido-uaf_d990accd4fedae1acbc7109d.yml b/patterns/ob-fido-uaf_d990accd4fedae1acbc7109d.yml
new file mode 100644
index 0000000..cc79f05
--- /dev/null
+++ b/patterns/ob-fido-uaf_d990accd4fedae1acbc7109d.yml
@@ -0,0 +1,24 @@
+schemaVersion: "1.0"
+pattern:
+ id: "d990accd4fedae1acbc7109d"
+ className: "ch.nevis.admin.v4.plugin.nevisfido.deployable.patterns.NevisFIDODeployable"
+ name: "ob-fido-uaf"
+ deploymentHosts: "ob-fido-uaf"
+ properties:
+ logging:
+ - "pattern://2c2ffee41da5095996e1f131"
+ frontendAddress: "https://auth.agov-w.azure.adnovum.net"
+ signerTrustStore:
+ - "pattern://17743e3041d86717f2697c1c"
+ database:
+ - "pattern://e891ec2f4f924135261d22ce"
+ link: "Custom URI"
+ customURILink: "ch.agov.access-t://x-callback-url/authenticate"
+ nevisidm:
+ - "pattern://30b947532c14be9f85f63a55"
+ backendKeyStore:
+ - "pattern://540faa8b8de855d32f179dac"
+ backendTrustStore:
+ - "pattern://6d7b43fa096a87eaa1a44952"
+ addons:
+ - "pattern://a3e412c0c4aaf7217c8f5994"
diff --git a/patterns/ob-fido2_a2d03bb46b87b90160dc83d7.yml b/patterns/ob-fido2_a2d03bb46b87b90160dc83d7.yml
new file mode 100644
index 0000000..f5021c5
--- /dev/null
+++ b/patterns/ob-fido2_a2d03bb46b87b90160dc83d7.yml
@@ -0,0 +1,19 @@
+schemaVersion: "1.0"
+pattern:
+ id: "a2d03bb46b87b90160dc83d7"
+ className: "ch.nevis.admin.v4.plugin.fido2.patterns.NevisFIDODeployable"
+ name: "ob-fido2"
+ deploymentHosts: "ob-fido2"
+ properties:
+ signerTrustStore:
+ - "pattern://17743e3041d86717f2697c1c"
+ relyingPartyName: "var://nevisfido2-relying-party-name"
+ relyingPartyId: "var://nevisfido2-relying-party-id"
+ relyingPartyOrigins: "var://nevisfido2-relying-party-origins"
+ idm:
+ - "pattern://30b947532c14be9f85f63a55"
+ client: "var://agov-client-id"
+ clientKeyStore:
+ - "pattern://540faa8b8de855d32f179dac"
+ serverTrustStore:
+ - "pattern://6d7b43fa096a87eaa1a44952"
diff --git a/patterns/ob-logrend_bed300e1196a171ca12db431.yml b/patterns/ob-logrend_bed300e1196a171ca12db431.yml
new file mode 100644
index 0000000..24b19b9
--- /dev/null
+++ b/patterns/ob-logrend_bed300e1196a171ca12db431.yml
@@ -0,0 +1,7 @@
+schemaVersion: "1.0"
+pattern:
+ id: "bed300e1196a171ca12db431"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.NevisLogrendDeployable"
+ name: "ob-logrend"
+ deploymentHosts: "ob-logrend"
+ properties: {}
diff --git a/patterns/ob-me-mock-application_ab2d7423513108f96767a0ec.yml b/patterns/ob-me-mock-application_ab2d7423513108f96767a0ec.yml
new file mode 100644
index 0000000..c32064d
--- /dev/null
+++ b/patterns/ob-me-mock-application_ab2d7423513108f96767a0ec.yml
@@ -0,0 +1,11 @@
+schemaVersion: "1.0"
+pattern:
+ id: "ab2d7423513108f96767a0ec"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns.AuthenticationFlow"
+ name: "ob-me-mock-application"
+ properties:
+ host:
+ - "pattern://346a2bebb04a0b74c7c9b5b9"
+ path: "/mock-me/"
+ realm:
+ - "pattern://14b02056879c3b8991597d2b"
diff --git a/patterns/ob-mock-me-auth-processor_be8f8436b2ec70e9d601fdd3.yml b/patterns/ob-mock-me-auth-processor_be8f8436b2ec70e9d601fdd3.yml
new file mode 100644
index 0000000..02519ba
--- /dev/null
+++ b/patterns/ob-mock-me-auth-processor_be8f8436b2ec70e9d601fdd3.yml
@@ -0,0 +1,11 @@
+schemaVersion: "1.0"
+pattern:
+ id: "be8f8436b2ec70e9d601fdd3"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.GenericAuthenticationStep"
+ name: "ob-mock-me-auth-processor"
+ properties:
+ authStatesFile: "res://be8f8436b2ec70e9d601fdd3#authStatesFile"
+ parameters: "idp-sso-url: https://auth.agov-w.azure.adnovum.net/SAML2/SSO/\nidp-recovery-url:\
+ \ https://auth.agov-w.azure.adnovum.net/AUTH/RECOVERY/\nmock-me-acs-url: https://ob.agov-w.azure.adnovum.net/mock-me/process\n\
+ mock-me-audienceRegex: https://ob.agov-w.azure.adnovum.net/mock-me/.+"
+ resources: "res://be8f8436b2ec70e9d601fdd3#resources"
diff --git a/patterns/ob-mock-me-realm_14b02056879c3b8991597d2b.yml b/patterns/ob-mock-me-realm_14b02056879c3b8991597d2b.yml
new file mode 100644
index 0000000..0e2a13e
--- /dev/null
+++ b/patterns/ob-mock-me-realm_14b02056879c3b8991597d2b.yml
@@ -0,0 +1,12 @@
+schemaVersion: "1.0"
+pattern:
+ id: "14b02056879c3b8991597d2b"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.NevisAuthRealm"
+ name: "ob-mock-me-realm"
+ properties:
+ authenticate:
+ - "pattern://be8f8436b2ec70e9d601fdd3"
+ auth:
+ - "pattern://d00b0dcbe241793d30daf91c"
+ logrend:
+ - "pattern://bed300e1196a171ca12db431"
diff --git a/patterns/ob-nevisIDM-SOAP-Service_a922939d935fd9bfc7643530.yml b/patterns/ob-nevisIDM-SOAP-Service_a922939d935fd9bfc7643530.yml
new file mode 100644
index 0000000..d174ca8
--- /dev/null
+++ b/patterns/ob-nevisIDM-SOAP-Service_a922939d935fd9bfc7643530.yml
@@ -0,0 +1,14 @@
+schemaVersion: "1.0"
+pattern:
+ id: "a922939d935fd9bfc7643530"
+ className: "ch.nevis.admin.v4.plugin.nevisidm.patterns.NevisIDMSOAPServiceAccess"
+ name: "ob-nevisIDM-SOAP-Service"
+ properties:
+ host:
+ - "pattern://346a2bebb04a0b74c7c9b5b9"
+ nevisIDM:
+ - "pattern://30b947532c14be9f85f63a55"
+ realm:
+ - "pattern://a005869dc3d479c2323115d0"
+ token:
+ - "pattern://1961ee3e6021268b5b99f355"
diff --git a/patterns/ob-proxy_b4d2da2fa2d0b060752a1fe2.yml b/patterns/ob-proxy_b4d2da2fa2d0b060752a1fe2.yml
new file mode 100644
index 0000000..342dad1
--- /dev/null
+++ b/patterns/ob-proxy_b4d2da2fa2d0b060752a1fe2.yml
@@ -0,0 +1,9 @@
+schemaVersion: "1.0"
+pattern:
+ id: "b4d2da2fa2d0b060752a1fe2"
+ className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.NevisProxyDeployable"
+ name: "ob-proxy"
+ deploymentHosts: "ob-proxy"
+ properties:
+ defaultHostContext:
+ - "pattern://346a2bebb04a0b74c7c9b5b9"
diff --git a/patterns/ob-realm-dispatch-cred-type_5f192f6e91687b30b5868750.yml b/patterns/ob-realm-dispatch-cred-type_5f192f6e91687b30b5868750.yml
new file mode 100644
index 0000000..50e4f25
--- /dev/null
+++ b/patterns/ob-realm-dispatch-cred-type_5f192f6e91687b30b5868750.yml
@@ -0,0 +1,10 @@
+schemaVersion: "1.0"
+pattern:
+ id: "5f192f6e91687b30b5868750"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.GenericAuthenticationStep"
+ name: "ob-realm-dispatch-cred-type"
+ properties:
+ authStatesFile: "res://5f192f6e91687b30b5868750#authStatesFile"
+ nextSteps:
+ - "pattern://3d382e0cf987535b6fa989b4"
+ - "pattern://25bdd7e6f5b76694f6688ab8"
diff --git a/patterns/ob-realm-fido2-registration_3d382e0cf987535b6fa989b4.yml b/patterns/ob-realm-fido2-registration_3d382e0cf987535b6fa989b4.yml
new file mode 100644
index 0000000..3e98eea
--- /dev/null
+++ b/patterns/ob-realm-fido2-registration_3d382e0cf987535b6fa989b4.yml
@@ -0,0 +1,17 @@
+schemaVersion: "1.0"
+pattern:
+ id: "3d382e0cf987535b6fa989b4"
+ className: "ch.nevis.admin.v4.plugin.fido2.patterns.FIDO2Onboarding"
+ name: "ob-realm-fido2-registration"
+ properties:
+ fido:
+ - "pattern://a2d03bb46b87b90160dc83d7"
+ onSuccess:
+ - "pattern://0955c277bc073d31fb27ef21"
+ onUnsupported:
+ - "pattern://e1784eecf2db74484dd1e1bb"
+ onCancel:
+ - "pattern://e1784eecf2db74484dd1e1bb"
+ residentKey: "required"
+ userVerification: "required"
+ attestation: "direct"
diff --git a/patterns/ob-realm-idm-pwd-login_e1784eecf2db74484dd1e1bb.yml b/patterns/ob-realm-idm-pwd-login_e1784eecf2db74484dd1e1bb.yml
new file mode 100644
index 0000000..bffc68d
--- /dev/null
+++ b/patterns/ob-realm-idm-pwd-login_e1784eecf2db74484dd1e1bb.yml
@@ -0,0 +1,22 @@
+schemaVersion: "1.0"
+pattern:
+ id: "e1784eecf2db74484dd1e1bb"
+ className: "ch.nevis.admin.v4.plugin.nevisidm.patterns2.NevisIDMPasswordLogin"
+ name: "ob-realm-idm-pwd-login"
+ properties:
+ nevisIDM:
+ - "pattern://30b947532c14be9f85f63a55"
+ onSuccess:
+ - "pattern://5f192f6e91687b30b5868750"
+ attributes:
+ - "extId"
+ - "loginId"
+ - "firstName"
+ - "name"
+ - "email"
+ - "language"
+ passwordResetEnabled: "enabled"
+ separateScreens: "disabled"
+ clientInput: "enabled"
+ loginType: "EMAIL"
+ useDefaultProfile: "enabled"
diff --git a/patterns/ob-realm-registration-done_0955c277bc073d31fb27ef21.yml b/patterns/ob-realm-registration-done_0955c277bc073d31fb27ef21.yml
new file mode 100644
index 0000000..bd56fe3
--- /dev/null
+++ b/patterns/ob-realm-registration-done_0955c277bc073d31fb27ef21.yml
@@ -0,0 +1,6 @@
+schemaVersion: "1.0"
+pattern:
+ id: "0955c277bc073d31fb27ef21"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.AuthenticationDone"
+ name: "ob-realm-registration-done"
+ properties: {}
diff --git a/patterns/ob-realm_6e7b5a087711bd0ada9985fe.yml b/patterns/ob-realm_6e7b5a087711bd0ada9985fe.yml
new file mode 100644
index 0000000..ae88fae
--- /dev/null
+++ b/patterns/ob-realm_6e7b5a087711bd0ada9985fe.yml
@@ -0,0 +1,12 @@
+schemaVersion: "1.0"
+pattern:
+ id: "6e7b5a087711bd0ada9985fe"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.NevisAuthRealm"
+ name: "ob-realm"
+ properties:
+ authenticate:
+ - "pattern://e1784eecf2db74484dd1e1bb"
+ auth:
+ - "pattern://d00b0dcbe241793d30daf91c"
+ logrend:
+ - "pattern://bed300e1196a171ca12db431"
diff --git a/patterns/ob-register-service-trigger_54c2d90d05f13df1b90bc6b2.yml b/patterns/ob-register-service-trigger_54c2d90d05f13df1b90bc6b2.yml
new file mode 100644
index 0000000..25ed96b
--- /dev/null
+++ b/patterns/ob-register-service-trigger_54c2d90d05f13df1b90bc6b2.yml
@@ -0,0 +1,7 @@
+schemaVersion: "1.0"
+pattern:
+ id: "54c2d90d05f13df1b90bc6b2"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.AuthorizationPolicy"
+ name: "ob-register-service-trigger"
+ properties:
+ level: "2"
diff --git a/patterns/ob-register-service_b10d246bc151306dba28de4a.yml b/patterns/ob-register-service_b10d246bc151306dba28de4a.yml
new file mode 100644
index 0000000..eb3ff2d
--- /dev/null
+++ b/patterns/ob-register-service_b10d246bc151306dba28de4a.yml
@@ -0,0 +1,14 @@
+schemaVersion: "1.0"
+pattern:
+ id: "b10d246bc151306dba28de4a"
+ className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.HostingService"
+ name: "ob-register-service"
+ properties:
+ host:
+ - "pattern://346a2bebb04a0b74c7c9b5b9"
+ path: "/register/"
+ resources: "res://b10d246bc151306dba28de4a#resources"
+ realm:
+ - "pattern://6e7b5a087711bd0ada9985fe"
+ addons:
+ - "pattern://54c2d90d05f13df1b90bc6b2"
diff --git a/patterns/ob-service-auth-realm_a005869dc3d479c2323115d0.yml b/patterns/ob-service-auth-realm_a005869dc3d479c2323115d0.yml
new file mode 100644
index 0000000..d9cf58d
--- /dev/null
+++ b/patterns/ob-service-auth-realm_a005869dc3d479c2323115d0.yml
@@ -0,0 +1,14 @@
+schemaVersion: "1.0"
+pattern:
+ id: "a005869dc3d479c2323115d0"
+ className: "ch.nevis.admin.v4.plugin.nevisauth.patterns2.NevisAuthRealm"
+ name: "ob-service-auth-realm"
+ properties:
+ authenticate:
+ - "pattern://e1784eecf2db74484dd1e1bb"
+ tokens:
+ - "pattern://1961ee3e6021268b5b99f355"
+ auth:
+ - "pattern://d00b0dcbe241793d30daf91c"
+ logrend:
+ - "pattern://bed300e1196a171ca12db431"
diff --git a/patterns/ob-vhost_346a2bebb04a0b74c7c9b5b9.yml b/patterns/ob-vhost_346a2bebb04a0b74c7c9b5b9.yml
new file mode 100644
index 0000000..f57d9a2
--- /dev/null
+++ b/patterns/ob-vhost_346a2bebb04a0b74c7c9b5b9.yml
@@ -0,0 +1,9 @@
+schemaVersion: "1.0"
+pattern:
+ id: "346a2bebb04a0b74c7c9b5b9"
+ className: "ch.nevis.admin.v4.plugin.nevisproxy.patterns.HostContext"
+ name: "ob-vhost"
+ properties:
+ proxy:
+ - "pattern://b4d2da2fa2d0b060752a1fe2"
+ addresses: "https://ob.agov-w.azure.adnovum.net/"
diff --git a/patterns/work-idm-connector_30b947532c14be9f85f63a55.yml b/patterns/work-idm-connector_30b947532c14be9f85f63a55.yml
new file mode 100644
index 0000000..e7c2250
--- /dev/null
+++ b/patterns/work-idm-connector_30b947532c14be9f85f63a55.yml
@@ -0,0 +1,9 @@
+schemaVersion: "1.0"
+pattern:
+ id: "30b947532c14be9f85f63a55"
+ className: "ch.nevis.admin.v4.plugin.nevisidm.patterns.NevisIDMConnector"
+ name: "work-idm-connector"
+ properties:
+ url: "idm:8989"
+ kubernetes: "other_namespace"
+ kubernetesNamespace: "adn-agov-nevisidm-01-uat"
diff --git a/patterns/work-mariadb-session-store_e891ec2f4f924135261d22ce.yml b/patterns/work-mariadb-session-store_e891ec2f4f924135261d22ce.yml
new file mode 100644
index 0000000..9c1fe27
--- /dev/null
+++ b/patterns/work-mariadb-session-store_e891ec2f4f924135261d22ce.yml
@@ -0,0 +1,14 @@
+schemaVersion: "1.0"
+pattern:
+ id: "e891ec2f4f924135261d22ce"
+ className: "ch.nevis.admin.v4.plugin.nevisfido.patterns.NevisFIDODatabase"
+ name: "work-mariadb-session-store"
+ properties:
+ type: "MariaDB"
+ hosts: "var://fido-session-store-database-host"
+ database: "var://fido-session-store-database-name-uaf"
+ rootCredential: "var://fido-session-store-root-credential"
+ rootCredentialNamespace: "var://fido-session-store-root-credential-namespace"
+ user: "var://fido-session-store-database-user"
+ password: "var://fido-session-store-database-password"
+ databaseManagement: "complete"
diff --git a/variables.yml b/variables.yml
new file mode 100644
index 0000000..08dd464
--- /dev/null
+++ b/variables.yml
@@ -0,0 +1,120 @@
+schemaVersion: "1.0"
+variables:
+ agov-client-id:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 1
+ maxAllowed: 1
+ value: "100"
+ requireOverloading: true
+ agov-work-internal-trust-store-additional-trusted-certificates:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.AttachmentProperty"
+ parameters:
+ minRequired: 0
+ value: null
+ requireOverloading: true
+ fido-session-store-database-host:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.HostPortProperty"
+ parameters:
+ minRequired: 0
+ maxAllowed: 2
+ portRequired: false
+ value: "mariadb-session-store-service.adn-agov-nevisidm-ob-01-uat:3306"
+ requireOverloading: true
+ fido-session-store-database-name-uaf:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 1
+ maxAllowed: 1
+ value: "nevisfido_uaf"
+ requireOverloading: true
+ fido-session-store-database-password:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 0
+ maxAllowed: 1
+ secret: true
+ value: "sample password"
+ requireOverloading: true
+ fido-session-store-database-user:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 0
+ maxAllowed: 1
+ value: "uaf"
+ requireOverloading: true
+ fido-session-store-root-credential:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 0
+ maxAllowed: 1
+ value: "root-mariadb-session-store"
+ requireOverloading: true
+ fido-session-store-root-credential-namespace:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 0
+ maxAllowed: 1
+ value: "ns"
+ requireOverloading: true
+ nevisfido-techuser-key-key-store-content:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.AttachmentProperty"
+ parameters:
+ minRequired: 0
+ secretPreserving: true
+ value: null
+ requireOverloading: true
+ nevisfido-techuser-key-private-key-passphrase:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 0
+ maxAllowed: 1
+ secret: true
+ value: "sample password"
+ requireOverloading: true
+ nevisfido2-relying-party-id:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.HostProperty"
+ parameters:
+ minRequired: 1
+ maxAllowed: 1
+ value: "adnovum.net"
+ requireOverloading: true
+ nevisfido2-relying-party-name:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 1
+ maxAllowed: 1
+ value: "AGOV"
+ requireOverloading: true
+ nevisfido2-relying-party-origins:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 1
+ value:
+ - "https://ob.agov-w.azure.adnovum.net"
+ - "https://me.agov-w.azure.adnovum.net"
+ - "https://nevisidm.agov-w.azure.adnovum.net"
+ - "https://auth.agov-w.azure.adnovum.net"
+ requireOverloading: true
+ ob-auth-signer-key-store:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.AttachmentProperty"
+ parameters:
+ minRequired: 0
+ secretPreserving: true
+ value: null
+ requireOverloading: true
+ ob-auth-signer-private-key-passphrase:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.SimpleTextProperty"
+ parameters:
+ minRequired: 0
+ maxAllowed: 1
+ secret: true
+ value: "sample password"
+ requireOverloading: true
+ ob-auth-signer-trust-store:
+ className: "ch.nevis.admin.v4.plugin.base.generation.property.AttachmentProperty"
+ parameters:
+ minRequired: 0
+ secretPreserving: true
+ value: null
+ requireOverloading: true