Setup Java angular sample app
- Deploy the Java angular sample app
- Configure the tenant https://identity-developer.cyberark.com/docs/setup-tenant-for-java-angular-app
After deploying the sample app, the sample app has to be configured with the required tenant details.
Once the app is up and running, click on the Settings link.
Update the settings form with the data obtained while configuring the tenant.
For further reference click here.
Any custom image can be uploaded with the supported png, jpg, gif, ico, bmp image file types.
Image will be auto-scaled accordingly.
CyberArk Tenant section:
|URL||Provide the tenant URL|
|Login Suffix||Navigate to suffix section under settings->customization->Login section to identify your tenant login suffix.|
|Role Name||Provide the role name that was created in Tenant Creation section. This role is mapped with the policies which are linked with webapps.|
|Login Widget ID||Navigate to Authentication Widgets under settings->customization->other section to create a personalized login widget and download the HTML code to get the widget id.|
|MFA Widget ID||Navigate to Authentication Widgets under settings->customization->other section to create a personalized MFA widget and download the HTML code to get the widget id.|
OAuth 2.0 section:
Refer to https://identity-developer.cyberark.com/docs/setup-tenant-for-java-angular-app#step-4-setup-an-oauth-client-application to set up the OAuth app on the admin portal.
|Application ID||Provide the OAuth app name created in Tenant Creation section. We can find this value on the OAuth2 Client app Settings page.|
|Username||Provide the non-interactive service user details that are linked with the web app. The username needs to be suffixed with the login suffix.|
|*Scopes**||Provide the scope name used while creating OAuth web app scopes in Tenant Creation section as mentioned below.|
OpenID Connect section:
Refer to https://identity-developer.cyberark.com/docs/setup-tenant-for-java-angular-app#setup-an-openid-connect-application to set up the OpenID Connect app on the admin portal.
|Application ID||Provide the OpenID Connect Application ID in the Settings section of the OpenID Connect web application.|
|Client ID||Provide the Client ID available in the Trust section of the OpenID Connect web application in the created tenant. Please ensure that the client ID should be in GUID format. For reference, please check the below image.|
|Client Secret||Provide the Client Secret in the Trust section of the OpenID Connect web application in the created tenant.|
|Scopes||Standard OpenID Connect scopes are OpenID, profile, email, address, and phone. Custom scopes are also supported.|
Refer to https://identity-developer.cyberark.com/docs/setup-tenant-for-java-angular-app#configure-recaptcha-for-signup to set up the reCaptcha settings on the admin portal.
|Enable Captcha for SignUp flow||The sign-up API and widget will have CAPTCHA as a mandatory requirement if enabled. By default, it's disabled on the angular app. Also, Ensure the captcha settings are in sync with the captcha settings on the admin portal.|
|Site key||The site key is used to invoke the reCAPTCHA service on your site.|
- Upon clicking on Save, details will be successfully saved.
- User can click on the Home button from the top-right corner of the page to proceed further.
Updated 9 months ago