Table Properties#
Portal#
LDAP/LDAP-S#
Expand
Property | Description | Example |
---|---|---|
PORTAL_LDAP_URL | Add value as "LDAP_HOST: LDAP_PORT | xxx.example.com:983 |
PORTAL_LDAP_BIND_DN | CN=Bind User,OU=example,DC=ad,DC=example,DC=com | |
PORTAL_LDAP_BIND_PASSWORD | Add the password for LDAP | |
PORTAL_LDAP_SEARCH_BASE | ou=example,dc=ad,dc=example,dc=com | |
PORTAL_LDAP_USER_SEARCH_BASE | ou=example,dc=ad,dc=example,dc=com | |
PORTAL_LDAP_GROUP_SEARCH_BASE | OU=example_services,OU=example,DC=ad,DC=example,DC=com | |
PORTAL_LDAP_USERNAME_ATTRIBUTE | sAMAccountName | |
PORTAL_LDAP_DN_ATTRIBUTE | PORTAL_LDAP_DN_ATTRIBUTE: dc | |
PORTAL_LDAP_SSL_ENABLED | For SSL enabled LDAP server, set this value to true. | true |
PORTAL_LDAP_SSL_PM_GEN_TS |
Set this to true if you want Privacera Manager to generate the truststore for your ldaps server. Set this to false if you want to manually provide the truststore certificate. To learn how to upload SSL certificates, click here. |
true |
OKTA#
Expand
Property | Description | Example |
---|---|---|
OAUTH_CLIENT_CLIENTSECRET | Get it from the Prerequisites section above. | OAUTH_CLIENT_CLIENTSECRET: "4hb88P9UZmxxxxxxxxm1WtqsaQRv1FZDZiaOT0Gm" |
OAUTH_CLIENT_CLIENTID | Get it from the Prerequisites section above. | 0oa63edjkaoNHGYTS357 |
OAUTH_CLIENT_TOKEN_URI | Get it from the Prerequisites section above. | https://dev-396511.okta.com/oauth2/default/v1/token |
OAUTH_CLIENT_AUTH_URI | Get it from the Prerequisites section above. | https://dev-396511.okta.com/oauth2/default/v1/authorize |
OAUTH_RESOURCE_USER_INFO_URI | Get it from the Prerequisites section above. | https://dev-396511.okta.com/oauth2/default/v1/userinfo |
PORTAL_UI_SSO_ENABLE | Property to enable/disable OKTA | true |
SAML#
Expand
Property | Description | Example |
---|---|---|
AAD_SSO_ENABLE | Enabled by default. | |
SAML_ENTITY_ID | Get the value from the Prerequisites section. | privacera-portal |
SAML_BASE_URL | https://{{app_hostname}}:6868 | |
PORTAL_UI_SSO_BUTTON_LABEL | Azure AD Login | |
PORTAL_UI_SSO_URL | saml/login | |
SAML_GLOBAL_LOGOUT |
Enabled by default. The global logout for SAML is enabled. Once a logout is initiated, all the sessions you've accessed from the browser would be terminated from the Identity Provider (IDP).
|
|
META_DATA_XML | Browse and select the Federation Metadata XML, which you downloaded in the Prerequisites section. |
AuditServer#
Expand
Property | Description | Example |
---|---|---|
AUDITSERVER_AUTH_TYPE |
Set this property to enable basic authentication. Value: None/Basic |
basic |
AUDITSERVER_AUTH_USER AUDITSERVER_AUTH_PASSWORD |
If the above authentication type is set to basic, assign a username and password. You can assign any user credentials. Value: True/False |
AUDITSERVER_AUTH_USER: "padmin" AUDITSERVER_AUTH_PASSWORD: "padmin" |
AUDITSERVER_SOLR_DESTINATION | Enable if the audit destination in Solr. |
Aurora DB#
PostgreSQL#
Expand
Property | Description |
---|---|
EXTERNAL_DB_HOST EXTERNAL_DB_NAME |
Enter the hostname of the PostgreSQL server, and the name of the database you want to connect to. |
EXTERNAL_DB_USER EXTERNAL_DB_PASSWORD |
Enter the credentials of the user who has access to the database. |
MySQL#
Expand
Property | Description |
---|---|
EXTERNAL_DB_HOST EXTERNAL_DB_NAME |
Enter the hostname of the PostgreSQL server, and the name of the database you want to connect to. |
EXTERNAL_DB_USER EXTERNAL_DB_PASSWORD |
Enter the credentials of the user who has access to the database. |
Solr#
Expand
Property | Description |
---|---|
SOLR_BASIC_AUTH_ENABLED | Set this property to true to enable the basic authentication. |
SOLR_BASIC_AUTH_USER SOLR_BASIC_AUTH_PASSWORD |
Assign the user credentials for the Solr authentication. |