Microgateway 10.5 | webMethods Microgateway Help | webMethods Microgateway | Microgateway Configuration
 
Microgateway Configuration
The security settings can be pulled from API Gateway directly or can be configured in the custom settings YAML file. The security settings pulled directly from API Gateway take precedence over the security settings configured in the custom settings YAML file.
Sample configuration file with the aliases
---
security_settings:
providers:
- !<clientMetadataMapping>
id: "PingFederate"
name: "PingFederate"
type: "clientMetadataMapping"
owner: "Administrator"
providerName: "PingFederate"
implNames:
grant_types: "grantTypes"
logo_uri: "logoUrl"
scope: "restrictedScopes"
client_secret: "secret"
redirect_uris: "redirectUris"
client_name: "name"
client_id: "clientId"
extendedValues: {}
extendedValuesV2:
- endpointType: "CLIENT_REGISTRATION"
key: "restrictScopes"
value: "true"
- endpointType: "CLIENT_UPDATE"
key: "restrictScopes"
value: "true"
- !<clientMetadataMapping>
id: "OKTA"
name: "OKTA"
type: "clientMetadataMapping"
owner: "Administrator"
providerName: "OKTA"
implNames: {}
extendedValues: {}
extendedValuesV2: []
auth_servers:
- !<authServerAlias>
id: "local"
name: "local"
description: "Gateway default authorization server"
type: "authServerAlias"
owner: "Administrator"
localIntrospectionConfig:
issuer: "JWTISSUER"
remoteIntrospectionConfig:
introspectionEndpoint: "http://localhost:5555/invoke/pub.oauth/instrospectToken"
clientId: "introspection-client"
clientSecret: "********************************"
user: "Administrator"
tokenGeneratorConfig:
audience: "SAG"
expiry: 30
algorithm: "RS256"
accessTokenExpInterval: 3600
authCodeExpInterval: 3600
sslConfig:
keyStoreAlias: "DEFAULT_IS_KEYSTORE"
keyAlias: "ssos"
metadata: {}
authServerScopes:
- "Test_LocalOauth"
- "Dev_LocalOauth"
supportedGrantTypes:
- "authorization_code"
- "password"
- "client_credentials"
- "refresh_token"
- "implicit"
oauthTokens: []
---