keycloak-scim/authorization_services/topics/resource-server-enable-authorization.adoc

72 lines
3.6 KiB
Text
Raw Normal View History

2016-11-29 15:30:53 +00:00
[[_resource_server_enable_authorization]]
= Enabling Authorization Services
2016-06-16 17:08:04 +00:00
To turn your OIDC Client Application into a resource server and enable fine-grained authorization, select *Access type* *confidential* and click the *Authorization Enabled* switch to *ON* then click *Save*.
2016-06-16 17:08:04 +00:00
.Enabling Authorization Services
2017-08-28 12:50:14 +00:00
image:{project_images}/resource-server/client-enable-authz.png[alt="Enabling Authorization Services"]
2016-06-16 17:08:04 +00:00
A new Authorization tab is displayed for this client. Click the *Authorization* tab and a page similar to the following is displayed:
2016-06-16 17:08:04 +00:00
.Resource Server Settings
2017-08-28 12:50:14 +00:00
image:{project_images}/resource-server/authz-settings.png[alt="Resource Server Settings"]
2016-06-16 17:08:04 +00:00
The Authorization tab contains additional sub-tabs covering the different steps that you must follow to actually protect your application's resources. Each tab is covered separately by a specific topic in this documentation. But here is a quick description about each one:
2016-06-16 17:08:04 +00:00
* *Settings*
+
2017-03-27 20:11:01 +00:00
General settings for your resource server. For more details about this page see the xref:resource_server_settings[Resource Server Settings] section.
2016-06-16 17:08:04 +00:00
* *Resource*
+
2017-08-28 12:50:14 +00:00
From this page, you can manage your application's <<_resource_overview, resources>>.
2016-06-16 17:08:04 +00:00
* *Authorization Scopes*
2016-06-16 17:08:04 +00:00
+
2017-08-28 12:50:14 +00:00
From this page, you can manage <<_resource_overview, scopes>>.
2016-06-16 17:08:04 +00:00
* *Policies*
+
2017-08-28 12:50:14 +00:00
From this page, you can manage <<_policy_overview, authorization policies>> and define the conditions that must be met to grant a permission.
2016-06-16 17:08:04 +00:00
* *Permissions*
+
2017-08-28 12:50:14 +00:00
From this page, you can manage the <<_permission_overview, permissions>> for your protected resources and scopes by linking them with the policies you created.
2016-06-16 17:08:04 +00:00
* *Evaluate*
+
2017-08-28 12:50:14 +00:00
From this page, you can <<_policy_evaluation_overview, simulate authorization requests>> and view the result of the evaluation of the permissions and authorization policies you have defined.
2016-06-16 17:08:04 +00:00
* *Export Settings*
+
From this page, you can <<_resource_server_import_config, export>> the authorization settings to a JSON file.
2017-03-27 20:11:01 +00:00
[[resource_server_settings]]
== Resource Server Settings
2016-06-16 17:08:04 +00:00
On the Resource Server Settings page, you can configure the policy enforcement mode, allow remote resource management, and export the authorization configuration settings.
2016-06-16 17:08:04 +00:00
* *Policy Enforcement Mode*
+
Specifies how policies are enforced when processing authorization requests sent to the server.
2016-06-16 17:08:04 +00:00
+
** *Enforcing*
+
(default mode) Requests are denied by default even when there is no policy associated with a given resource.
2016-06-16 17:08:04 +00:00
+
** *Permissive*
+
Requests are allowed even when there is no policy associated with a given resource.
+
2016-06-16 17:08:04 +00:00
** *Disabled*
+
Disables the evaluation of all policies and allows access to all resources.
2016-06-16 17:08:04 +00:00
+
* *Decision Strategy*
+
This configurations changes how the policy evaluation engine decides whether or not a resource or scope should be granted based on the outcome from all evaluated permissions. `Affirmative` means that at least one permission must evaluate to a positive decision in order grant access to a resource and its scopes. `Unanimous` means that all permissions must evaluate to a positive decision in order for the final decision to be also positive. As an example, if two permissions for a same resource or scope are in conflict (one of them is granting access and the other is denying access), the permission to the resource or scope will be granted if the choosen strategy is `Affirmative`. Otherwise, a single deny from any permission will also deny access to the resource or scope.
+
* *Remote Resource Management*
2016-06-16 17:08:04 +00:00
+
Specifies whether resources can be managed remotely by the resource server. If false, resources can be managed only from the administration console.