keycloak-scim/topics/resource-server/enable-authorization.adoc

66 lines
2.8 KiB
Text
Raw Normal View History

2016-06-16 17:08:04 +00:00
== Enabling Authorization Services
To turn your OIDC Client Application into a resource server and enable fine-grained authorization, click the *Authorization Enabled* switch to *ON* and click *Save*.
2016-06-16 17:08:04 +00:00
.Enabling Authorization Services
image:../../images/resource-server/client-enable-authz.png[alt="Enabling Authorization Services"]
A new Authorization tab is displayed for this client. Click the *Authorization* tab and a page similar to the following is displayed:
2016-06-16 17:08:04 +00:00
.Resource Server Settings
image:../../images/resource-server/authz-settings.png[alt="Resource Server Settings"]
The Authorization tab contains additional sub-tabs covering the different steps that you must follow to actually protect your application's resources. Each tab is covered separately by a specific topic in this documentation. But here is a quick description about each one:
2016-06-16 17:08:04 +00:00
* *Settings*
+
General settings for your resource server. More details about this page in this section.
* *Resource*
+
From this page, you can manage your application's link:../resource/overview.html[resources].
2016-06-16 17:08:04 +00:00
* *Scope*
+
From this page, you can manage link:../resource/overview.html[scopes].
2016-06-16 17:08:04 +00:00
* *Policies*
+
From this page, you can manage link:../policy/overview.html[authorization policies] and define the conditions that must be met to grant a permission.
2016-06-16 17:08:04 +00:00
* *Permissions*
+
From this page, you can manage the link:../permission/overview.html[permissions] for your protected resources and scopes by linking them with the policies you created.
2016-06-16 17:08:04 +00:00
* *Evaluate*
+
From this page, you can link:../policy-evaluation-tool/overview.html[simulate authorization requests] and view the result of the evaluation of the permissions and authorization policies you have defined.
2016-06-16 17:08:04 +00:00
=== Resource Server Settings
On the Resource Server Settings page, you can configure the policy enforcement mode, allow remote resource management, and export the authorization configuration settings.
2016-06-16 17:08:04 +00:00
* *Policy Enforcement Mode*
+
Specifies how policies are enforced when processing authorization requests sent to the server.
2016-06-16 17:08:04 +00:00
+
** *Enforcing*
+
(default mode) Requests are denied by default even when there is no policy associated with a given resource.
2016-06-16 17:08:04 +00:00
+
** *Permissive*
+
Requests are allowed even when there is no policy associated with a given resource.
+
2016-06-16 17:08:04 +00:00
** *Disabled*
+
Disables the evaluation of all policies and allows access to all resources.
2016-06-16 17:08:04 +00:00
+
* *Allow Remote Resource Management*
+
Specifies whether resources can be managed remotely by the resource server. If false, resources can be managed only from the administration console.
2016-06-16 17:08:04 +00:00
+
* *Export Settings*
+
You can export the authorization configuration settings to a JSON file. Click *Export* to display the complete JSON configuration for download. The configuration file contains everything defined for a resource server: protected resources, scopes, permissions, and policies.