The user list shows which logins are possible and which ones are not. You can add users to the scenario and configure the authentication method.
You can also use LDAP as a backend technology to handle authentication. Note that LDAP is ONLY used for authentication – in case you add new users to LDAP, CYPEX doesn’t know and won’t respond. You must add the new user to CYPEX in order for it to function properly.
In order to log into CYPEX, you must have a valid user set to active. Create such users in the admin panel. Identify users with an email address or with the “username”. Use either string to log into the system. The username is optional.
Usernames and email addresses are mapped to database users. It’s possible to map many email addresses / usernames to the same database role. The goal is to use PostgreSQL side roles as groups to assign the same permissions to various CYPEX front-end users. In most cases, this is quite useful. As an example of a real-world scenario, 100 bookkeepers identified by email might be mapped to the same server-side user.
Note that while it is possible to create roles, we’ll expand this feature in the future to make it more powerful to allow for the definition of more parameters and settings. For now, simply follow the instructions to create a role.
Modify the standard login screen in the “Login Settings” within the “Authentication” section on the admin panel. Currently, you can change two parameters: The logo and the title of the page. While changing the text is easy, changing the logo requires a bit more explanation: The logo you want to use has to be in the public folder of the web server. Otherwise, CYPEX won’t find the image.
Configuring LDAP in the graphical user interface (admin panel) is not sufficient. You need to enable some settings in the editor as well. First you need to enable LDAP in the CYPEX container. Do that by opening the “.env” file and set LDAP=on. Then update the container by running make up-d.
Once this is done, you can proceed with the graphical interface and insert your LDAP information. LDAP will then serve as a full replacement for other authentication methods.
You can use Git repositories to allow users to add extensions to CYPEX data models. Configuring the repositories will allow CYPEX to clone them and present the list of available extensions graphically so that deployments are easy.
Before you save, test the connection– use the button on the screen.
CYPEX identifies the application repositories by a file called “description.json”. The file turns a repository into an application repository. Here’s a sample that shows what this file might look like:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 |
{ "name": "cypex_demos", "shortName": "CDEM", "description": "Cypex application distribution demo repository", "fileVersion": "0.1", "applications": [ { "name": "demo_eshop", "description": "Cypex demo eshop application", "creator": "Hans", "owner": "Cybertec", "firstReleaseDate": "2019-07-26 11:33:56", "text": "Cypex demo eshop application", "releases": [ { "sourcePath": "demo_eshop/release_1", "version": "0.1", "fileNames": [ "001_base.sql", "002_sample_data.sql", "003_model.sql" ], "text": "Cypex demo eshop application", "date": "2019-07-26 11:33:56", "uninstallScript": "demo_eshop_uninstall.sql" } ] } ] } |
The structure of this file is relatively simple. CYPEX generates it when it interacts with the repository.
Application – database section | Academy overview | Application file management section >
+43 (0) 2622 93022-0
office@cybertec.at
You are currently viewing a placeholder content from Facebook. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from X. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information