RS Gateway Basic Authentication
When RS Gateway is configured not to accept anonymous requests, clients must send a login request with a username and password.
For more information about configuring anonymous users, see the discussion about RS Gateway roles.
Security Overview
- Configure Gateway Proxy RS Gateway credentials in /opt/mtx/conf/gateway_proxy.yaml. For more information, see the discussion about configuring the Gateway Proxy.
- Configure RS Gateway connection properties in
rsgateway-site.yaml.
The properties must include the credentials to connect to Gateway Proxy.
- Define the client RS Gateway logins and passwords in the
following files:
- matrixx.yaml
- mtx_notifier_camel.yaml
- Define RS Gateway clients in the
/opt/mtx/conf/rsgateway_users.yaml file.
For more information, see the discussion about RS Gateway connection properties.
- Define MATRIXX Backoffice Customer Tool users in the matrixxbct_users.yaml file.
<MtxResponseMulti>
<ResponseList>
<MtxResponseCreate>
<ObjectId>0:1:5:17</ObjectId>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>FOO</TenantId>
</MtxResponseCreate>
<MtxResponseCreate>
<ObjectId>0:1:5:19</ObjectId>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>BAR</TenantId>
</MtxResponseCreate>
<MtxResponseCreate>
<ObjectId>0:1:5:21</ObjectId>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>FOO</TenantId>
</MtxResponseCreate>
<MtxResponseCreate>
<ObjectId>0:1:5:25</ObjectId>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>BAR</TenantId>
</MtxResponseCreate>
<MtxResponseCreate>
<ObjectId>0:1:5:29</ObjectId>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>FOO</TenantId>
</MtxResponseCreate>
<MtxResponseCreate>
<ObjectId>0:1:5:30</ObjectId>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>BAR</TenantId>
</MtxResponseCreate>
<MtxResponse>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>FOO</TenantId>
</MtxResponse>
<MtxResponse>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>BAR</TenantId>
</MtxResponse>
<MtxResponse>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>FOO</TenantId>
</MtxResponse>
<MtxResponse>
<Result>0</Result>
<ResultText>OK</ResultText>
<TenantId>BAR</TenantId>
</MtxResponse>
</ResponseList>
<RouteId>1</RouteId>
<Result>0</Result>
<ResultText>OK</ResultText>
</MtxResponseMulti>
Basic Authentication
MATRIXX Backoffice Customer Tool and the Notification Server provide credentials for authentication by RS Gateway using YAML files.
RS Gateway uses HTTP Basic authentication to authenticate clients using login ID and password credentials.
http://address:port/rsgateway/login?username=username&password=password
Set-Cookie
JSESSIONID
. For example:
Set-Cookie: JSESSIONID=513D75020993448D72469669E3FD83B7; Path=/rsgateway, Expires: Tue, 03 Jul 2001 06:00:00 GMT
You must use
Set-Cookie
in the cookie header for any subsequent requests. Invalid credentials result in a 401 result code response as shown in the following JSON response:
{
"resp": {
"_resultCode": 401,
"_resultText": "Full authentication is required to access this resource"
}
}
If a login fails due to invalid credentials or an invalid cookie, the response is in the
format (XML or JSON) of the request unless the Accept
request header
indicates that the client accepts JSON. If the request is in XML and the client accepts
JSON, the 401 response is in JSON.
- std (This user is disabled out-of-the-box.)
- admin (This user is disabled out-of-the-box.)
- matrixxbct
- notifier
For information about each of these users and their roles, see the discussion about RS Gateway roles.
Additional users must be defined in a /opt/mtx/conf/rsgateway_users.yaml file. Additional authentication can be configured in the rsgateway-extensions.yaml file. .
RS Gateway determines user authentication and authorization by reading the users in the /opt/mtx/conf/rsgateway_users.yaml file. For information about adding and deleting RS Gateway users, see the discussions about adding and deleting RS Gateway users.
Client Information
MtxRequest.ApiEventSecurityInfo
) is copied to Event Detail Record (EDR)
(MtxPrimaryEvent.ApiEventSecurityInfo
) generated for the SubMan API request. Information includes:- The client IP address.
- The client username.
- The client session ID.