Search Results

Application Server / Authentication Providers / Google

Google Cloud CMS provides integrated authentication and single-sign-on (SSO) with Google. This page describes the authentication provider available for the Cloud CMS Application Server that enables your mobile or web applications as well as the Cloud CMS user interface or API to authenticate against Google. For more information, see our documentation on the general Authentication / SSO framework. API Keys You will need to configure a Google application and have the following information availabl

Score: 7.8470187

UI Developer Guide / Plugins / Google Docs

Google Docs Documentation pending, coming soon.

Score: 7.1430545

UI Developer Guide / Plugins / Plugins

Plugins Cloud CMS plugins let you enhance your editorial user interface with new features and capabilities that integrate to popular third-party services like YouTube, Vimeo and Google Docs. Plugins provision your editorial environment with things like: new form field types that integrate to third-party services new user interface pages for browsing and working with media from third-party services new actions or rules to enhance your repository's business logic new content types, associations an

Score: 5.2004304

Oauth 2.0 tokens

Each response from Cloud CMS provides two tokens: an access token and a refresh token. The access token is the one that you need to attach to every API call. It gets passed through the Authorization header as "bearer " and Cloud CMS uses this to identify who the authenticated user is (and thus, what resources they have access to and so forth). By default, the access token has a lifespan of 24 hours. After that period of time, it is no longer valid and any requests will come back wit

Score: 4.5524325

Does Cloud CMS support Single Sign On (SSO)?

Yes, Cloud CMS supports SSO (Single Sign On) with a variety of authentication providers. Many of these providers are offered out-of-the-box -- including providers for Keycloak, Google, CAS and more. In addition, we allow you to implement your own SSO providers and customize the authentication handshake. To learn more about how Cloud CMS authentication providers work, check out the following documentation: Custom Authenticators a

Score: 4.2357554

UI Developer Guide / Bindings / Project Bar - Buttons

Project Bar - Buttons The projectbar-buttons key defines actions that should appear in the project button bar at the top of project pages. This bar is used to convey project information and also provides a workspace selector allowing users to toggle between workspaces. The base configuration looks like this: { "config": { "projectbar-buttons": [] } } Example - Add an Action { "config": { "projectbar-buttons": [{ "key": "open-website", "title":

Score: 3.7614264

Docker Guide / User Interface / Extensions

Extensions The Docker-based Cloud CMS UI provides additional extension patterns beyond the AMD-driven mechanism for user interface components and screens. Since Docker allows you to run on-premise, you can use these extension patterns to influence more foundational changes to the way the application works. Environment Variables When the Cloud CMS user interface starts up, it looks to environment variables to tell it whether there are any extensions available to be loaded. Extensions are stored w

Score: 3.7492735

Application Server / Services / Authentication

Authentication The Authentication Service provides a full authentication framework for stateless and session-based applications. It authenticates requests against back end providers and offers interpretation and parsing of request scope information to provide Single-Sign-On (SSO). Authenticated requests will have user accounts created and synchronized within Cloud CMS either automatically or as part of a registration form process. Authenticated users have Cloud CMS connectivity state managed for

Score: 3.6500509

API / Data Types / Email Provider

Email Provider Type emailProvider Datastore Type application Supports authorities, permissions, transfer Configuration Email Providers maintain a configuration that you can adjust or consult as you create, update and query for them. The following table presents you the configuration properties. Property Type Default Read-Only Description host text The host address of the email server. Example: port number The connection port on the email server. Example: 25 username text The usern

Score: 3.1426923