Extensions
Configuration that applies to the catalogue of extensions to the framework.
Property | Default | Description | ||
---|---|---|---|---|
isis.extensions.command-replay. |
null |
|||
isis.extensions.command-replay. |
null |
|||
isis.extensions.command-replay. |
null |
|||
isis.extensions.command-replay. |
null |
|||
isis.extensions.command-replay. |
null |
|||
isis.extensions.command-replay. |
null |
|||
isis.extensions.command-replay. |
null |
|||
isis.extensions.command-replay. |
Number of milliseconds before running again. |
|||
isis.extensions.command-replay. |
Number of milliseconds before starting the job. |
|||
isis.extensions.command-replay. |
null |
|||
isis.extensions.command-replay. |
The user that runs the replay session secondary. |
|||
isis.extensions.command-replay. |
null |
|||
isis.extensions.cors. |
TODO missing java-doc |
|||
isis.extensions.cors. |
Which HTTP headers are allowed in a CORS request. For more information, check the usage of the |
|||
isis.extensions.cors. |
Which HTTP methods are permitted in a CORS request. For more information, check the usage of the |
|||
isis.extensions.cors. |
Which origins are allowed to make CORS requests. The default is the wildcard ("*") but this can be made more restrictive if necessary. For more information, check the usage of the |
|||
isis.extensions.cors. |
Which HTTP headers are exposed in a CORS request. For more information, check the usage of the |
|||
isis.extensions.secman. |
Whether delegated users should be autocreated as locked (the default) or unlocked. BE AWARE THAT if any users are auto-created as unlocked, then the set of roles that they are given should be highly restricted !!! |
|||
isis.extensions.secman. |
If there are conflicting (allow vs veto) permissions at the same scope, then this policy determines whether to prefer to allow the permission or to veto it. This is only used if a |
|||
isis.extensions.secman.seed.admin. |
An (optional) additional set of namespaces that the admin role is granted. These are in addition to the main namespaces granted. @see NamespacePermissions#getSticky() |
|||
isis.extensions.secman.seed.admin. |
The set of namespaces to which the admin role is granted. These namespaces are intended to be sufficient to allow users with this admin role to be able to administer the security module itself, for example to manage users and roles. The security user is not necessarily able to use the main business logic within the domain application itself, though. These roles cannot be removed via user interface
@see NamespacePermissions#getAdditional() |
|||
isis.extensions.secman.seed.admin. |
The corresponding password for admin user. @see #getUserName() |
|||
isis.extensions.secman.seed.admin. |
The name of security admin role. Users with this role (in particular, the default admin user are granted access to a set of namespaces ( @see Admin#getUserName() @see NamespacePermissions#getSticky() @see NamespacePermissions#getAdditional() |
|||
isis.extensions.secman.seed.admin. |
The name of the security super user. This user is automatically made a member of the admin role, from which it is granted permissions to administer other users. The password for this user is set in @see #getPassword() @see #getRoleName() |
|||
isis.extensions.secman.seed. |
The role name for regular users of the application, granting them access to basic security features. The exact set of permissions is hard-wired in the |
|||
Whether the presence of SecMan should result in the automatic suppression of the This is normally what is required as SecMan’s |
||||
isis.extensions.secman. |
The set of roles that users registering with the app are granted automatically. If using the wicket viewer, also requires isis.viewer.wicket.suppress-signup to be set |
|||
isis.extensions.session-log. |
null |