Bind Access Token Validator

The Bind Access Token Validator may be used to validate access tokens that were generated in response to LDAP bind operations that included the generate access log tokens request control, or in response to Directory REST API authenticate requests. This configuration can also be used to manage the server's ability to generate those tokens.

Parent Component Relations from This Component Properties dsconfig Usage

Parent Component

The Bind Access Token Validator component inherits from the Access Token Validator

Relations from This Component

The following components have a direct aggregation relation from Bind Access Token Validators:

Properties

The properties supported by this managed object are as follows:


General Configuration Basic Properties: Advanced Properties:
 identity-mapper  subject-claim-name
 description
 enabled
 evaluation-order-index
 persist-access-tokens
 maximum-token-lifetime
 allowed-authentication-type
 allowed-sasl-mechanism
 generate-token-result-criteria
 included-scope

Basic Properties

identity-mapper

Property Group
General Configuration
Description
Specifies the name of the Identity Mapper that should be used for associating user entries with Bearer token subject names. The claim name from which to obtain the subject (i.e. the currently logged-in user) may be configured using the subject-claim-name property.
Default Value
Requests must specify a fully qualified DN. No attempt will be made to map a user name to a DN.
Allowed Values
The DN of any Identity Mapper.
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

description

Property Group
General Configuration
Description
A description for this Access Token Validator
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

enabled

Property Group
General Configuration
Description
Indicates whether this Bind Access Token Validator is enabled for use in Directory Server.
Default Value
None
Allowed Values
true
false
Multi-Valued
No
Required
Yes
Admin Action Required
If you enable the bind access token validator, you should also ensure that the server is configured with an OAUTHBEARER SASL mechanism handler to allow the server to authenticate clients using the generated tokens.

evaluation-order-index

Property Group
General Configuration
Description
When multiple Access Token Validators are defined for a single Directory Server, this property determines the evaluation order for determining the correct validator class for an access token received by the Directory Server. Values of this property must be unique among all Access Token Validators defined within Directory Server but not necessarily contiguous. Access Token Validators with a smaller value will be evaluated first to determine if they are able to validate the access token.
Default Value
None
Allowed Values
An integer value. Lower limit is 0.
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

persist-access-tokens

Property Group
General Configuration
Description
Indicates whether access tokens should be persisted in user entries. If access tokens should be persisted, then they will only be accepted if the token is found in the user's entry, and a token may be revoked by removing it from the user's entry. If access tokens should not be persisted, then the token will be accepted as long as it appears valid and is not expired.
Default Value
false
Allowed Values
true
false
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

maximum-token-lifetime

Property Group
General Configuration
Description
Specifies the maximum length of time that a generated token should be considered valid. If this is not specified, then generated access tokens will not expire.
Default Value
None
Allowed Values
A duration. Lower limit is 1 milliseconds.
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

allowed-authentication-type

Property Group
General Configuration
Description
Specifies the authentication types for bind operations that may be used to generate access tokens, and for which generated access tokens will be accepted.
Default Value
simple
sasl
Allowed Values
simple - Indicates that access tokens may be generated in response to simple bind operations, and that those access tokens may be considered valid when presented for authentication.

sasl - Indicates that access tokens may be generated in response to SASL bind operations, and that those access tokens may be considered valid when presented for authentication. The allowed-sasl-mechanism property may optionally be used to restrict the set of SASL mechanisms for which tokens may be generated.
Multi-Valued
Yes
Required
No
Admin Action Required
None. Modification requires no further action

allowed-sasl-mechanism

Property Group
General Configuration
Description
Specifies the names of the SASL mechanisms for which access tokens may be generated, and for which generated access tokens will be accepted. This property will only be used if the allowed-authentication-type property includes a value of sasl. If this property has one or more values, then only the specified SASL mechanisms will be allowed. If no values are specified, then any SASL mechanism will be allowed.
Default Value
None
Allowed Values
A string
Multi-Valued
Yes
Required
No
Admin Action Required
None. Modification requires no further action

generate-token-result-criteria

Property Group
General Configuration
Description
A reference to a request criteria object that may be used to identify the types of bind operations for which access tokens may be generated. If no criteria is specified, then access tokens may be generated for any bind operations that satisfy the other requirements configured in this validator.
Default Value
None
Allowed Values
The DN of any Result Criteria.
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

included-scope

Property Group
General Configuration
Description
Specifies the names of any scopes that should be granted to a client that authenticates with a bind access token. By default, no scopes will be granted.
Default Value
None
Allowed Values
A string
Multi-Valued
Yes
Required
No
Admin Action Required
None. Modification requires no further action


Advanced Properties

subject-claim-name (Advanced Property)

Property Group
General Configuration
Description
The name of the token claim that contains the subject, i.e. the logged-in user in an access token. This property goes hand-in-hand with the identity-mapper property and tells the Identity Mapper which field to use to look up the user entry on the server.
Default Value
sub
Allowed Values
A string
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action


dsconfig Usage

To list the configured Access Token Validators:

dsconfig list-access-token-validators
     [--property {propertyName}] ...

To view the configuration for an existing Access Token Validator:

dsconfig get-access-token-validator-prop
     --validator-name {name}
     [--tab-delimited]
     [--script-friendly]
     [--property {propertyName}] ...

To update the configuration for an existing Access Token Validator:

dsconfig set-access-token-validator-prop
     --validator-name {name}
     (--set|--add|--remove) {propertyName}:{propertyValue}
     [(--set|--add|--remove) {propertyName}:{propertyValue}] ...