...
Setting | Purpose |
---|---|
dtp.autoconfig=true|false | Enables auto-configuration using settings stored in DTP. This setting does not apply to the GUI and is ignored during import (see "-settings" or "-property" on the CLI Options page for more information about that process). Default: |
dtp.enabled=true|false | Determines whether SOAtest or Virtualize is connected to DTP. Default: |
dtp.url=[url] | Specifies the URL for the DTP server. Remember to include the https:// protocol; DTP does not support http:// connections. If DTP is deployed to a location other than the root of the host server, the URL should include a context path (a relative path from the host name; for example: https://server.company.com:8443/contextPath ). This may be the case if your organization uses a reverse proxy. Refer to the DTP documentation on https://docs.parasoft.com for additional information about reverse proxy server configuration and context path configuration. |
dtp.user=[username] | Specifies the username for DTP user authentication. |
dtp.password=[password] | Specifies the password for DTP user authentication. We strongly recommend encoding encrypting your password to ensure successful authentication and a secure connection. You can encode encrypt your password by running a command line instance of SOAtest with the See CLI Options for additional information. |
report.dtp.publish=true | Enables/disables publishing test result data to DTP. |
dtp.project=[project_name] | Specifies the name of the DTP project to which you want these results linked. If the project does not exist in DTP and the user specified in For more details on general projects, see Connecting to DTP. Default: |
...
Setting | Purpose |
---|---|
soatest.license.use_network=true|false | Enables/disables network-based licenses. Set to Set to Example: Default: |
license.network.url=[url] | Specifies the License Server URL. Remember to include the |
license.network.user=[username] | Specifies the username for authentication on the Licenses Server specified with the This option requires the Example: |
license.network.password=[password] | Specifies the password for authentication on the License Server specified with the This option requires the We strongly recommend encoding encrypting your password to ensure successful authentication and a secure connection. You can encode encrypt your password by running a command line instance of SOAtest with the See See CLI Options for additional information. |
license.network.use.specified.server=true|false | This option enables SOAtest to connect to either DTP and License Server, or two instances of DTP simultaneously. Set to Set to |
license.network.auth.enabled=true|false | Enables or disables authentication on the License Server specified with the This option requires the |
| Specifies the type of license to retrieve from License Server.
Example:
Default: |
soatest.license.autoconf.timeout=[seconds] | Specifies the maximum number of seconds to wait for the license to be automatically configured from License Server. Default: |
soatest.license.local.password=[password] | Specifies the local password provided to you by Parasoft. |
soatest.license.wait.for.tokens.time=[time in minutes] | Specifies how long to wait for a license if a license is not currently available. Example:
Default: |
...
Setting | Purpose |
---|---|
oidc.enabled=true|false | Enables or disables user authentication via OpenID Connect. Default: |
oidc.issuer.uri=[uri] | Specifies the URI of the OpenID Connect server. Example: |
oidc.client.id=[user] | Specifies the ID provided by your OpenID Connect server. |
oidc.client.secret=[password] | Specifies the application's password to the OpenID Connect server. |
oidc.scopes=[list of scopes] | Defines a space-separated list of scopes, which are used during authentication to authorize access to a user's details. Default: |
oidc.cli.mode=devicecode|certificate | Specifies the method that will be used to authenticate the user on the OpenID Connect server. Default: |
oidc.devicecode.token.file=[path] | Specifies the path to the custom token file containing user authentication information. Example: |
oidc.keystore=[path] | Specifies the path to the keystore file that stores the certificate to authenticate the user on the OpenID Connect server. If only FIPS-approved algorithms are allowed, the keystore file must be in BCFKS (Bouncy Castle FIPS Keystore) format. Example: |
oidc.keystore.alias=[alias] | Specifies the alias you want to use to authenticate on the OpenID Connect server. You may need to configure this setting if your keystore file contains multiple entries. Example: |
oidc.keystore.password=[password] | Specifies the password to the the keystore file that stores the self-signed client certificate. We highly recommend that you use an encoded strongly recommend encrypting your password to ensure successful authentication and increase the level of securitya secure connection. You can encode encrypt your password by running a command line instance of SOAtest with the Example: |
Technical Support Settings
...
Setting | Purpose |
---|---|
env.manager.server | Specifies location of the CTP server. Required Example: |
env.manager.server.name | Specifies the name that will be used to label this server in CTP. You can specify any value that helps you identify this server. Optional Example: |
env.manager.notify | Determines whether the Virtualize server notifies CTP when virtual assets are deployed. Optional Example: |
env.manager.username | Specifies the username for logging into CTP. Optional Example: |
env.manager.password | Specifies the password for logging into CTP. Optional Example: We strongly recommend encoding encrypting your password to ensure successful authentication and a secure connection. You can encode encrypt your password by running a command line instance of SOAtest or Virtualize with the See See CLI Options for additional information. |
Sample Settings
Example 1
Code Block |
---|
# Report settings report.developer_errors=true report.developer_reports=true report.format=html session.tag=<project name> # Mail settings: report.mail.enabled=true report.mail.cc=<[email protected];[email protected]> report.mail.server=mail.company.com report.mail.domain=company.com report.mail.subject=<Static Analysis results on Project X> report.mail.attachments=true |
...