Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Published by Scroll Versions from space FUNCTDEV and version SVC2025.1

...

SettingPurpose
dtp.autoconfig=true|false

Enables auto-configuration using settings stored in DTP. This setting does not apply to the GUI and is ignored during import (see "-settings" or "-property" on the CLI Options page for more information about that process).

Default: false

dtp.enabled=true|false

Determines whether SOAtest or Virtualize is connected to DTP. 

Default: false

dtp.url=[url]Specifies the URL for the DTP server. Remember to include the https:// protocol; DTP does not support http:// connections. If DTP is deployed to a location other than the root of the host server, the URL should include a context path (a relative path from the host name; for example: https://server.company.com:8443/contextPath). This may be the case if your organization uses a reverse proxy. Refer to the DTP documentation on https://docs.parasoft.com for additional information about reverse proxy server configuration and context path configuration.
dtp.user=[username]Specifies the username for DTP user authentication.
dtp.password=[password]

Specifies the password for DTP user authentication.

We strongly recommend encoding encrypting your password to ensure successful authentication and a secure connection. You can encode encrypt your password by running a command line instance of SOAtest with the -encodepass flag. The command line tool will generate an encoded string encrypted string using AES 256-bit encryption that you can use in in the configuration file. 

See CLI Options for additional information.

report.dtp.publish=trueEnables/disables publishing test result data to DTP.
dtp.project=[project_name]

Specifies the name of the DTP project to which you want these results linked. If the project does not exist in DTP and the user specified in dtp.user has sufficient permissions to create projects, the project will be automatically created.

For more details on general projects, see Connecting to DTP.

Default: Default Project

...

SettingPurpose
soatest.license.use_network=true|false

Enables/disables network-based licenses.

Set to true and configure either the License Server setting (license.network.url) or the Parasoft DTP Settings to use a network license.  

Set to false and configure the soatest.license.local.password setting to use a local license.

Example: soatest.license.use_network=true

Default: true

license.network.url=[url]

Specifies the License Server URL. Remember to include the https:// protocol; License Server does not support http:// connections. If License Server is deployed to a location other than the root of the host server, the URL should include a context path (a relative path from the host name; for example: https://server.company.com:8443/contextPath). This may be the case if your organization uses a reverse proxy. Refer to the License Server documentation on https://docs.parasoft.com for additional information about reverse proxy server configuration and context path configuration.

license.network.user=[username] 

Specifies the username for authentication on the Licenses Server specified with the license.network.url option.

This option requires the license.network.use.specified.server and license.network.auth.enabled options to be set to true.

Example: license.network.user=JohnDoe

license.network.password=[password] 

Specifies the password for authentication on the License Server specified with the license.network.url option.

This option requires the license.network.use.specified.server and license.network.auth.enabled options to be set to true and the license.network.user to be configured.

We strongly recommend encoding encrypting your password to ensure successful authentication and a secure connection. You can encode encrypt your password by running a command line instance of SOAtest with the -encodepass flag. The command line tool will generate an encoded string encrypted string using AES 256-bit encryption that you can use in in the configuration configuration file. 

See See CLI Options for additional information.

license.network.use.specified.server=true|false

This option enables SOAtest to connect to either DTP and License Server, or two instances of DTP simultaneously.

Set to false if you want to retrieve a license from the DTP server specified with Parasoft DTP Settings

Set to true if you want to retrieve a license from the server specified with the license.network.url option. 

license.network.auth.enabled=true|false

Enables or disables authentication on the License Server specified with the license.network.url option.

This option requires the license.network.use.specified.server option to be set to true.

soatest.license.network.edition=[edition_name]

Specifies the type of license to retrieve from License Server. 

[edition_name] can be server_edition. To use a custom edition, do not set anything after the "="; simply leaving the value empty.

Example:

soatest.license.network.edition=desktop_edition

soatest.license.network.edition=server_edition

Default: custom_edition

soatest.license.autoconf.timeout=[seconds]

Specifies the maximum number of seconds to wait for the license to be automatically configured from License Server.

Default: 20

soatest.license.local.password=[password]

Specifies the local password provided to you by Parasoft. 

soatest.license.wait.for.tokens.time=[time in minutes]

Specifies how long to wait for a license if a license is not currently available. 

Example:

soatest.license.wait.for.tokens.time=3.

Default: 0

...

SettingPurpose
oidc.enabled=true|false

Enables or disables user authentication via OpenID Connect.

Default: false

oidc.issuer.uri=[uri]

Specifies the URI of the OpenID Connect server.

Example: oidc.issuer.uri=http://server.com/

oidc.client.id=[user]

Specifies the ID provided by your OpenID Connect server.

oidc.client.secret=[password]

Specifies the application's password to the OpenID Connect server.

oidc.scopes=[list of scopes]

Defines a space-separated list of scopes, which are used during authentication to authorize access to a user's details.

Default: openid profile offline_access

oidc.cli.mode=devicecode|certificate

Specifies the method that will be used to authenticate the user on the OpenID Connect server.

Default: devicecode

oidc.devicecode.token.file=[path]

Specifies the path to the custom token file containing user authentication information.

Example: oidc.devicecode.token.file=C:\\parasoft\\token

oidc.keystore=[path]

Specifies the path to the keystore file that stores the certificate to authenticate the user on the OpenID Connect server. If only FIPS-approved algorithms are allowed, the keystore file must be in BCFKS (Bouncy Castle FIPS Keystore) format.

Example: oidc.keystore=C:\\parasoft\\certificates\\client_keystore.jks

oidc.keystore.alias=[alias]

Specifies the alias you want to use to authenticate on the OpenID Connect server. You may need to configure this setting if your keystore file contains multiple entries.

Example: oidc.keystore.alias=myalias

oidc.keystore.password=[password]

Specifies the password to the the keystore file that stores the self-signed client certificate.

We highly recommend that you use an encoded strongly recommend encrypting your password to ensure successful authentication and increase the level of securitya secure connection. You can encode encrypt your password by running a command line instance of SOAtest with the   -encodepass flag. The  The command line tool will generate an encoded string encrypted string using AES 256-bit encryption that you can use in the configuration in the configuration file. 

Example: oidc.keystore.password=myPassword0987

Technical Support Settings

...

SettingPurpose
env.manager.server

Specifies location of the CTP server. Required

Example: env.manager.server=http://em_hostname:8080/

env.manager.server.name

Specifies the name that will be used to label this server in CTP. You can specify any value that helps you identify this server. Optional

Example: env.manager.server.name=MyVirtServerLabel

env.manager.notify

Determines whether the Virtualize server notifies CTP when virtual assets are deployed. Optional

Example: env.manager.notify=true

env.manager.username

Specifies the username for logging into CTP. Optional

Example: env.manager.username=me

env.manager.password

Specifies the password for logging into CTP. Optional

Example: env.manager.password=12345

We strongly recommend encoding encrypting your password to ensure successful authentication and a secure connection. You can encode encrypt your password by running a command line instance of SOAtest or Virtualize with the -encodepass flag. The command line tool will generate an encoded string encrypted string using AES 256-bit encryption that you can use in in the configuration configuration file. 

See See CLI Options for additional information.

Sample Settings

Example 1

Code Block
# Report settings
report.developer_errors=true 
report.developer_reports=true 
report.format=html
session.tag=<project name>
 
# Mail settings:
report.mail.enabled=true
report.mail.cc=<[email protected];[email protected]> 
report.mail.server=mail.company.com
report.mail.domain=company.com
report.mail.subject=<Static Analysis results on Project X> 
report.mail.attachments=true

...