...
Setting | Purpose |
---|---|
soatest.license.use_network=true|false | Enables/disables network-based licenses. Set to Set to Example: Default: |
license.network.url=[url] | Specifies the License Server URL. Remember to include the |
license.network.user=[username] | Specifies the username for authentication on the Licenses Server specified with the This option requires the Example: |
license.network.password=[password] | Specifies the password for authentication on the License Server specified with the This option requires the We strongly recommend encoding your password to ensure successful authentication and a secure connection. You can encode your password by running a command line instance of SOAtest with the See CLI Options for additional information. |
license.network.use.specified.server=true|false | This option enables SOAtest to connect to either DTP and License Server, or two instances of DTP simultaneously. Set to Set to |
license.network.auth.enabled=true|false | Enables or disables authentication on the License Server specified with the This option requires the |
| Specifies the type of license to retrieve from License Server.
Example:
Default: |
soatest.license.autoconf.timeout=[seconds] | Specifies the maximum number of seconds to wait for the license to be automatically configured from License Server. Default: |
soatest.license.local.password=[password] | Specifies the local password provided to you by Parasoft. |
soatest.license.wait.for.tokens.time=[time in minutes] | Specifies how long to wait for a license if a license is not currently available. Example:
Default: |
OIDC Settings
Info |
---|
CTP and DTP or PSTSec are required for OpenID Connect in SOAtest and Virtualize. |
Setting | Purpose |
---|---|
oidc.enabled=true|false | Enables or disables user authentication via OpenID Connect. Default: |
oidc.issuer.uri=[uri] | Specifies the URI of the OpenID Connect server. Example: |
oidc.client.id=[user] | Specifies the ID provided by your OpenID Connect server. |
oidc.client.secret=[password] | Specifies the application's password to the OpenID Connect server. |
oidc.scopes=[list of scopes] | Defines a space-separated list of scopes, which are used during authentication to authorize access to a user's details. Default: |
oidc.cli.mode=devicecode|certificate | Specifies the method that will be used to authenticate the user on the OpenID Connect server. Default: |
oidc.devicecode.token.file=[path] | Specifies the path to the custom token file containing user authentication information. Example: |
oidc.keystore=[path] | Specifies the path to the keystore file that stores the certificate to authenticate the user on the OpenID Connect server. If only FIPS-approved algorithms are allowed, the keystore file must be in BCFKS (Bouncy Castle FIPS Keystore) format. Example: |
oidc.keystore.alias=[alias] | Specifies the alias you want to use to authenticate on the OpenID Connect server. You may need to configure this setting if your keystore file contains multiple entries. Example: |
oidc.keystore.password=[password] | Specifies the password to the the keystore file that stores the self-signed client certificate. We highly recommend that you use an encoded password to ensure successful authentication and increase the level of security. You can encode your password by running a command line instance of SOAtest with the Example: |
...