Prerequisites: You know URL of the token issuers key service. You know the value for the Token issuer “iss” property ( provided
by the Developer/Integrator during JwksTrustMapping configuration).The CloudAuthenticationScheme has been installed.
- In the Nav pane, under the AuthenticationService, expand .
- From the nCloudDriver palette drag a JwksTrustMapping component to the Trust Manager node in the CloudAuthenticationScheme in the Nav tree.
- Right-click the newly added JwksTrustMapping component and click .
The
Jwks Trust Mapping Property Sheet opens.
- In the
App Id property, enter the
Honeywell Forge application ID.This value is required.
- In the
Expected Jwt Audience property, enter the value of the Token audience “aud” property. By default, this value is “Cloud Driver”, but you may change it to match the value present in the JWT for those providers
that do not have a fully configurable audience property. For example, Salesforce prepends the Salesforce application ID (not
to be confused with the
Honeywell Forge application ID) onto the audience.
- In the
Expected Jwt Issuer property, enter the value of the Token issuer “iss”.This is typically the URL of the user identity provider.
- In the
Jwks Endpoint property, enter the URL of the token issuer’s key service.
- To save the JwksTrustMapping Property Sheet settings, click Save.
Jwks trust mapping is now available and the station is configured to receive commands.