Linking Talend Identity and Access Management with Talend Data Stewardship - 6.5

Talend Data Management Platform Installation Guide for Linux

EnrichVersion
6.5
EnrichProdName
Talend Data Management Platform
task
Installation and Upgrade
EnrichPlatform
Talend Activity Monitoring Console
Talend Administration Center
Talend Artifact Repository
Talend CommandLine
Talend Data Preparation
Talend Data Stewardship
Talend DQ Portal
Talend Identity and Access Management
Talend Installer
Talend JobServer
Talend Log Server
Talend Repository Manager
Talend Runtime
Talend SAP RFC Server
Talend Studio
If you have installed Talend Identity and Access Management manually, you need to create an OIDC client in order to link Talend Identity and Access Management with Talend Data Stewardship. Note that this operation is automatically done if you install Talend Identity and Access Management using Talend Installer.

Procedure

  1. Stop Talend Identity and Access Management and Talend Data Stewardship if they have been already started.
  2. Go to iam-A.B.C/apache-tomcat-x.x.xx/clients.
  3. Create a tds-client.json file.
  4. Paste the following content:
    {
    "post_logout_redirect_uris" : [ "http://my-machine:19999/", "http://localhost:19999/", "http://127.0.0.1:19999/" ],
    "grant_types" : [ "password", "authorization_code", "refresh_token" ],
    "scope" : "openid refreshToken",
    "client_secret" : "cB/gNxe2SXR3SPDbhshZXzErZoxVy8yUcs/f6K39rsg=",
    "redirect_uris" : [ "http://my-machine:19999/login", "http://localhost:19999/login", "http://127.0.0.1:19999/login" ],
    "client_name" : "TDS OIDC Gateway",
    "client_id" : "tl6K6ac7tSE-LQ"
    }
  5. Adapt the parameters to your needs:
    Parameter Description
    post_logout_redirect_uris URI to which the user is redirected after logging out.

    If Talend Identity and Access Management and Talend Data Stewardship are located on the same machine, be sure to put the name of the machine in addition to localhost and 127.0.0.1 as shown in the example.

    grant_types The OAuth specification has different grant types. These authorizations allow the client application to obtain an access token. This token represents the client permission to access user data. Set the grant_types to the values shown in the example.
    scope OpenID defined scopes. Set it to the value shown in the example.
    client_secret Client password.

    This parameter needs to be set to the same value as oidc.tds.secret in the data-stewardship.properties configuration file of Talend Data Stewardship.

    The client password is encrypted at first launch.

    redirect_uris URI to which the user is redirected after logging in. The /login part of the URI is mandatory.

    If Talend Identity and Access Management and Talend Data Stewardship are located on the same machine, be sure to put the name of the machine in addition to localhost and 127.0.0.1 as shown in the example.

    client_name Name of the OIDC client. The TDS part of the client name (with the trailing space) is mandatory.
    client_id Identifier of the OIDC client.

    This parameter needs to be set to the same value as oidc.tds.id in the data-stewardship.properties configuration file of Talend Data Stewardship.

  6. Start Talend Identity and Access Management and Talend Data Stewardship.