Hi Ocean,Mahalo, I had clicked on the book icon, but somehow missed the "Configuration" tab (doh!), so that was indeed helpful. I've used "required-ip-addresses" for access control for other endpoints, so that's familiar, but I see that "required-roles" is another option. This sounds potentially promising, but I haven't been able to find more information about how and where these roles are defined.It's also still not clear to me how you use these endpoints if you want to use the DELETE capability. I think for our other uses of endpoints (e.g. health, info), they are GET type actions that merely report information. Unfortunately Misagh's blog post at fawnoos don't cover these cases for DELETE.
You don't often get email from ba...@hawaii.edu.
Learn why this is important
|
To view this discussion on the web visit https://groups.google.com/a/apereo.org/d/msgid/cas-user/YT3PR01MB994664C43753F61FC7D3B81CCEAC2%40YT3PR01MB9946.CANPRD01.PROD.OUTLOOK.COM.