You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The idea is to have simple tokens created with say.. echo MOOO| shasum -a 512224 |awk '{print $1}' >> /etc/grommunio-admin-api/conf.d/MOO.token which only allow "GET" requests with the REST api.
The usecase could be something like a monitoring system which should be able to read those endpoints but we don't want to store any admin credentials on those other systems.
And if that even gets picked up than it should also be noted that maybe time-based tokens might also be a good idea so to automatically expire them after N days.
The text was updated successfully, but these errors were encountered:
This can be achieved by creating a user with SystemAdminRO permissions and then generating an access token via grommunio-admin user login <username> --nopass --token.
I can also add an explicit expiry parameter to the CLI call if needed, otherwise the global default for login tokens applies (security.jwtExpiresAfter configuration).
Hey,
The idea is to have simple tokens created with say..
echo MOOO| shasum -a 512224 |awk '{print $1}' >> /etc/grommunio-admin-api/conf.d/MOO.token
which only allow "GET" requests with the REST api.The usecase could be something like a monitoring system which should be able to read those endpoints but we don't want to store any admin credentials on those other systems.
And if that even gets picked up than it should also be noted that maybe time-based tokens might also be a good idea so to automatically expire them after N days.
The text was updated successfully, but these errors were encountered: