Page History
| Info | ||
|---|---|---|
| ||
This page details how to setup Scripted Authentication, please review the parent topic for documentation on Profiles and Authentication before you begin. |
Enabling Scripted Authentication
Scripted Authentication can be enabled for a connection by providing a command line to run in the 'Auth Script Command' field in the Connection Properties scrrenscreen. This command will be triggered by RED when it needs to authenticate with this connection for the first time and then again whenever the 'Auth Expires After' minutes is exceeded.
...
This script produces logging based on the LogLevel setting, the log file will be created in the current user's temp directory withthe with the name 'ws_auth.log'. This location can be found in Windows by typing %TEMP% in an explorer window.
Example script commands
| Note |
|---|
LogLevel "DEBUG" will print the script environment variables to the log file ws_auth.log This may expose passwords in plaint text therefore DEBUG should not be set in production. |
| Tip |
|---|
1- The script path in these commands should reflect the path where you unpacked the ws_auth.zip file. Ensure you also set an initial non-zero value for the Auth Expires After setting. NOTE: You can not currently change a connection string via a Profile update, therefore connection string is non-editable in these Auth UI's. |
ws_auth Test-mode
| Code Block | ||||
|---|---|---|---|---|
| ||||
PowerShell -ExecutionPolicy bypass -f "c:\temp\ws_auth\ws_auth.ps1" -AuthType "Test-mode" -LogLevel "DEBUG" |
...
| Code Block | ||||
|---|---|---|---|---|
| ||||
PowerShell -ExecutionPolicy bypass -f "c:\temp\ws_auth\ws_auth.ps1" -AuthType "Snowflake-KeyPair" -LogLevel "DEBUG" |
This mode produces a dialog which provides the ability to set a Key-Pair attributes and uses the 'Test on exit' functionality to establish an initial connection.
...