Downloads (PDF, HTML & XML formats)
[FishEye Knowledge Base]
To implement an arbitrary form of authentication and authorisation for FishEye you need to provide a class which extends com.cenqua.fisheye.user.plugin.AbstractFishEyeAuthenticator
. You can find more information about custom FishEye authorisation in the online javadocs and the library jar.
For FishEye to use the authenticator, it must be compiled, placed in a jar archive and then put in the $FISHEYE_INST/lib
directory. If other third-party libraries are required by your authenticator, they must also be in the $FISHEYE_INST/lib
directory.
After implementing a custom authenticator, the next step is to configure FishEye to use it.
Click Setup Custom authentication on the FishEye Security page, in the Admin area.
You will be presented with a form containing the following fields to be set:
Classname | The fully qualified class name of your AbstractFishEyeAuthenticator, e.g. |
Cache TTL (positive) | How long FishEye should cache permission checks. Example values are: |
Auto-add | FishEye can automatically create a user it has not previously encountered if the user can successfully authenticate against your authenticator. |
Properties | Any properties your authenticator requires. These will be passed to its # comments name1=value1 name2=value2 |
You may also require a per-repository constraint to restrict access to specific repositories using your custom authenticator. If a custom authenticator is set, then the Permissions Summary table will display the constraint per repository and a link to enable you to edit it.
When using FishEye's built-in groups in conjunction with a custom authenticator, a user will have access to a repository if:
hasPermissionToAccess
method of the custom authenticator returns true.The 'Authentication Test' page allows you to enter a user's credentials and to test the user's authentication. It will also test which repositories the user is authorised to access.