LogoLogo
TPI.devCommunityGithub
  • Overview
    • Introduction
      • Future Features
    • License & Disclaimer
    • APIM Architecture
      • Production Deployments and Capacity
      • Functions
      • Integration
    • Key Concepts
      • API Group
      • API Scope
      • API Client
      • End-to-End Workflow Combining API Group, API Scope, and API Client
        • Scenario: API Management for an E-commerce Platform
    • Support
    • Glossary
    • Scenarios
      • Financial Industry
        • Transforming Financial Services with digiRunner API Management
        • Redefining Financial Data Migration with digiRunner API Management Platform
      • Manufacturing Industry
        • Enabling Smart Manufacturing with Seamless API Integration and Automation via digiRunner
        • Streamlining Global Operations with API Management via digiRunner
      • Medical Industry
        • Enhancing Healthcare Data Integration and Security with digiRunner API Management
        • Revolutionizing Healthcare Interoperability with digiRunner’s Advanced API Framework
      • Insurance Industry
        • Modernizing Insurance Services with digiRunner API Management
        • Modernizing Insurance with digiRunner—Bridging Legacy Systems and Microservices
      • Government and Public Services
        • Empowering Open Government Services with digiRunner: A Mission for Integration and Transformation
        • Streamlining Public Sector Innovation via digiRunner: Driving Citizen-Centric Digital Transformation
  • Get Started
    • Installing digiRunner API Management
      • SMTP Configuration
    • Registering Your First APIs with digiRunner
    • Client Authorization and Calling APIs
    • Rate Limiting
    • Proxy Caching
    • Load Balancing
    • Sandbox Testing
    • VIP Gateway Priority Settings
    • JWE Certificate
  • Configuring IP Whitelisting via IP Binding
  • Most common use cases
    • Obtaining API Keys and Calling APIs
    • API IP Diversion
    • Viewing Real-time API Logs
    • Enabling APIs and No Auth in Batches with API Imported
    • Role-Based Access Management within a Hierarchical Structure
    • Simplified OIDC Login with Predefined Organizational Frameworks
    • Resetting User Password and Confirmation Email for Admin Console User
  • Guide
    • AC User Management
      • Users
      • My Profile
      • Roles
      • Role Mapping
      • Organization
      • Role & txID
      • Delegate AC User
      • AC OAuth 2.0 IdP
      • AC LDAP IdP
      • AC MLDAP IdP
      • AC API IdP
    • Development Mode
      • Function Management
      • Rtn Code Management
      • Embedded Function Management
    • Client Management
      • API Client
      • API Group
      • API Scope
      • Authentications
      • Security Level
      • GTW OAuth 2.0 IdP
      • GTW LDAP IdP
      • GTW API IdP
      • GTW JDBC IdP
      • Client Export/Import
    • API Management
      • API List
      • API Registry
      • API Test
      • API Modify Batch
    • Monitor & Alert
      • digiRunner Server
      • Alert Settings
    • Reports
      • API Calls
      • API RESP distribution
      • API Avg. RESP Time
      • API GTW traffic
      • Bad Attempt Report
    • Certificate Management
      • JWE Cert. List
      • JWE Cert. Management
      • TLS Cert. List
      • TLS Cert. Management
    • Application Forms
      • API Key
      • Applications
      • Approval Flow Settings
    • System Information
      • API Key Approval History
      • Scheduled Tasks
      • Recurring Tasks
      • Mail Log
    • System Configs
      • Setting
      • Items
      • Files
      • Customer Setting
      • Online Console
      • WebSocket Proxy Management
      • Static Webpage Reverse Proxy
      • RDB Connection
      • Mail Template Export/Import
  • API Integration Guide
    • Using Token for Authentication and Authorization
      • OpenID Connect (OIDC) Mode
      • Client Credentials Mode
      • Password Mode
    • Using X API Key for Authentication and Authorization
      • Applying for X API Key
      • Obtaining X API Key
      • Calling APIs Registered in digiRunner with X API Key
    • Using API Key for Authentication and Authorization
      • Applying for API Key
      • Obtaining API Key and Secret Key
      • Calculating the Signature and DGRK
      • Calling APIs Registered in digiRunner with API Key
    • Using HTTP Basic and OAuth for Authentication and Authorization
      • Calling APIs Registered in digiRunner with Basic Auth
      • Calling APIs Registered in digiRunner with No OAuth
    • Token Lifecycle Management Mechanism
      • Applying Refresh Token
      • Token Revocation
      • Token Introspection
    • JWS/JWE Integration
      • JWS Workflow
      • JWE Workflow
      • Exchanging Public Keys
      • Generating Certificate
      • Operating with JWS
      • Operating with JWE
Powered by GitBook
On this page
  • Search GTW JDBC IdP
  • Client List of GTW JDBC IdP

Was this helpful?

Export as PDF
  1. Guide
  2. Client Management

GTW JDBC IdP

PreviousGTW API IdPNextClient Export/Import

Was this helpful?

Path: Client Management > GTW JDBC IdP

In this section, you can find instructions on how to maintain the JDBC authentication servers using the gateway.

Search GTW JDBC IdP

To search for GTW JDBC IdP, you can search using the relevant information as keywords.

Client List of GTW JDBC IdP

  1. Users can create, update, view details, and delete the clients.

Create JDBC IdP Client

  1. Click Create to access the JDBC IdP Client creation page.

  1. Fill in the data or make selections as instructed below. The fields marked with “*” are required.

  • Enable*: This account is active (Y) or inactive (N).

  • Page Title*: Header of the login page.

  • Icon: Click Choose file to select and upload an identifiable GTW JDBC IdP image. If no image is uploaded, the system will automatically use the digiRunner logo.

  • Connection Name*: A name or label used in many software applications to identify a specific database, network connection, or other resource connection. It is an easy-to-remember name used to identify and manage different connections. You can create a Connection Name in RDB Connection.

  • SQL (Prepare Statement)*: A mechanism used in programming languages to execute pre-prepared SQL statements. This technique enhances database operation security and performance by preprocessing and parameterizing SQL statements.

  • SQL Parameters*: Special markers used to pass values into SQL statements during execution. These parameters prevent SQL injection attacks, improve code readability and maintainability, and enhance database query performance. Before executing the SQL query, the parameters need to be bound or set with actual values. This helps separate the structure of the SQL statement from the data values and prevents attacks on the database from malicious user input.

  • User Secret Algorithm*: An encryption or hashing algorithm used to protect user passwords or sensitive information. When user passwords are saved in the system, a specific algorithm is often used to encrypt or hash them to ensure security.

  • User Secret Column Name*: The column name in the database table used to save user passwords or sensitive information. When designing the database structure to save user account information, the password is usually saved as an important piece of sensitive information.

  • ID Token.sub Column Name*: For passing user's identity information to the client during the authentication process. The .sub field is usually used to represent the user's unique identifier to distinguish between different users.

  • ID Token.name Column Name: For passing user's identity information to the client during the authentication process. The .name field is usually used to represent the user's name or display name.

  • ID Token.email Column Name: For passing user's identity information to the client during the authentication process. The .email field is usually used to represent the user's email address.

  • ID Token.picture Column Name: For passing user's identity information to the client during the authentication process. The .picture field is typically used to represent the user's avatar or picture.

Manage JDBC IdP Client

  1. Access and view the JDBC IdP client details.

  1. Modify the desired fields, and click Update to save and exit.

  1. A warning prompt displaying the message “Confirm Delete?” will pop up. Click Confirm to delete this JDBC IdP Client and exit.

To view the details of GTW JDBC IdP, you can search using the relevant information as keywords, and click on the icon to access the GTW JDBC IdP Client List page.

To view the details of the JDBC IdP client, search for the client you want to view, and click on theicon.

To update an JDBC IdP Client, search for the client you want to modify, and click on the icon to access the Update page.

Select the client ID to delete, and click on the icon to proceed.