Third Party User Guide
Third Party User Guide
(R23-AMR Build)
Table of Contents
Document History ............................................................................................................................... 4
1.Grafana Monitor Tool ..................................................................................................................... 5
Introduction……………………………………………………………………………………………………………5
Pre-requisites…………………………………………………………………………………………………………5
1.1 Configuration ................................................................................................................................ 5
1.1.1 SPF…………………………………………………………………………………………...…………………5
1.1.2 TEC.PROFILE……………………………………………………………………………….............………..6
1.1.3 TEC.ITEMS………………………………………………………………...........................…………………6
1.1.4 TAFJ……………………………………………………………………………………………………….........7
1.1.5 DOCKER……………………………………………………………………………………..…………………9
1.1.6 GRAFANA…………………………………………………………………….............………………...……10
1.1.7 TRANSACT BROWSER……………………………………………………………….......................……11
1.2Tracer Implementation of MS in Grafana ....................................................................................... 13
1.3 Keycloak for Single Sign-on (SSO) in UXP Browser ...................................................................... 16
1.3.1 Setting up Keycloak……………………………………………………………………………………….....16
1.4 Configuring UXP Browser setup in Keycloak ................................................................................. 21
1.5 Configuring UXP Components in Transact .................................................................................... 26
1.5.1 Configuring Browser.war………………………………………………………………………………....…26
1.5.2 Updating OIDCSessionHandlingFilter and oidcAuthenticationFilter………………….............................…26
1.5.3 Updating spring-oidc-authenticator.xml…………………………….……………………………………..26
1.6 Configuring Transact ................................................................................................................... 27
1.7 Configuring BRPRuntimeProperties.properties File ....................................................................... 29
1.8 Configuring IRFX ........................................................................................................................ 29
1.8.1 Make Copies of IRFX war for T24Authentication………………………………........................……….30
1.8.2 Header Value Change Authorization in IRF.war Files…………………………………….........……….30
1.8.3 Configuring IRF OIDC for Keycloak………..………………………………………………………………31
1.9 Launch UXP Browser………………………………………………………………………….………………32
1.10 Troubleshooting……………………………………………………………………………..............……….32
2. TSF-External Authorization Demo (XACML)
Introduction………………………………………….........................…………………………………………33
Pre-requisites………………………………………………………………….............……………………..….34
2.1 XACML - RunTime Demo:-………………………………………………………........................……….34
2.1.1 SPF Change…………………………………………………………………………………………..…..34
2.1.2 Use Case 1:-………………………………………………………………………………………...…….34
2.1.3 Use Case 2:-………………………………………………………………………………………...........35
2.1.4 Use Case 3:-……………………………………………………………………………………………....35
2.1.5 Use Case 4:-………………………………………………......…………………………………………..36
2.1.6 Use Case 5:-……………………………………………………………………………….................…..37
2.1.7 Use Case 6:-……………………………………………………….........................................………...40
2
3rd Party Presales Demo Guide
3
3rd Party Presales Demo Guide
Document History
Comments:
4
3rd Party Presales Demo Guide
Pre-requisites
• UTP Model Bank installation 202108 or above to be installed
• Application server started.
• Docker needs to installed and started.
1.1 Configuration
Shown below is the configuration done for triggering events from t24 to the external monitoring tool
: Grafana via platform framework function TecEvent. The EXT can be set in SPF record for
triggering events in Grafana and list of events to trigger are taken from TEC.PROFILE. Adding the
docker set up and configuration for sending the information from T24 to ElasticSearch and Logstash
to display in Grafana.
1.1.1 SPF
• A new option field EXT is introduced in MAINT.TEC.OUTPUT field in SPF table for enabling
the events to Grafana
• MAINT.TEC.OUTPUT field should be set to EXT in SPF for triggering various events from
T24 to Grafana.
• Once the new option field is set to EXT in SPF, the events are triggered and sent to platform
framework function TecEvent from T24.
5
3rd Party Presales Demo Guide
1.1.2 TEC.PROFILE
Below are the list of events which will be triggered from T24 system to the external monitoring tool.
Set the list of Items which in TEC.PROFILE tOP table for which the events should be triggering in
Grafana Monitor. The list of items should have an entry in TEC.ITEMS table with defined threshold.
1.1.3 TEC.ITEMS
Reduce the Threshold values as shown below. Commit and authorize.
TEC.ITEMS, I TXN.METRICS.COMMIT
6
3rd Party Presales Demo Guide
1.1.4 TAFJ
• Enable the below property in tafj.properties file under
Temenos\RXX\Env\Slot01\Products\TAFJ\Default\conf
Property : temn.tafj.runtime.enable.jbc.meter=true
temn.tafj.runtime.meter.category=PERFORMANCE,PRODUCTION
7
3rd Party Presales Demo Guide
Temenos\RXX\Env\Slot01\Products\TAFJ\Default\conf
8
3rd Party Presales Demo Guide
Property: log4j.logger.LOCKING=INFO,locking
1.1.5 DOCKER
The docker needs to installed in local system to run various containers which sends the
information from T24 to Grafana.
The docker set up is downloaded from the following link and installed in the local
environment. https://docs.docker.com/docker-for-windows/release-notes/#docker-desktop-
community-2304 \
9
3rd Party Presales Demo Guide
1.1.6 GRAFANA
• Launch Grafana Dashboard from Web Browser by using the link : http://localhost:3000
• The default username and password to login into Grafana is admin/admin.
• Skip change password in case you want to use the default password
• Upon clicking Save & Test , if the success message “Index OK. Time field name OK” is displayed,
the elastic search is in-lined with t24 and data is emitted from transact.
10
3rd Party Presales Demo Guide
Make a transaction(EX:PO, I F3) in Transact browser and authorize. Data get reflected as shown
below
11
3rd Party Presales Demo Guide
12
3rd Party Presales Demo Guide
13
3rd Party Presales Demo Guide
After completing the Microservice holdings Document, Execute the following commands from
TAFJ/TemnMonitor.
1. launch-monitoring.bat build
2. launch-monitoring.bat up
Launch Grafana Dashboard from Web Browser by using the link : http://localhost:3000
14
3rd Party Presales Demo Guide
15
3rd Party Presales Demo Guide
3. Open Command Prompt window from \keycloak-15.0.2\bin folder and Run the standalone.bat to start
the keycloak server using the below command
Standalone.bat –b 0.0.0.0
16
3rd Party Presales Demo Guide
4. Launch the below Keycloak console url and Click on “Administration console”. Create a below credentials
to login in to Keycloak server.
http://localhost:8080/auth/
Username or email: admin
Password: admin
17
3rd Party Presales Demo Guide
5. Expand Master dropdown and click Add realm to create a new realm named transact.
18
3rd Party Presales Demo Guide
Enter the value as shown in below screen and click on save button
6. Click Users from the left pane to create a new administrator for the transact realm.
19
3rd Party Presales Demo Guide
9. Go to User > Role Mappings, select “realm-management” from the client Roles dropdown .Under
Available Roles select all the roles and click Add Selected. The roles are displayed under Assigned
Role
20
3rd Party Presales Demo Guide
10. Click On Credentials to setup a new password for transact realm administrator.
After resetting the password for transact realm, logoff and login as admin using the following
URL:
http://localhost:8080/auth/admin/transact/console/
Procedure:
1. On Transact realm, go to Clients > Settings and define the ClientId as uxpbrowser. Enter the
details as shown below. Click on Save button.
21
3rd Party Presales Demo Guide
22
3rd Party Presales Demo Guide
23
3rd Party Presales Demo Guide
6.Go to Credentials tab and create password for the user and click on Reset password button.
8 Create a new attribute called t24son and Sign on Name as it’s Value which is INPUTT.
9. Go to Transact Realm Settings > Keys.
24
3rd Party Presales Demo Guide
7. Copy the above RSA Public key and follow the steps :
a.Go to utilities online.
Paste the copied RSA Public key into the left pane and click encode.
On the right pane, base64 encoded key is generated.
25
3rd Party Presales Demo Guide
b.Copy the encoded base64 key into a notepad to provide for pkEncode tag on spring-oidc-
authenticator.xml files.
web.xml
The following configuration establishes the communication between Keycloak and Browser.war.
File Location: Browser.war\WEB-INF\classes\META-INF\spring-oidc-authenticator.xml
26
3rd Party Presales Demo Guide
spring-oidc-authentic
ator.xml
Where,
transact in the url is the actual realm being configured in Keycloak.
t24son is the user attribute being configured in Keycloak.
uxpbrowser is the client name that is configured in Keycloak.
Read the Configuring UXP Browser section, to get the pkEncoded value.
27
3rd Party Presales Demo Guide
28
3rd Party Presales Demo Guide
You must configure the BRPRuntimeProperties.properties to use the irf-rp-services-T24.war and irf-
t24catalog-services- T24.war files.
Add the below entries in properties file
browser.options.dynamicIRIS.rpServiceAlt=http://localhost:9089/irf-rp-services-T24
browser.options.god.catalogServiceAlt=http://localhost:9089/irf-t24catalog-services-T24
29
3rd Party Presales Demo Guide
For T24Authentication, you must take a backup of the IRFX war file.
3. Change the root context in the irf-rp-services-T24.war and irf-rp-services-T24.war files as below.
File Location:
irf-rp-services-T24.war\WEB-INF\jboss-web.xml
irf-t24catalog-services-T24.war\WEB-INF\jboss-web.xml
NOTE: After modifying the root context, no other changes are required in the irf-rp-services-
T24.war and irf- t24catalog-services-T24.war files.
30
3rd Party Presales Demo Guide
spring-oidc-authentic
ator.xml
31
3rd Party Presales Demo Guide
http://127.0.0.1:9089/Browser/
2. Enter the Login credentials INPUTT and Transact home page will appear
1.10 Troubleshooting
1. If user get the below error due to properties setup and please follow the below steps for the workaround.
32
3rd Party Presales Demo Guide
XACML stands for "eXtensible Access Control Markup Language". The standard defines a
declarative fine-grained, attribute-based access control policy language, an architecture, and a
processing model describing how to evaluate access requests according to the rules defined in
policies.
Using XACML, restrictions can be applied at User level, whereby they will be given access only to
applications required.
33
3rd Party Presales Demo Guide
Pre-requisites
• UTP Model Bank installation 202108 or above to be installed
• Application server started.
• Java 1.8 or above.
1. Login as CSAGENT.
2. Create a PAYMENT.ORDER
3. Enter the PAYMENT.AMOUNT greater than 10000
4. Validate & commit the record.
34
3rd Party Presales Demo Guide
1. Login to CSAGENT.
2. Navigate to Customer Onboarding (Ind.)
3. Pass the first Screen (Verification of customer documents)
4. On the second screen, validate the following:-
a. Nationality -> Enter BH (Bahrain) ->Commit and Validate -> Error message thrown
b. Residence ->Enter BH (Bahrain) ->Commit and Validate -> Error message thrown.
Only Non-Bahrain residents and / or Nationalities can be onboarded.
Note:- Both the conditions must be satisfied for the record to be committed.
If either of the conditions isn’t satisfied, the record does not get validated.
1. Login as CSAGENT
2. From the command line launch ENQ CUSTOMER.SCV.
3. Click on FIND.
4. Search returns only CUSTOMERS that have Nationality and Residence other
than BH.
35
3rd Party Presales Demo Guide
36
3rd Party Presales Demo Guide
37
3rd Party Presales Demo Guide
Note: If SPF External Security Framework is enabled already, then no need to create a record in
EB.USER.ROLES as it will throw the error message that external authorization is enabled. Directly add the
Role in the User record and proceed.
Note: As we are creating Role based access remove the user level access already given for PWMRM User
and then commit & authorise the record.
38
3rd Party Presales Demo Guide
4. Login as RMUSER
5. RMUSER will list only his department accounts.
39
3rd Party Presales Demo Guide
Note: Verify and give the Account Id whose Account Officer is 74.
6. As an alternate-check, search for any Account whose account officer is other than 74.
1. Login to INPUTT.
2. Create the below records in EB.API
40
3rd Party Presales Demo Guide
4. Login to CSAGENT
41
3rd Party Presales Demo Guide
System will throw the error message if any transaction is done in the weekend, since weekend Saturday (6)
and Sunday (7) mentioned in policy file.
5. As an alternate check, find any other Account record whose currency is not equal to USD.
42
3rd Party Presales Demo Guide
Start Application server and ensure the war files are deployed.
43
3rd Party Presales Demo Guide
B) Troubleshoot: -
If any error related to 404 found while fetching the download API’s ensure the followings step.
• Open the papui war -> env.js in editable mode and check the value
window.__env.config = {
apiUrl: {
seal: true,
value: 'http://localhost:9089/irf-provider-container/api/v1.0.0'
}
};
Note: If the application server is running in any port other than 9089, then update the correct url in env.js file
and then re-deploy the war file.
• Open the papui war -> index.html and check the value
<base href=”/papui/”>
C) PAP UI Browser:-
Open the browser and enter the URL http://localhost:9089/papui/
44
3rd Party Presales Demo Guide
Note: Only the json policy files under the papRuntime/roles folder will get displayed in the Roles panel.
45
3rd Party Presales Demo Guide
Click on “DOWNLOAD”
• The generated policy file gets downloaded to
“Temenos\RXX\Infra\AppServer\JBoss\Default\papRuntime\xacml”
• Copy the same to “Temenos\RXX\Env\Slot01\Products\XACML\lib\xacml”
• Update the pdp-config.xml and the root-policy.xml files under
“Temenos\RXX\Env\Slot01\Products\XACML\lib\xacml” as follows
46
3rd Party Presales Demo Guide
Note: - To add the created policy file as part of the PAPUI interface, move the created .json file from
“Temenos\RXX\Infra\AppServer\JBoss\Default\papRuntime\json” to
“Temenos\RXX\Infra\AppServer\JBoss\Default\papRuntime\roles”. Refresh the PAPUI to spot the file in
the right tab.
SPF Change: -
• Start jBOSS completely.
• Login to Transact Browser using INPUTT / 123456.
• Navigate to Admin Menu->System Administration->Security Management
System->System Users Management->External Authorisation->Access control.
• Check the External Security Framework box to enable it and then commit the record.
47
3rd Party Presales Demo Guide
Demo: -
• Login to UXP Browser as
BRANCHMANAGER/123456. Try creating a
customer using CUSTOMER I F3.
• Enter the Nationality as “AF” (and / or) Sector as
“1000”.
• Validate.
48