MC Configuration file app_config.json
Integration of the app_config.json
To integrate the app_config.json file into your project, follow these steps:
- Begin by creating an empty file named app_config.json.
- Then, insert the code snippet provided below into the file:
Example app_config.json for KOBIL Shift Lite solution installations
{
"tenantId": "</TenantId>",
"iam": {
"loginActivationWebpageUrl": "https://idp.</ServerUrl>.com",
"scope": "openid",
"trustedSslServerCerts": ["</CertificateFileName>.pem"],
"registrationClientId": "IDPRegistration",
"loginClientId": "UILogin",
"whiteListUrls":[".*"]
},
"logFileReceiverMailAddress": {
"iOS": ["support-eco-client-ios@kobil.com"],
"android": ["support-eco-client-android@kobil.com"]
},
"kssIdp": {
"handleTms": false,
"hashPin": false
}
}
- Configure the
TenantId
parameter to match your Workspace name. - Set the value of the
ServerUrl
to the URL of your IDP service. - The format of the
CertificateFileName
should be (.pem) type.
Note: The
trustedSslServerCerts
files may contain one or more certificates. Refer to Trust Store Configuration for details on which certificates to include in the trust store. Additionally, note that for simplicity, the different trust store entries can point to the same file.
JSON Key | Description | Mandatory |
---|---|---|
tenantId | Workspace name of the IDP Server | Yes |
iam.loginActivationWebpageUrl | Host url of the IDP Server | Yes |
iam.trustedSslServerCerts | List with filenames inside app with trusted TLS server certificates used for Certificate Pinning of the IDP server. | Yes |
kssIdp.handleTms | KssIdp handles the transaction. | No |
kssIdp.hashPin | User's password is hashed, before delivering to IDP Services. | No |