- web:
com.isw.kudos.external-apps-core
- ear wrapper:
com.isw.kudos.external-apps
Minify loader.js
into loader.min.js
Export com.isw.kudos.external-apps
as .ear
Download latest .ear from releases page
Set WebSphere variable to configure the apps/urls to open through the frame:
EXTERNAL_APPS_CONFIG =
{"[APP_NAME]":"[URL_OF_APP]","[APP_NAME_2]":"[URL_OF_APP_2]"}
where:
[APP_NAME]
is unique, without spaces or special characters
[URL_OF_APP]
is a web address, ie https://google.com
For example, here are 3 apps we load:
EXTERNAL_APPS_CONFIG =
{"ideas":"https://ideas.isw.net.au","buzzy":"https://buzzy.buzz","contacts":"https://apps.isw.net.au"}
a) Install EAR in WebSphere using default binding of /apps
Load https://connections.company.com/apps
to see all apps defined above.
Each app will be available at this path, ie:
https://connections.company.com/apps/[APP-NAME]
AND/OR
b) Install EAR multiple times, with customised contextRoot
This method will allow you to load the app without the /apps
prefix.
The context root must be in the format /[APP_NAME]
For example, install the Application as:
Name: Ideas Frame
Context root: /ideas
The Ideas app will load at this path:
https://connections.company.com/ideas
The following WebSphere variables are supported:
Variable name | Purpose | Example |
---|---|---|
EXTERNAL_APPS_AUTH_FAILURE_MESSAGE | Message to be displayed when user is not authorised to load the frame | Sorry, you are not authorised/licenced to access this application. Please contact your administrator. (this is the default) |
EXTERNAL_APPS_CONFIG | URLs of the supported Apps | {"boards":"https://dev-client.isw.net.au"} |
EXTERNAL_APPS_CSS_INLINE | CSS to be applied on the app loader | .lotusSearch { display: none; } |
EXTERNAL_APPS_CSS_URL | URL of a CSS file to load on the page | https://my-server.example.com/app-custom.css |
Security roles:
Role | Purpose | Default |
---|---|---|
Everyone | Currently unused. Might be useful for accessing resources in the future | Everyone |
Access | Who is allowed to access the frame. Set this to any LDAP groups you want to restrict access to | All Authenticated |