This topic tells you how plan administrators use the User Account and Authentication Command Line Interface (UAAC) to manage existing UAA Identity Zone clients.
This section explains when and why you use the UAAC to update UAA Identity Zone clients.
All clients mentioned on this page are UAA Identity Zone clients. However, there are two kinds of UAA Identity Zone clients:
Do not use the UAAC to do the following:
Create clients—Do not create clients through UAAC because additional metadata is required for their usage by Single Sign‑On.
Make most types of updates—Most updates for UAA Identity Zone clients can be made through the SSO Developer Dashboard.
Some updates cannot be done through the SSO Developer Dashboard and so must be made through the UAAC. You need to use the UAAC if you want to set a configuration to a value that is not listed on the SSO Developer Dashboard.
To use the UAAC to modify clients, you need an admin client that corresponds to your Single Sign‑On service plan.
If you do not already have an admin client for your UAA Identity Zone, follow the steps below to create an admin client.
You can use the same admin client for updating service plans and identity providers. For information, see Updating Service Plans with UAAC and Updating Identity Providers with UAAC.
cf
.cf service SERVICE-INSTANCE-NAME
.Click Select Scopes > Admin Permissions.
Set the scopes as necessary for configuring the UAA resource.
For… | Add these scopes… | For more information, see… |
---|---|---|
updating UAA clients | clients.admin |
Update Clients with UAAC below. |
managing Single Sign‑On service plans | clients.admin |
Updating Service Plans with UAAC. |
updating identity providers | idps.read and idps.write |
Updating Identity Providers with UAAC. |
Record the App ID and App Secret.