Replies: 3 comments 4 replies
-
Hi, Yes. The SSO (TM1's IntegratedSecurityMode 3) only works on a windows machine. I think the validity of the token (session-id) is determined by So even if you keep your session alive through regular interaction between py and TM1, eventually after a server restart (typically on the weekend) the python script requires a new token. However, here is an idea: I hope this helps |
Beta Was this translation helpful? Give feedback.
-
When you say changed the security so that SSO is required, I'm assuming that they changed the password and not providing it for security reasons. Anyway, you could potentially create two services. Service 1 would be running in Windows and Service 2 would be running in Linux. Service 1's responsibility would be to create a session using SSO and populate the passport in some secure web service (like AWS Secrets Manager). The service will continue to ping the TM1Server every n minutes to not get logged out. If logged out, create a new session and refresh the passport in the web service. |
Beta Was this translation helpful? Give feedback.
-
3rd option for you to implement the Kerberos SSO in Linux in the python
code, that solves it as well.
…On 2023. Mar 6., Mon at 18:08, Vinoth Kumar Ravi ***@***.***> wrote:
When you say *changed the security so that SSO is required*, I'm assuming
that they changed the password and not providing it for security reasons.
Anyway, you could potentially create two services. Service 1 would be
running in Windows and Service 2 would be running in Linux.
*Service 1's* responsibility would be to create a session using SSO and
populate the passport in some secure web service (like AWS Secrets
Manager). The service will continue to ping the TM1Server every *n*
minutes to not get logged out. If logged out, create a new session and
refresh the passport in the web service.
*Service 2's* responsibility would be to retrieve that passport and
perform other tasks. If the passport isn't valid, retry the retrieval after
*n* minutes.
—
Reply to this email directly, view it on GitHub
<#859 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AHNEK3DDLSVLKKTTWWW2HWDW2YKZTANCNFSM6AAAAAAU6IZ7DA>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
All,
We had a python script running in Openshift (RedHat Linux image) for a couple years, passing in a service account ID and password in the connection string to gain access. The administrators of the TM1 Cube changed the security so that SSO is required. So now I can only run it from a Windows machine. We have found if we go grab the passport/token value from the web console on a windows machine we can use that token to connect/pull data in our openshift instance, but it has a very fast expiration date.
I'm trying to see if it is possible to 1) programmatically access/grab the passport/token and then use it in the connection string from Linux/Openshift OR 2) Get a passport/token that does not expire?
I realize one (or both?) of these might not strictly have to do with TM1py, but we have as of yet been unable to figure out a solution for this. I have asked these same questions to our TM1 Support folks and they have been unable to give an answer as they do not support TM1Py :(.
Beta Was this translation helpful? Give feedback.
All reactions