mauth-test-utils

MAuth clients

License

License

GroupId

GroupId

com.mdsol
ArtifactId

ArtifactId

mauth-test-utils
Last Version

Last Version

4.0.0
Release Date

Release Date

Type

Type

jar
Description

Description

mauth-test-utils
MAuth clients
Project URL

Project URL

https://github.com/mdsol/mauth-jvm-clients
Project Organization

Project Organization

com.mdsol
Source Code Management

Source Code Management

https://github.com/mdsol/mauth-jvm-clients

Download mauth-test-utils

How to add to project

<!-- https://jarcasting.com/artifacts/com.mdsol/mauth-test-utils/ -->
<dependency>
    <groupId>com.mdsol</groupId>
    <artifactId>mauth-test-utils</artifactId>
    <version>4.0.0</version>
</dependency>
// https://jarcasting.com/artifacts/com.mdsol/mauth-test-utils/
implementation 'com.mdsol:mauth-test-utils:4.0.0'
// https://jarcasting.com/artifacts/com.mdsol/mauth-test-utils/
implementation ("com.mdsol:mauth-test-utils:4.0.0")
'com.mdsol:mauth-test-utils:jar:4.0.0'
<dependency org="com.mdsol" name="mauth-test-utils" rev="4.0.0">
  <artifact name="mauth-test-utils" type="jar" />
</dependency>
@Grapes(
@Grab(group='com.mdsol', module='mauth-test-utils', version='4.0.0')
)
libraryDependencies += "com.mdsol" % "mauth-test-utils" % "4.0.0"
[com.mdsol/mauth-test-utils "4.0.0"]

Dependencies

compile (3)

Group / Artifact Type Version
commons-io : commons-io jar 2.6
ch.qos.logback : logback-classic jar 1.2.3
com.github.tomakehurst : wiremock jar 2.26.0

provided (1)

Group / Artifact Type Version
com.github.ghik : silencer-lib_2.13.1 jar 1.6.0

Project Modules

There are no modules declared in this project.

Build Status

Java Client for MAuth

This is a standalone client for Medidata Authentication

Medidata Authentication

The Medidata authentication process bounds - in this case verifies - an API message against its origin.

Medidata authentication provides a fault tolerant, service-to-service authentication scheme for Medidata and third-party applications that use web services to communicate with each other.

The process and integrity algorithm are based on digital signatures encrypted and decrypted with private/public key pairs.

Medidata’s authentication process requires public key management, which is done by way of an API. It provides message integrity and provenance validation by verifying a message sender’s signature. Each public key is associated with an application and is used to authenticate message signatures. Each private key is stored by the application signing requests with the private key.

NOTE: Only the signing application has any knowledge of the application’s private key.

MAuth proxy

If you’re performing some small, manual tests with MAuth-enabled service and do not want to code the MAuth signing process, consider using these tools:

Usage

A Medidata server requires the requests to be signed using Medidata Authentication

com.mdsol

mdsol

Versions

Version
4.0.0
3.0.0
2.1.1
2.1.0
2.0.4
2.0.3
2.0.2
2.0.1
2.0.0
1.0.16
1.0.15
1.0.14
1.0.13
1.0.10
1.0.9
1.0.8
1.0.7
1.0.6
1.0.5
1.0.1