When BOSH is integrated with UAA for user management, you need to use a different procedure for non-interactive logins. For example, you would use this procedure when running BOSH commands from shell scripts. This article explains the procedure and how to create a client with BOSH admin privileges on the UAA server of the Ops Manager Director.
uaac" alias. There is another way by using the HTTP API directly to get the owner access token from UAA.uaac target https://director_ip:8443
uaac token owner get login admin -s CLIENT_SECRET -p USER_PASSWORD
USER_PASSWORD can be found in the Credential tab of the Director in Ops Manager, as well as "Uaa Admin User Credentials" for the admin password and "Uaa Login Client Credentials" for the login client respectively.uaac client add CLIENT_ID --scope uaa.none --authorized_grant_types client_credentials --authorities bosh.admin -s CLIENT_SECRET
access_token_validity and refresh_token_validity can be also set for the expiration period of the token.Optionally, the following can be used:
uaac token client get CLIENT_ID -s CLIENT_SECRET
BOSH_CLIENT=CLIENT_ID BOSH_CLIENT_SECRET=CLIENT_SECRET bosh --ca-cert /var/tempest/workspaces/default/root_ca_certificate status
BOSH_CLIENT and BOSH_CLIENT_SECRET within a script scope.Impact
In the steps above, we created a UAA client with bosh.admin scope. User actions with this scope could potentially be disruptive. Please refer to the document on bosh.io for information of permission control.