When BOSH is integrated with UAA for user management, you need to use a different procedure for non-interactive logins. For example, you would use this procedure when running BOSH commands from shell scripts. This article explains the procedure and how to create a client with BOSH admin privileges on the UAA server of the Ops Manager Director.
uaac
" alias. There is another way by using the HTTP API directly to get the owner access token from UAA.uaac target https://director_ip:8443
uaac token owner get login admin -s CLIENT_SECRET -p USER_PASSWORD
USER_PASSWORD
can be found in the Credential tab of the Director in Ops Manager, as well as "Uaa Admin User Credentials
" for the admin password and "Uaa Login Client Credentials
" for the login client respectively.uaac client add CLIENT_ID --scope uaa.none --authorized_grant_types client_credentials --authorities bosh.admin -s CLIENT_SECRET
access_token_validity
and refresh_token_validity
can be also set for the expiration period of the token.Optionally, the following can be used:
uaac token client get CLIENT_ID -s CLIENT_SECRET
BOSH_CLIENT=CLIENT_ID BOSH_CLIENT_SECRET=CLIENT_SECRET bosh --ca-cert /var/tempest/workspaces/default/root_ca_certificate status
BOSH_CLIENT
and BOSH_CLIENT_SECRET
within a script scope.Impact
In the steps above, we created a UAA client with bosh.admin scope. User actions with this scope could potentially be disruptive. Please refer to the document on bosh.io for information of permission control.