...
- Authentication (Through CAS / KeyCloak)
- Would most likely require changes to software to take advantage of CAS / KeyCloak tokens
- Roles (Associated with the source IP)
- Access whitelisting (Components, types (IDLs), methods. etc.)
- Associated with source IP
- Would require software changes to consider /<component>/<method> endpoints.
...
{"serverDuration": 68, "requestCorrelationId": "325a3a1bb9f59dac"}