Security News
tea.xyz Spam Plagues npm and RubyGems Package Registries
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
@parameter1/base-cms-marko-web-omeda-identity-x
Advanced tools
Readme
Omeda+IdentityX components for BaseCMS/Marko websites.
Based on the identity provider(s) in use, install and configure only one of these packages. The other packages can be installed separately if needed, but this package should be the only one configured.
Additional information can be found in the Omeda and IdentityX API documentation.
All configuration data must be passed to the middleware when loaded (See Middleware Setup below.)
Property | Required? | Description | Default value |
---|---|---|---|
brandKey | Yes | The Omeda Brand key (such as orgcd ). | |
clientKey | No | The Omeda client key (such as client_orgc .) Required if sending deployment optIns via the underlying omeda package! marko-web-omeda docs | |
appId | Yes | The Omeda application API read token | |
inputId | Yes | The Omeda application API write token | |
rapidIdentProductId | Yes | The Omeda identifier for a Website product (ProductType=7). | |
idxConfig | Yes | An instance of the IdentityX configuration class (see marko-web-identity-x#1) | n/a |
idxRouteTemplates | Yes | An object containing the Marko templates to use for each IdentityX endpoint. (see marko-web-identity-x#2) | |
omedaPromoCodeCookieName | No | The name of the cookie to look for a persisted/original promo code. | omeda_promo_code |
omedaPromoCodeDefault | No | The default promo code to send with all Omeda requests. Falls back to input ID default configured by Omeda. | |
idxOmedaRapidIdentifyProp | No | The property (in the express app context) where the O+IdX rapid identification service is located. | $idxOmedaRapidIdentify |
omedaGraphQLClientProp | No | The property (in the express app context) where the Omeda GraphQL client is located. | $omedaGraphQLClient |
omedaRapidIdentifyProp | No | The property (in the express app context) where the Omeda rapid identification service is located. | $omedaRapidIdentify |
appendBehaviorToHook | No | An array of objects defining behaviors to append to rapid identification calls. | |
appendBehaviorToHook[].hook | The name of the hook, such as onLoginLinkSent | ||
appendBehaviorToHook[].behaviorId | The Omeda Behavior ID to append to the rapid identification call. | ||
appendDemographicToHook | No | An array of objects defining demographics to append to rapid identification calls. | |
appendDemographicToHook[].hook | The name of the hook, such as onLoginLinkSent | ||
appendDemographicToHook[].demographicId | The Omeda Demographic ID to append. | ||
appendDemographicToHook[].valueIds | An array of Omeda Demographic Value IDs (Int s) to append | ||
appendDemographicToHook[].writeInValue | A string to include as an OEC/Other value | ||
appendPromoCodeToHook | No | An array of objects defining demographics to append to rapid identification calls. | |
appendPromoCodeToHook[].hook | The name of the hook, such as onLoginLinkSent | ||
appendPromoCodeToHook[].promoCode | The Omeda Promo Code (String ) to append. |
This package:
/__idx/omeda-rapid-ident
) available on a base-cms websiteTo make the local omeda mountpoint available, load the middleware exported by this package. For most applications, this will be done in the startServer
function passed to the marko-web package.
See config section above and the Omeda and IdentityX package documentation for available configurations.
const handler = require('@parameter1/base-cms-marko-web-omeda-identity-x');
const omedaConfig = require('./config/omeda');
const idXConfig = require('./config/identity-x');
const idxRouteTemplates = require('./templates/user');
startServer({
onStart: async (app) => {
handler(app, {
...omedaConfig,
idxConfig,
idxRouteTemplates,
})
},
}
It can also be loaded as a standard Express route middleware.
module.exports = (app) => {
handler(app, { ...omedaConfig, idxConfig, idxRouteTemplates });
};
To use the Rapid Identification hook, load the Vue component in your Browser config. When enabled, the Omeda Rapid Identification API will be called automatically when the oly_enc_id
URL query parameter is present.
import OmedaIdentityX from '@parameter1/base-cms-marko-web-omeda-identity-x/browser';
export default (Browser) => {
OmedaIdentityX(Browser);
};
FAQs
Marko Omeda+IdentityX integration tools
The npm package @parameter1/base-cms-marko-web-omeda-identity-x receives a total of 973 weekly downloads. As such, @parameter1/base-cms-marko-web-omeda-identity-x popularity was classified as not popular.
We found that @parameter1/base-cms-marko-web-omeda-identity-x demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.
Security News
UnitedHealth Group disclosed that the ransomware attack on Change Healthcare compromised protected health information for millions in the U.S., with estimated costs to the company expected to reach $1 billion.