qacli auth
Authenticate the user on the remote results server.
Usage
auth {-D|-V} [-U <[protocol://]host:port>] [-u <username>] [-p <password>] [-f <password-file>] [-t <application-token>] [-T <token-file>] [-x <days>] [-q] [--] [-h]
Extended Description
Results may be pushed up to a results server such as the legacy Helix QAC Dashboard or the Validate server. This command authenticates with one of these systems and returns a token that can be used in subsequent commands rather than continually specifying a username & password.
For connections to Helix QAC Dashboard the token is returned to stdout
as a string.
For connections to Validate the token is stored as a file in the user’s filesystem. It is stored in the User Data Location and by default can be found here:
- Windows:
%LOCALAPPDATA%\Perforce\Helix-QAC-<version>/app/validate_ltoken
- Linux:
$HOME/.config/Perforce/Helix-QAC-<version>/app/validate_ltoken
This location can be overridden by setting the environment variable HELIX_QAC_LTOKEN
. See Environment Variables for more details.
Additionally, Validate also supports modern authentication - refer to the Validate documentation for more details. This enables the user to authenticate using a third party provider. Validate can also generate timed limited Application Tokens. See the ‑‑token
/‑‑token‑file
options for more details.
Options
Validate tokens do not expire and you should ‑‑log‑out
when you are finished using them.
Examples
Login to a Validate Server
To login to a Validate server running on the host prometheus
, issue a command such as:
A zero return code indicates success and the token will be stored in the users filesystem.
Authenticate With a Validate Server Using an Application Token
To authenticate with a Validate server using an application token, first login to Validate's web interface and navigate to the Application Tokens screen. Choose Create a new application token, select an appropriate Expiry period, and click Create to generate the token.
Store the token in a safe, protected location. You can then use this token to authenticate from qacli
with a command such as:
Alternatively, you can store the token in an appropriately protected file and authenticate using that file:
Login to a Dashboard Server
To login to a Dashboard server, running on the host zion
, using a password file that contains the password, issue a command such as:
A zero return code indicates success and the token will be returned to stdout
.
Authenticate Using Modern Authentication
Assuming your Validate server has been configured to use a modern authentication service, you just need to try to authenticate using it:
qacli auth --validate --url matrix:8866
Initializing device authorization...
Enter the following code in your browser: 6E20-43F2
If a browser doesn't open please navigate to http://LM-21-3:8008/review/insight-review.html#device
Press Enter to continue...
Waiting for response...
A browser tab will open at the given URL and the user can then enter the token/pin.