# deploymentconfigs myapp-rhpamcentr, container myapp-rhpamcentr KIE_ADMIN_USER=adminUser KIE_ADMIN_PWD=adminUser1! KIE_MBEANS=enabled KIE_SERVER_CONTROLLER_USER=controllerUser KIE_SERVER_CONTROLLER_PWD=controllerUser1! KIE_SERVER_CONTROLLER_TOKEN= KIE_SERVER_USER=yoda KIE_SERVER_PWD=usetheforce123@ MAVEN_REPO_ID= MAVEN_REPO_URL=http://nexus.project.openshiftdomain/repository/maven-snapshots MAVEN_REPO_USERNAME=admin MAVEN_REPO_PASSWORD=admin123 KIE_MAVEN_USER=mavenUser KIE_MAVEN_PWD=mavenUser1! GIT_HOOKS_DIR= HTTPS_KEYSTORE_DIR=/etc/businesscentral-secret-volume HTTPS_KEYSTORE=keystore.jks HTTPS_NAME=jboss HTTPS_PASSWORD=mykeystorepass WORKBENCH_ROUTE_NAME=myapp-rhpamcentr SSO_URL=http://sso-jschwan-rhpam-0f12.project.openshiftdomain/auth SSO_OPENIDCONNECT_DEPLOYMENTS=ROOT.war SSO_REALM=demo SSO_SECRET=business-central-secret SSO_CLIENT=business-central-client SSO_USERNAME=serviceUser SSO_PASSWORD=serviceUser1! SSO_DISABLE_SSL_CERTIFICATE_VALIDATION=false SSO_PRINCIPAL_ATTRIBUTE=preferred_username HOSTNAME_HTTP=2330-rhpamcentr.project.openshiftdomain HOSTNAME_HTTPS=secured-2330-rhpamcentr.project.openshiftdomain AUTH_LDAP_URL= AUTH_LDAP_BIND_DN= AUTH_LDAP_BIND_CREDENTIAL= AUTH_LDAP_JAAS_SECURITY_DOMAIN= AUTH_LDAP_BASE_CTX_DN= AUTH_LDAP_BASE_FILTER= AUTH_LDAP_SEARCH_SCOPE= AUTH_LDAP_SEARCH_TIME_LIMIT= AUTH_LDAP_DISTINGUISHED_NAME_ATTRIBUTE= AUTH_LDAP_PARSE_USERNAME= AUTH_LDAP_USERNAME_BEGIN_STRING= AUTH_LDAP_USERNAME_END_STRING= AUTH_LDAP_ROLE_ATTRIBUTE_ID= AUTH_LDAP_ROLES_CTX_DN= AUTH_LDAP_ROLE_FILTER= AUTH_LDAP_ROLE_RECURSION= AUTH_LDAP_DEFAULT_ROLE= AUTH_LDAP_ROLE_NAME_ATTRIBUTE_ID= AUTH_LDAP_PARSE_ROLE_NAME_FROM_DN= AUTH_LDAP_ROLE_ATTRIBUTE_IS_DN= AUTH_LDAP_REFERRAL_USER_ATTRIBUTE_ID_TO_CHECK=