ReqSuite® Requirements Manager (RM)
Interface Administration

To perform administrative tasks on interfaces, ReqSuite® RM provides an interface management via a corresponding item in the administration menu. In the context of ReqSuite® RM “interfaces” are connection data to other tools such as JIRA, TFS, AzureDevOps, GitLab, other ReqSuite® RM installations and user directories such as OpenLDAP, Active Directory or Azure Active Directory.

For creating (“Add Interface…” button), modifying (pencil icon), or deleting (trash icon) interfaces, or for checking the connection (check icon), ReqSuite® RM provides corresponding functionality via the “Interfaces” item in the administration menu (see Figure 1).

Figure 1. Interface administration in ReqSuite® RM

Since most functionality is quite self-explanatory, it will not be explained further here. Rather, the following explains what to consider when setting up different connections.

JIRA

ReqSuite® RM can be connected with both JIRA on-prem and JIRA cloud. However, when using ReqSuite® RM as SaaS and JIRA on-prem, it is necessary that the local firewall is open to allow connection from the cloud to the local server.

When setting up the actual connection, the host address including protocol, e.g., https://xxx.atlassian.net must be entered. Furthermore, instead of using a personal password, a (personal) access token (PAT)  must be used. This token can be generated in the settings area within JIRA or on id.atlassian.com.

TFS / AzureDevOps

ReqSuite® RM can be connected with both TFS on-prem and AzureDevOps in the cloud. However, when using ReqSuite® RM as SaaS and TFS on-prem, it is necessary that the local firewall is open to allow connection from the cloud to the local server.

When setting up the actual connection, the host address including protocol, e.g., https://xxx.visualstudio.com must be entered. Instead of using the personal password, it is alternatively possible to use a personal access token (PAT). This token must be generated in the settings area within TFS/AzureDevOps.

GitLab

ReqSuite® RM can be connected with both GitLab on-prem and GitLab in the cloud. However, when using ReqSuite® RM as SaaS and GitLab on-prem, it is necessary that the local firewall is open to allow connection from the cloud to the local server.

When setting up the actual connection, the host address including protocol, e.g., https://gitlab.com must be entered. Instead of using the actual user name, the user ID (number) is necessary. Furthermore, instead of the personal password, a (personal) access token (PAT) is required. This token can be generated in the settings area within GitLab.

Other ReqSuite® RM Installations

ReqSuite® RM can be connected with other ReqSuite® RM installations including the cloud-based ReqSuite® RM on https://us.reqsuite.com or https://eu.reqsuite.com. However, when the invoking ReqSuite® RM instance is in the cloud and the invoked ReqSuite® RM instance is on-prem, it is necessary that the local firewall is open to allow connection from the cloud to the local server. In the other case, there shall not be any restrictions by default.

When setting up the actual connection, the host address including protocol, e.g., https://eu.reqsuite.com must be entered. The user account on the target system must have the default role “API User” as otherwise the connection will fail.

Active Directory

ReqSuite® RM can be connected with Active Directory. However, when using ReqSuite® RM as SaaS, it is necessary that the local firewall is open to allow connection from the cloud to the local server.

When setting up the actual connection, the host address including LDAP or LDAPs, e.g., LDAP://192.168.1.10 must be entered. The user name for establishing the connection can either be written in email syntax (e.g., admin@xxx.com) or LDAP syntax (e.g., cn=admin,dc=xxx,dc=com).

Other LDAP Directories (e.g., OpenLDAP)

ReqSuite® RM can be connected with other LDAP directories implementing the LDAP standard. However, when using ReqSuite® RM as SaaS, it is necessary that the local firewall is open to allow connection from the cloud to the local server.

When setting up the actual connection, the host address including LDAP or LDAPs, e.g., LDAP://192.168.1.10 must be entered. Furthermore, when using LDAPS, the port :636 must be added. If the LDAP directory uses a complex hierarchy it is necessary that the base address is used within the server adress, e.g., LDAP://192.168.1.10/o=xxx

The user name for establishing the connection must be written in LDAP syntax (e.g., cn=admin,dc=xxx,dc=com).

Azure Active Directory

ReqSuite® RM can be connected with Azure Active Directory.

When setting up the actual connection, the host address including the tenant name in Microsoft (not in ReqSuite® RM) must be used, e.g., https://graph.microsoft.com/xxx. Furthermore, ReqSuite® RM must be registered as an app in the Azure Active Directory and API rights for directory and user operations must be granted.

Instead of using a user name, the client ID of the app generated by Azure Active Directory must be entered. The same holds true for the password. Instead of entering a personal password, a client secret generated by Azure Active Directory must be used.