WSO2 products can be configured to authenticate users using their attributes. For example, these attributes can be email or mobile number instead of the username. If your organization decide to use users email as their username, this topic provides instructions on how to set up your WSO2 product to authenticate users using their email.
...
- Open the <
PRODUCT_HOME>/repository/conf/carbon.xml
file. Look for the commented out configuration
EnableEmailUserName
. Uncomment the configuration to enable email authentication.Code Block language html/xml <EnableEmailUserName>true</EnableEmailUserName>
Open the
<IS_HOME>/repository/conf/
identity/
file and set the following property toidentity-mgt.properties
true
.Info This step is required due to a known issue that prevents the confirmation codes from being removed after they are used when email usernames are enabled. This occurs because the '@' character (and some special characters) are not allowed in the registry. To overcome this issue, enable hashed usernames when saving the confirmation codes by configuring the properties below.
Code Block language xml UserInfoRecovery.UseHashedUserNames=true
Optionally, you can also configure the following property to determine which hash algorithm to use.
Code Block language xml UserInfoRecovery.UsernameHashAlg=SHA-1
Open the <
PRODUCT_HOME>/repository/conf/user-mgt.xml
file and add the following property under the relevant user store manager tag, such asReadWriteLDAPUserStoreManager
,ActiveDirectoryUserStoreManager
or any other user store manager tag.
This property determines the username validation that will be enforced when theEnableEmailUserName
option is enabled.Note Note: The
user-mgt.xml
file consists of configurations for the primary user store. If you are trying to configure this for a secondary user store, modify the relevant user store configuration file found in the<PRODUCT_HOME>/repository/deployment/server/userstores
directory instead.Code Block language xml <Property name="UsernameWithEmailJavaScriptRegEx">^[\S]{3,30}$</Property>
Configure the following set of parameters in the user store configuration, depending on the type of user store you are connected to (LDAP/Active Directory/JDBC).
Note Note: These properties are not added by default for the
JDBCUserStoreManager
. Therefore, if you are using a JDBC-based user store, you need to add the properties marked with an asterisk *, to theuser-mgt.xml
file under the relevant user store manager tag. For any other type of user store, simply modify the values of the properties listed below Some of these properties are specific to some types of user stores. Therefore check to description section of the properties to validate if they apply to your type of user store.If the
UsernameWithEmailJavaScriptRegEx
property has a regular expression with the "@" symbol, it is not required to configureUsernameJavaRegEx
andUsernameJavaScriptRegEx
properties. The priority order to configure username regular expression properties are as follows:- UsernameJavaRegEx
- UsernameWithEmailJavaScriptRegEx
For more information on these properties, click here.
Parameter Description UserNameAttribute
Set the mail attribute of the user. LDAP/Active Directory only
Code Block language html/xml <Property name="UserNameAttribute">mail</Property>
UserNameSearchFilter
Use the mail attribute of the user instead of
cn
oruid
. LDAP/Active Directory onlyCode Block language html/xml <Property name="UserNameSearchFilter">(&(objectClass=identityPerson)(mail=?))</Property>
UserNameListFilter
Use the mail attribute of the user. LDAP/Active Directory only
Code Block language html/xml <Property name="UserNameListFilter">(&(objectClass=identityPerson)(mail=*))</Property>
UserDNPattern
This parameter is used to speed up the LDAP search operations. You can comment out this configuration. LDAP/Active Directory only
Code Block language html/xml <!--Property name="UserDNPattern">cn={0},ou=Users,dc=wso2,dc=com</Property-->
UsernameJavaScriptRegEx
Change this property under the relevant user store manager tag as follows. This property allows you to add special characters like "@" in the user name.
Code Block language xml <Property name="UsernameJavaScriptRegEx">^[a-zA-Z0-9._-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,4}$</Property>
UsernameJavaRegEx
This is a regular expression to validate usernames. By default, strings have a length of 5 to 30. Only non-empty characters are allowed. You can provide ranges of alphabets, numbers and also ranges of ASCII values in the RegEx properties.
Code Block language xml <Property name="UsernameJavaRegEx">a-zA-Z0-9@._-{3,30}$</Property>
Realm configurations The
AdminUser
username must use the email attribute of the admin user.Code Block language html/xml <AdminUser> <UserName>admin@wso2.com</UserName> <Password>admin</Password> </AdminUser>
Note Before this configuration, the user having the username admin and password admin was considered the super administrator. The super administrator user cannot be deleted.
After this configuration, the user having the username
admin@wso2.com
is considered the super administrator. The user having the username admin is considered as a normal administrator.Tip If you changed the password of the admin user to something other than 'admin', start the WSO2 IS server using the -Dsetup parameter as seen in the command below.
Code Block sh wso2server.sh -Dsetup
Info With these configuration users can login to supper tenant with both email user name (bob@gmal.com) or non email user names (alice). But for tenant only email user names allowed (tod@gmail.com@wso2.com)
Note You can configure email user name without enabling
EnableEmailUserName
property, then users can login to both supper tenant and tenant using email and non email user names. But supper tenant users should always use @carbon.super at the end of user names.
...