Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Single sign-on (SSO) allows users, who are authenticated against one application, gain access to multiple other related applications as well without having to repeatedly authenticate themselves. It also allows the web applications gain access to a set of back-end services with the logged-in user's access rights, and the back-end services can authorize the user based on different claims like user role.

...

Let us take the example of using a common JDBCUserStore for both the IS and API Manager. See steps below for configuring the User Store.1. Open the

  1. Open <AM_HOME>/repository/conf/datasources/master-datasources.xml file and add the datasource configuration for the relevant database.

...

  1. For example

...

  1. ,

 

  1. Code Block
    languagehtml/xml
    <datasource>
         <name>WSO2_UM_DB</name>
         <description>The datasource used for registry and user manager</description>
         <jndiConfig>
                  <name>jdbc/WSO2UMDB</name>
         </jndiConfig>
         <definition type="RDBMS">
                  <configuration>
                      <url>jdbc:mysql://localhost:3306/410_um_db</url>
                      <username>username</username>
                      <password>password</password>
                      <driverClassName>com.mysql.jdbc.Driver</driverClassName>
                      <maxActive>50</maxActive>
                      <maxWait>60000</maxWait>
                      <testOnBorrow>true</testOnBorrow>
                      <validationQuery>SELECT 1</validationQuery>
                      <validationInterval>30000</validationInterval>
                  </configuration>
           </definition>
    </datasource>

...

  1. Note
    • Place the relevant database driver

...

    • JAR file in

...

    • <AM_HOME>/repository/components/lib directory.

...

    • To create the database schema, you can use the relevant script found in

...

    • <AM_HOME>/dbscripts directory.

...

  1. Add the same datasource configuration

...

  1. in <IS_HOME>/repository/conf/datasources/master-datasources.xml file.

...

  1. Note

    Place the relevant database driver

...

  1. JAR file in

...

  1. <IS_HOME>/repository/components/lib directory.

...

  1. Open

...

  1. <AM_HOME>/repository/conf/user-mgt.xml file and change its

...

  1. dataSource

...

  1. property

...

  1. to the jndiConfig name given above (jdbc/WSO2UMDB).

...

  1. For example,

    Code Block
    languagehtml/xml
    <Property name="dataSource">jdbc/WSO2UMDB</Property>

...

  1. Have the same configuration as above in

...

  1. the <IS_HOME>/repository/conf/user-mgt.xml file as well.

...

  1. The WSO2 Identity Server has an embedded LDAP user store by default. Follow the instructions on Internal JDBC User Store Configuration to disable the default LDAP and to use the JDBC User Store instead.

...

  1. Open

...

  1. <IS_HOME>/repository/conf/security/application-authenticators.xml and change the

...

  1. loginPage

...

  1. IP and port

...

  1. in <AuthenticatorConfig name="BasicAuthenticator" enabled="true"> accordingly.

SSO configuration instructions are given below.

Table of Contents
maxLevel4
minLevel4

Configuring WSO2 Identity Server as a SAML 2.0 SSO Identity Provider

1. Download and set up WSO2 Identity Server. Instructions can be found in the Installation Guide of IS documentation (http://docs.wso2.org/wiki/display/IS410/Installation+Guide).

2. Start the IS server and log in to its Management Console UI.

3. Select the SAML SSO menu under the Main menu in the left pane.

Image Modified

4. The SAML SSO window opens. Add the following configurations under section Register New Service Provider to register the API Manager applications as SSO service providers. Use the exact same values, which were used to configure the API Manager web applications.

To register API Publisher as an SSO service provider:

    • Issuer : API_PUBLISHER
    • Assertion Consumer URL : https://localhost:9443/publisher/jagg/jaggery_acs.jag. Change the IP and port accordingly. This is the url for the acs page in your running publisher app.
    • Select the options Use fully qualified username in the SAML Response, Enable Response Signing, Enable Assertion Signing and Enable Single Logout.

    • Click Register once done.

...

    • Issuer : API_STORE
    • Assertion Consumer URL : https://localhost:9443/store/jagg/jaggery_acs.jag. Change the IP and port accordingly. This is the url for the acs page in your running store app.
    • Select the options Use fully qualified username in the SAML Response, Enable Response Signing, Enable Assertion Signing and Enable Single Logout.

    • Click Register once done.

...