Warning |
---|
This content is a work in progress. |
...
Add
trustManagerClassName="org.wso2.carbon.identity.core.util.ClientAuthX509TrustManager
" entry to tomcat connector in<TOMCAT_HOME>/repository/conf/tomcat/catalina-server.xml.
A sample configuration is shown below.Code Block <Connector protocol="org.apache.coyote.http11.Http11NioProtocol" port="9443" bindOnInit="false" sslProtocol="TLS" --- --- trustManagerClassName="org.wso2.carbon.identity.core.util.ClientAuthX509TrustManager" URIEncoding="UTF-8"/>
- Place Download the connector from here and place the corresponding osgi bundle in the
<IS_HOME>/repository/component/dropins
directory. Open
<IS_HOME>/repository/conf/tomcat/catalina-server.xml
file and ensure that the clientAuth attribute in the Connector tag is set to “want”. This is done to disable the certificate authentication on certain occasions (like when working on mobile apps). This makes two-way TLS authentication optional.Add the following configuration in <IS_HOME>/repository/conf/identity/identity.xml file under the
<EventListners>
property.Code Block <EventListener type="org.wso2.carbon.identity.core.handler.AbstractIdentityHandler" name="org.wso2.carbon.identity.oauth2.token.handler.clientauth.mutualtls.MutualTLSClientAuthenticator" orderId="158" enable="true" />
For mutual TLS authentication, the public certificate of the WSO2 Identity Server has to be imported to the truststore of the client and the public certificate of the client has to be imported to the client-truststore of WSO2 Identity Server.
Sample commands
The following two commands are examples if you are using the keystore and client-truststore of the Identity Server itself for the client. This is executed from the <IS_HOME>/repository/resources/security
directory.
...