...
Table of Contents | ||||
---|---|---|---|---|
|
Step 1 -
...
Configure the Carbon Console for SSO
Info |
---|
This step is done in order to have SSO between the API Manager's and Identitiy Server's management consoles. |
...
- Set
disabled
attributes in the<Authenticator>
element tofalse
. ServiceProviderID
: The issuer name of the service provider.IdentityProviderSSOServiceURL
: The URL of the IDP. In this example, it is the URL of the Identity Server.Info A Service Provider (SP) is an entity that provides web services. A service provider relies on a trusted Identity Provider (IdP) for authentication and authorization. In this case, the Identity Server acts as the IdP and does the task of authenticating and authorizing the user of the service provider.
For instructions on how you can configure WSO2 API Manager with IdPs, see the Related Links section at the bottom of this page Step 4.
Code Block |
---|
<Authenticator name="SAML2SSOAuthenticator" disabled="false"> <Priority>10</Priority> <Config> <Parameter name="LoginPage">/carbon/admin/login.jsp</Parameter> <Parameter name="ServiceProviderID">carbonserver</Parameter> <Parameter name="IdentityProviderSSOServiceURL">https://localhost:9444/samlsso</Parameter> <Parameter name="NameIDPolicyFormat">urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</Parameter> </Config> |
Make sure the <priority>
element of the SAML2SSOAuthenticator
is less than that of the BasicAuthenticator
handler. See here for For more information see the FAQ.
Info | ||
---|---|---|
| ||
Service provider and Identity Provider usually communicate with each other about a subject. That subject should be identified through NAME-ID. It should be in some format so that it is easy for the other party to identify it based on the format. Possible The possible values for the
We are using In this scenario use |
Info |
---|
If there are many WSO2 products in your environment, you can configure SSO for the management consoles to gain one-time acces access to all of them the consoles without repeated authentication. You can do this by changing the |
Step 2 -
...
Configure Publisher/Store for SSO
To configure SSO for the API Publisher, open the <API-M_HOME>/repository/deployment/server/jaggeryapps/publisher/site/conf/site.json
file and give the configurations as shown below.
...
Tip | ||||||
---|---|---|---|---|---|---|
The |
Step 3 -
...
Configure the API Store for SSO in passive mode
If the passive mode is disabled and Single Sign-On (SSO) is enabled, it redirects the user to the SSO login page. Therefore, as the WSO2 API Store allows anonymous access, passive mode is enabled by default, so that irrespective of whether SSO is enabled or not it directs the user to the API Store URL, and enables the SSO work flow only when the Sign In button is clicked.
...
Note | ||
---|---|---|
By enabling passive mode in SSO Configuration, WSO2 API Manager enables Passive Authentication on Single Sign On.
|
Step 4 -
...
Configure an Identity
...
Provider
Localtabgroup | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|