...
Tip | ||
---|---|---|
| ||
Ensure that the " Ensure thatthe new Identity Listeners with By default, the properties are configured as shown below. Therefore, if you have not changed the default configurations, you can skip this step.
|
Follow the steps given below to configure WSO2 IS to enable the ask password feature:
Add the configuration Make sure the following configuration is set (uncommented) in the
<IS_HOME>/repository/conf/identity/identity.xml
file under<Server>
element to file under<EmailVerification>
element below<Server>
element to set the redirection URL valid time period in minutes.
The redirection link that is provided to the user to set the password is invalid after the time specified here has elapsed.Code Block <Server xmlns="http://wso2.org/projects/carbon/carbon.xml"> ... <EmailVerification> <Enable>false</Enable> <ExpiryTime>1440</ExpiryTime> <LockOnCreation>true</LockOnCreation> <Notification> <InternallyManage>true</InternallyManage> </Notification> <AskPassword> <ExpiryTime>1440</ExpiryTime> <PasswordGenerator>org.wso2.carbon.user.mgt.common.DefaultPasswordGenerator</PasswordGenerator> </AskPassword> </EmailVerification> ... </Server>
Panel borderColor Black bgColor White borderWidth 1 You can also configure the expiry time through the Management Console.
Expand title Click to see how to configure this through the management console Start the Identity Server and login log in to the Management Console.
Click Resident under Identity Providers on the Main tab and expand the Account Management Policies tab.
Expand the User Onboarding tab and configure the Ask password code expiry time field. Click Update to save changes.
Optionally, if you are adding users via the management console, the EnableAskPasswordAdminUI property value needs to be added to the
<IS_HOME>/repository/conf/identity/
identity.xml
file.Code Block <EnableAskPasswordAdminUI>true</EnableAskPasswordAdminUI>
Configure the email settings in the
<IS_HOME>/repository/conf/output-event-adapters.xml
file.mail.smtp.from
Provide the email address of the SMTP account.
Example:abcd@gmail.com
mail.smtp.user
Provide the username of the SMTP account.
Example:abcd
mail.smtp.password
Provide the password of the SMTP account. Code Block language xml <adapterConfig type="email"> <!-- Comment mail.smtp.user and mail.smtp.password properties to support connecting SMTP servers which use trust based authentication rather username/password authentication --> <property key="mail.smtp.from">{EMAIL_ID}</property> <property key="mail.smtp.user">{USERNAME}</property> <property key="mail.smtp.password">{PASSWORD}</property> <property key="mail.smtp.host">smtp.gmail.com</property> <property key="mail.smtp.port">587</property> <property key="mail.smtp.starttls.enable">true</property> <property key="mail.smtp.auth">true</property> <!-- Thread Pool Related Properties --> <property key="minThread">8</property> <property key="maxThread">100</property> <property key="keepAliveTimeInMillis">20000</property> <property key="jobQueueSize">10000</property> </adapterConfig>
Note If you are using a Google mail account, note that Google has restricted third-party apps and less secure apps from sending emails by default. Therefore, you need to configure your account to disable this restriction, as WSO2 IS acts as a third-party application when sending emails to confirm user registrations or notification for password reset WSO2 IS.
Expand title Click here for more information. Follow the steps given below to enable your Google mail account to provide access to third-party applications.
- Navigate to https://myaccount.google.com/security.
- Click Signing in to Google on the left menu and make sure that the 2-step Verification is disabled or off.
- Click Connected apps and sites on the left menu and enable Allow less secure apps.
Tip Tip: The email template used to send this email notification is the AskPassword template.
You can edit and customize the email template. For more information on how to do this, see Customizing Automated Emails.
Start the Identity Server and log in to the Management Console.
- In the Main tab, click, under Identity Providers, click Resident and expand the Account Management Policies tab.
Expand the User Onboarding tab and select Enable User Email Verification. Click Update to save changes.
Info The
EmailVerification
property can be enabled for each tenant at tenant creation by adding the following configuration to the<IS_HOME>/repository/conf/identity/identity.xml
file as seen below.Code Block language xml <EmailVerification> <Enable>true</Enable> <LockOnCreation>true</LockOnCreation> <Notification> <InternallyManage>true</InternallyManage> </Notification> </EmailVerification>
...
Table of Content Zone | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||
Management consoleDo the following steps to test the account creation using the password option.
SCIM 2.0
|
...