Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This topic provides instructions on how to configure the Inwebo app and the Identity Server to integrate using a sample app. See the following sections for more information.

Info

Inwebo Authenticator is supported by Identity Server version 5.1.0

Anchor
Configuring the inwebo app
Configuring the inwebo app

Configuring the Inwebo app

  1. Go to http://www.inwebo.com/ and click free signup and register.
  2. Activate your email notification and go to https://www.myinwebo.com/.
  3. Go to Administration console and get the Service Id of admin user.

  4. Navigate to Secure Sites and download the certificate for API access (.p12 format).
  5. Go to MyInweboAccount and navigate to My Devices, click add a Device button. The following window appears.
  6. Download Inwebo app in your mobile or any other devices. Add the above secure site ID or scan the QR code to activate the account

Anchor
Deploying Inwebo artifacts
Deploying Inwebo artifacts
Deploying Inwebo artifacts

  1. Place the inweboauthenticationendpoint.war file into the <IS_HOME>/repository/deployment/server/webapps directory.
  2. Place the org.wso2.carbon.identity.authenticator.inwebo-1.0.0.jar file into the <IS_HOME>/repository/components/dropins directory.

    Note

    If you want to upgrade the Inwebo Authenticator in your existing IS pack, please refer upgrade instructions.

To download the authenticator and artifacts, go to https://store.wso2.com/store/assets/isconnector/inwebo.

Anchor
Deploying travelocity.com sample app
Deploying travelocity.com sample app

Deploying travelocity.com sample app

The next step is to deploy the travelocity.com sample app in order to use it in this scenario.

To configure this, see Deploying the Sample App.

Anchor
Configuring the identity provider
Configuring the identity provider

Configuring the identity provider

Now you have to configure WSO2 Identity Server by adding a new identity provider.

  1. Download the WSO2 Identity Server from here and run it.
  2. Log in to the management console as an administrator.
  3. In the Identity section under the Main tab of the management console, click Add under Identity Providers.
  4. Give a suitable name as the Identity Provider Name

    .
    Image Removed
  5. Go to Inwebo Configuration under Federated Authenticators

  6. Enter the  Service Id, p12 Password and p12 File Path values from  and fill out the form to configure Inwebo by expanding Inwebo Configuration under Federated Authenticators.
    Image AddedFill in the following.

    FieldDescriptionSample Value
    EnableSelecting this option enables Inwebo to be used as an authenticator for users provisioned to the Identity Server.Selected
    DefaultSelecting the Default checkbox signifies that Inwebo is the main/default form of authentication. This removes the selection made for any other Default checkboxes for other authenticators.Selected
    Service IDEnter the Service ID of your Inwebo app.917
    Certificate idThis is the p12 password of the Inwebo app you created.
  7. Select both checkboxes to Enable Inwebo Authenticator and make it the Default.

  8. fsh235xd3
    Configuration fileThis is the p12 file path values from the Inwebo app you created.

     

  9. Click Register.

You have now added the identity provider.

Anchor
Configuring the service provider
Configuring the service provider

Configuring the service provider

The next step is to configure the service provider.

  1. Return to the management console.

  2. In the Identity section under the Main tab, click Add under Service Providers.

  3. Enter travelocity.com in the Service Provider Name text box and click Register.

  4. In the Inbound Authentication Configuration section, click Configure under the SAML2 Web SSO Configuration section.

  5. Now set the configuration as follows:

    1. Issuer: travelocity.com

    2. Assertion Consumer URL: http://localhost:8080/travelocity.com/home.jsp

  6. Select the following check-boxes:
    1. Enable Response Signing

    2. Enable Assertion Signing

    3. Enable Single Logout

    4. Enable Attribute Profile

    5. Include Attributes in the Response Always
  7. Click Update to save the changes. Now you will be sent back to the Service Providers page.

  8. Go to Local and Outbound Authentication Configuration section.

  9. Select the Advanced configuration radio button option.

  10. Add the basic authentication as first step and Inwebo authentication as the second step

You have now added and configured the service provider.

Anchor
Configuring User Claim
Configuring User Claim

Configuring User Claim

  1. Go to Claims under IS Management Console
  2. Select Add New Claim 
  3. Add new claim UserId (Change Claim Uri as (http://wso2.org/claims/authentication/inwebo/userId)
  4. Go to Service provider, select travalocity.com→EditClaim configuration
  5. Update the claim UserId

  6. Now go to Users and Roles 
  7. Add the details and update the profile.

Anchor
Testing the sample
Testing the sample

Testing the sample

  1. To test the sample, go to the following URL: http://localhost:8080/travelocity.com

  2. Click the link to log in with SAML from WSO2 Identity Server.

  3. Basic authentication page will be visible, use your IS username and password.

  4. Hit Click! Button to authenticate Inwebo.
  5.  You will get a notification in your external device(mobile).

  6.  Enter your Inwebo PIN

  7. Click accept
  8. Click ok and taken to the home page of the travelocity.com app