Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table of Contents
maxLevel3
minLevel3
typeflat

...

Access control

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleXACML - eXtensible Access Control Markup Language

XACML (eXtensible Access Control Markup Language) is a tool for controlling access to applications. XACML is an XML-based language for access control that has been standardized by the Technical Committee of the OASIS consortium. XACML is very popular as a fine grained authorization method amongst the identity community. See Access Control Concepts for more information.

...

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleAccess Tokens

A token is a simple string that is passed as an HTTP header of a request. Access tokens authenticate API users and applications and ensure better security, e.g., preventing DoS attacks. If a token that is passed with a request is invalid, the request is discarded in the first stage of processing. WSO2 Identity Server supports four following token types of access tokens:

  • Application access tokens: These tokens identify and authenticate token: This token identifies and authenticates an entire application. You can invoke all the APIs associated with an application using a single application access token.
  • User access tokens: These tokens identify token: This token identifies the end user of an application, e.g., the end user of a mobile application deployed on a different device.ID token:
  • Refresh token: When an access token expires, you have to obtain a new access token to access the API. A refresh token enables to obtain a new access token without a user intervention and use it to regain access to the API.
  • ID token: This is a JSON Web Token (JWT) containing the user's authentication status and profile information in the form of claims.
Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleGrant Types

There are many supported grant types in the OAuth2 specification. A grant type is a credential representing the resource owner's authorization (to access its protected resources) used by the client to obtain an access token. See OAuth Concepts for more information.

...

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleInbound Authenticators

The responsibility of inbound authenticators is to identify and parse all the incoming authentication requests and then build the corresponding response. A given inbound authenticator has two parts.

  1. Request Processor
  2. Response Builder

For each protocol supported by WSO2 IS, there should be an inbound authenticator. This architecture component includes inbound authenticators for SAML 2.0, OpenID, OpenID Connect, OAuth 2.0, and WS-Federation (passive). In other words, the responsibility of the SAML 2.0 request processor is to accept a SAML request from a service provider, validate the SAML request and then build a common object model understood by the authentication framework and handover the request to it. The responsibility of the SAML response builder is to accept a common object model from the authentication framework and build a SAML response out of it. Both the request processors and the response builders are protocol aware, while the authentication framework is not coupled to any protocol.

See Identity Server Architecture for more information.

...

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleMulti-factor authentication

The service provider can define how to authenticate users at the Identity Server, for authentication requests initiated by it. While doing that, each service provider can define multiple steps and for each step it can pick more than one authenticatorsauthenticator. The authentication framework will track all the authenticators in each step and will proceed to the next step only if the user authenticates successfully in the current step. Its It's an AND between steps while its an OR between the authenticators in a given step.

See Identity Server Architecture for more information.

...

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleConditional provisioning with roles

If you want to provision a user to an external identity provider, for example to Salesforce or Google Apps, based on the user's role, then you need to define one or more provisioning roles in the outbound provisioning configuration of the corresponding identity provider.

See Configuring Roles for an Identity Provider for more information.


...

Identity provisioning

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleIdentity Provisioning

Identity provisioning plays a key role in propagating user identities across different SaaS providers. Provisioning is the process of coordinating the creation of user accounts, e-mail authorizations in the form of rules and roles, and other tasks such as provisioning of resources associated with enabling new users. See The Evolution of Provisioning Standards for more information.

...

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleSOAP - Simple Object Access Protocol

SOAP, originally defined as Simple Object Access protocol, is a protocol specification for exchanging structured information in the implementation of Web services. It relies on XML Information Set for its message format, and usually relies on other application layer protocols, most notably Hypertext Transfer Protocol (HTTP) or Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission.

Anchor
STS
STS

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleSTS - Security Token Service

The "Security Token Service" component of WSO2 Carbon enables you to configure the generic STS to issue claim-based security tokens. A claim-based security token is a common way for applications to acquire and authenticate the identity information they need about users inside their organization, in other organizations, and on the Internet. This Security Token Service is capable of issuing SAML 1.1 and SAML 2.0 tokens as recommended in WS-Trust and SAML Web Service Token Profile specifications.

...

Panel
borderColorcoral
bgColorlightyellow
titleColorwhite
borderWidth4
titleBGColorcoral
borderStylesolid
titleSAML Metadata

SAML profile requires agreements between system entities regarding identifiers, binding support, end points, certificates and so forth. A metadata specification is used to describe this information in a standard way .