This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Configuring with an External Identity Server
App Manager comes in a fully distributed setup with the following nodes; Publisher, Store, Gateway and the IdP. One of the main aspects of the Gateway is to provide security for web applications by securing with SAML2 SSO, via XACML authorization and via enterprise subscription. While you can use App Manager itself to act as the IdP, it is recommended to setup an external WSO2 Identity Server instance instead.Â
Follow the steps below to configure an external WSO2 Identity Server as the IdP for App Manager authentication.
$
{IS_SERVER_HOST}
= localhost and the ${IS_SERVER_PORT}
= 9444.- Change the following config elements in the
<APPM_HOME>/repository/conf/app-manager.xml
file.Change the
ServerURL
,Username
andPassword
 elements in the<AuthManager>
section to point to the Identity Server URL and credentials.<ServerURL>https://<IS_SERVER_HOST>:{IS_SERVER_PORT}/services/</ServerURL> <ServerURL>https://localhost:9444/services/</ServerURL>
Change the
providerURL
 element in the<SSOConfiguration>
section as shown below:<IdentityProviderUrl>https://localhost:9444/samlsso</IdentityProviderUrl> <providerURL>https://localhost:9444</providerURL>
Change the
ServerURL
 element in the<EntitlementServiceConfiguration>
section as shown below:<ServerUrl>https://localhost:9444</ServerUrl>Â
Change the
identityProviderURL
config in the<AppM_HOME>/repository/deployment/server/jaggeryapps/store/config/store.json
file as shown below:"ssoConfiguration": { "enabled": true, "issuer": "store", "identityProviderURL": "https://localhost:9444/samlsso", "keyStorePassword": "wso2carbon", "identityAlias": "wso2carbon", "responseSigningEnabled": "true", "storeAcs" : "%https.host%/store/acs", "keyStoreName": "/repository/resources/security/wso2carbon.jks" },
Change the
identityProviderURL
 element in the<AppM_HOME>/repository/deployment/server/jaggeryapps/publisher/config/publisher.json
file as shown below:"ssoConfiguration": { "enabled": true, "issuer": "publisher", "identityProviderURL": "https://localhost:9444/samlsso", "keyStorePassword": "wso2carbon", "identityAlias": "wso2carbon", "responseSigningEnabled": "true", "publisherAcs": "%https.host%/publisher/sso", "keyStoreName": "/repository/resources/security/wso2carbon.jks" },
- Start both the AppM and IS servers.
- Login to the WSO2 IS Management Console.
- Click Add under Main > Service Providers.
- Give a name for the service provider and click Register.Â
You are navigated to the detailed configuration page. Expand SAML2 Web SSO Configuration inside the Inbound Authentication Configuration section and click Configure.
Provide the configurations to register the App Store as the SSO service provider. These sample values may change depending on your configuration.
- Issuer: store
- Assertion Consumer URL:Â
https://localhost:9443/store/acs
 (i.eÂhttps://{AppMHost}:{AppMPort}/store/acs
). This is the URL for the acs page for your running store app. Select the following options:
Enable Response Signing
Enable Single Logout
- Click Register once done.
For example:Â
- Similarly, provide configurations to register the App Publisher and social apps as SSO service providers. These sample values may change depending in your configuration.
- Issuer: publisher
- Assertion Consumer URL:Â
https://localhost:9443/publisher/acs
 (i.eÂhttps://{AppMHost}:{AppMPort}/publisher/acs
). This is the URL for the acs page for your running publisher app. Select the following options:
Enable Response Signing
Enable Single Logout
- Click Register once done.
- Issuer: social
- Assertion Consumer URL:Â
https://localhost:9443/social/acs
 (i.eÂhttps://{AppMHost}:{AppMPort}/social/acs
). This is the URL for the acs page for your running social apps. Select the following options:
Enable Response Signing
Enable Single Logout
- Click Register once done.
Once all configurations are done you should be able to login to publisher and store UI with the external Identity server.