This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Customizing the Authentication Endpoint
The authentication endpoint is the authentication URL used in authentication requests. The following sections discuss methods of customizing this endpoint for various scenarios.
Customizing the authentication endpoint URL
The authentication endpoint URL is the location in your web application that contains authentication related pages.
Follow the steps below to customize the authentication endpoint URL:
Edit the
<IS_HOME>/repository/conf/identity/file, and change the value of the following parameter depending on the URL that the web application should run.application-authentication.xml<AuthenticationEndpointURL>/sso/login</AuthenticationEndpointURL>
For example, If you specify the value as
/sso/login, the web application runs onhttps://<host_name>:port_number>/sso/login.Note
If you do not change the default value of the
<AuthenticationEndpointURL>parameter, accessing the dashboard redirects you to the WSO2 Identity Server management console.Run the web application on the new authentication endpoint URL.
Controlling the request parameters going to the authentication endpoint
Additional request parameters can be added and customized for the request sent to the authentication endpoint. To customize this, uncomment the following configurations in the <IS_HOME>/repository/conf/identity/application-authentication.xml file, under the ApplicationAuthentication element (which is the root element).
<!--AuthenticationEndpointQueryParams action="exclude"--> <!--AuthenticationEndpointQueryParam name="username"/--> <!--AuthenticationEndpointQueryParam name="password"/--> <!--/AuthenticationEndpointQueryParams-->
Note: In the above configuration, username and password are just given as examples. You can configure any query parameter here for your request and customize it according to your specifications.
Loading tenants into the dropdown in the login page of the authentication endpoint web application
This section is useful in scenarios where there are multiple tenants used, where users can login to web applications with their credentials for their specified tenants. For instance, for a user in the test.com tenant with the username test1, the user would have to enter the full username as test1@test.com in order to login. Enabling this feature will load all the available active tenants onto a dropdown list on the login page of the web application that the authentication endpoint points to. This means that the test1 user mentioned above can simply select the tenant he/she belongs to (test.com) from the dropdown list and only needs to enter the username (i.e., test1) in the username textbox on the login page, without having to type it with "@tenant-domain".
Do the following configurations to enable this feature.
Carbon Patch
Open the
<IS_HOME>/repository/conf/tomcat/catalina-server.xmlfile and ensure that theclientAuthattribute in theConnectortag is set to “want” as shown below. This is done to disable the certificate authentication on certain occasions (like when working on mobile apps). This makes two-way SSL authentication optional.clientAuth="want"
The
.jarfile enabling usage of Mutual SSL is shipped with IS by default from IS versions 5.1.0 and upwards. Theorg.wso2.carbon.identity.authenticator.mutualssl_5.0.7.jarfile can be found in the<IS_HOME>/repository/components/pluginsdirectory.Open the
<IS_HOME>/repository/conf/security/authenticators.xmlfile and add thedisabled="false"attribute within the<Authenticator>tag for theMutualSSLAuthenticatorto enable the Mutual SSL Authenticator.<!-- Authenticator Configurations for MutualSSLAuthenticator--> <Authenticator name="MutualSSLAuthenticator" disabled="false"> <Priority>5</Priority> <Config> <Parameter name="UsernameHeader">UserName</Parameter> <Parameter name="WhiteListEnabled">false</Parameter> <Parameter name="WhiteList"/> </Config> </Authenticator>If the
SAML2SSOAuthenticatoris enabled (disabled="false") in the<IS_HOME>/repository/conf/security/authenticators.xmlfile, set its priority to 0. Otherwise ignore this step.<Authenticator name="SAML2SSOAuthenticator" disabled="false"> <Priority>0</Priority> ... </Authenticator>
Add the following configuration into the
<IS_HOME>/repository/conf/identity/application-authentication.xmlfile under theApplicationAuthenticationtag.<TenantDomainDropDownEnabled>true</TenantDomainDropDownEnabled> <TenantDataListenerURLs> <TenantDataListenerURL> /authenticationendpoint/tenantlistrefresher.do </TenantDataListenerURL> </TenantDataListenerURLs>
Note: When configuring the
TenantDataListenerURLtag, note the following.In a clustered setup that has multiple authentication endpoint web applications hosted, list all of them under the
TenantDataListenerURLtag.For authentication endpoint web applications hosted outside the WSO2 Identity Server or in other nodes of a cluster, add the absolute URL within the
TenantDataListenerURLtag.
Restart the server using one of the following commands.
Windows:
wso2server.batLinux/Unix:
sh wso2server.sh
Once the server is restarted, the authenticationendpoint.war file is deployed. The
<IS_HOME>/repository/conf/identity/EndpointConfig.propertiesfile has to be changed with the required values for properties. The following are the default values for the properties to be used in this file.tenantListEnabled=false hostname.verification.enabled=true mutual.ssl.username=admin client.keyStore=./repository/resources/security/wso2carbon.jks Carbon.Security.KeyStore.Password=wso2carbon client.trustStore=./repository/resources/security/client-truststore.jks Carbon.Security.TrustStore.Password=wso2carbon identity.server.serviceURL=/services/ username.header=UserName
Do the following updates to this configuration.
- Set
tenantListEnabledtotruein order to enable the tenants to display as a list. For the
mutual.ssl.usernameproperty, set the username that is to be used for mutual SSL authentication. This user needs to have permission to list down tenants. You can add a new username here provided that you create a user with that username and grant the following permissions to the role of the user.Super Admin Permissions > Manage > Monitor > Tenants > List
Paths for client keystore and truststore can be relative paths or absolute paths. The default paths point to the keystore and truststore of the Identity Server itself. A new keystore can be created and used for the client if necessary, however, you must set the passwords for
client.keyStore.passwordandclient.trustStore.passwordappropriately.
Note:If you are hosting the
autheticationendpoint.warwebapp outside the Identity Server (i.e in a different Tomcat or WSO2 Application Server), then you cannot use the<IS_HOME>/repository/conf/identity/EndpointConfig.propertiesfile because the webapp does not have access to this file. Instead, the same property file can be found at<WebApp_HOME>/authenticationendpoint/WEB-INF/classes/EndpointConfig.properties.In this scenario, do the following:
Open the
<WebApp_HOME>/authenticationendpoint/WEB-INF/classes/EndpointConfig.propertiesfile and provide the full URL to WSO2 Identity Server’s admin services endpoint in theidentity.server.serviceURLproperty following the format below.identity.server.serviceURL=https://<ip>:<port>/services
- Copy the following .jar files and paste it in the
<WebApp_HOME>/authenticationendpoint/WEB-INF/libfolder..jar File Location org.wso2.carbon.base_4.4.3.jar < IS_HOME>/repository/components/pluginsorg.wso2.carbon.identity.base_5.0.7.jar < IS_HOME>/repository/components/pluginsorg.wso2.carbon.ui_4.4.3.jar < IS_HOME>/repository/components/plugins< IS_HOME>/repository/deployment/server/webapps/shindig/WEB-INF/liborg.wso2.carbon.identity.application.authentication.endpoint.util-5.0.7.jar - If you have applied the
WSO2-CARBON-PATCH-4.4.0-0073security patch, copy the.jarfile found in the<CARBON_PATCH_HOME>/patch0073folder. - If you have not applied the
WSO2-CARBON-PATCH, copy the.jarfile found in the <IS_HOME>/repository/components/pluginsfolder.
- If you have applied the
- Set
For mutual SSL authentication, the public certificate of the Identity Server has to be imported to the truststore of the client and the public certificate of the client has to be imported to the client-truststore of Identity Server.
Sample commandsThe following two commands are examples if you are using the keystore and client-truststore of the Identity Server itself for the client. This is executed from the
<IS_HOME>/repository/resources/securitydirectory.keytool -export -alias wso2carbon -file carbon_public2.crt -keystore wso2carbon.jks -storepass wso2carbon
keytool -import -trustcacerts -alias carbon -file carbon_public2.crt -keystore client-truststore.jks -storepass wso2carbon
Removing the tenant list from the login page
If it is required to remove the tenant domain dropdown list in SSO Login page, follow the steps below.
- Shutdown the server if it is already started.
Set the property
tenantListEnabled=falsein theEndpointConfig.propertiesfile.If you are hosting the
authenticationendpoint.warwebapp within WSO2 Identity Server, set this property in the<IS_HOME>/repository/conf/identity/EndpointConfig.propertiesfile.
- If you are hosting it outside the WSO2 Identity Server (i.e., external Tomcat or WSO2 Application Server), set this property in the
<IS_HOME>/repository/deployment/server/webapps/authenticationendpoint/WEB-INF/classes/EndpointConfig.propertiesfile.
Set
TenantDomainDropDownEnabledparameter tofalsein the<IS_HOME>/repository/conf/identity/application-authentication.xmlfile.<TenantDomainDropDownEnabled>false</TenantDomainDropDownEnabled>
If the
MutualSSLAuthenticatoris only used for the purpose of listing tenant domains in the drop down, disable it in the<IS_HOME>/repository/conf/security/authenticators.xmlfile.<Authenticator name="MutualSSLAuthenticator" disabled="true">
- Restart the server.