This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Configuring Yammer
This page provides instructions on how to configure the Yammer authenticator and WSO2 Identity Server using a sample app. You can find more information in the following sections. This is tested for the Yammer API version 1.0. Yammer Authenticator is supported by Identity Server 5.1.0 upwards. Place the authenticator .jar file into the If you want to upgrade the Yammer Authenticator in your existing WSO2 Identity Server pack, please refer upgrade instructions. Next, deploy the sample app in order to use it in this scenario. Once this is done, configure the WSO2 Identity Server by adding an identity provider and service provider. Now you have to configure WSO2 Identity Server by adding a new identity provider. Next, navigate to the Federated Authenticators > Yammer Configuration. Select the Enable and Default checkboxes. This will enable the Yammer authenticator and make it the default Identity provider. Enter the following values and click Register. You have now added the identity provider. The next step is to configure the service provider. Return to the management console. In the Service Providers section, click Add under the Main tab. Since you are using travelocity as the sample, enter In the Inbound Authentication Configuration section, click Configure under the SAML2 Web SSO Configuration section. Now set the configurations as follows: Issuer: travelocity.com Assertion Consumer URL: http://localhost:8080/travelocity.com/home.jsp Select the following check-boxes: Enable Response Signing Enable Single Logout Enable Attribute Profile Include Attributes in the Response Always Click Register to save the changes. Now you will be sent back to the Service Providers page. Navigate to the Local and Outbound Authentication Configuration section. Select the identity provider you created from the dropdown list under Federated Authentication. Ensure that the Federated Authentication radio button is selected and click Update to save the changes. You have now added and configured the service provider. To test the sample, go to the following URL: Click “Login with SAML” to log in with SAML from the WSO2 Identity Server. Enter your Yammer credentials in the prompted login page to login. Once you log in successfully you will be taken to the home page of the travelocity.com app. Deploying Yammer artifacts
<IS_HOME>/repository/components/dropins
directory. You can download the .jar(org.wso2.carbon.identity.authenticator.yammer) file from the WSO2 Store. Configuring the Yammer App
Fill in the following required fields and click Continue:https://localhost:9443/commonauth
as the Redirect URI when you register the app. This is an important step.Client ID
and the Client Secret
that were generated for your application via the App Dashboard. Deploying travelocity.com sample app
Configuring the identity provider
Field Description Sample Value Client ID This is the client ID
that wasgenerated for the application you registered via Yammer.sGdyjvdPadOTAvYc7SZOg
Client Secret This is the client secret
that wasgenerated for the application you registered via Yammer.AV0acZHX1fPhJdk5VhTdCW6utt0hP7FHxOb72Gznqo
Callback URL This is the service provider's URL to which the code is sent to. https://localhost:9443/commonauth
Configuring the service provider
travelocity.com
in the Service Provider Name text box and click Register. Testing the sample
http://<TOMCAT_HOST>:<TOMCAT_PORT>/travelocity.com/index.jsp
E.g., http://localhost:8080/travelocity.com