This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Customizing Login Pages for Service Providers
Custom pages for logging into the server are available for SAML2 SSO, OAuth and OpenID Connect. This section guides you through this customization.
The login pages and other pages, such as error and notification screens, of SAML SSO, OAuth, OpenID Connect, and Passive STS are located in the authenticationendpoint webapp file, which is in the <PRODUCT_HOME>/repository/deployment/server/webapps
directory.
You can easily customize these pages within this web application by changing the respective JSPs, JavaScript and CSS. If you want to point to a different web application, you can do so by redirecting or forwarding from authenticationendpoint to your webapp. In the case of SAML SSO, the 'issuer' id of the service provider is also sent to this webapp. Therefore, different login pages can be given to different service providers by looking at the 'issuer' request parameter.
The following is a sample of how to customize the login page for SAML2 SSO.
Customizing the login page for SAML SSO service providers
Usually WSO2 Identity Server displays a default login page for all the SAML SSO service providers that send authentication requests to it. The following steps indicate how to change the default login page into a customized one.
Before you begin!
- To ensure you get the full understanding of customizing the login page with WSO2 IS, the sample travelocity application is used in this use case. Therefore, make sure to download the samples before you begin.
- The samples run on the Apache Tomcat server and are written based on Servlet 3.0. Therefore, download Tomcat 7.x from here.
- Install Apache Maven to build the samples. For more information, see Installation Prerequisites.
Configuring two service providers
Open a terminal window and add the following entry to the
/etc/hosts
file of your machine to configure the hostname.127.0.0.1 wso2is.local
Open the
travelocity.properties
file found in the<SAMPLE_HOME>/sso/sso-agent-sample/src/main/resources
directory of the samples folder you just checked out. Configure the following properties with the hostname (wso2is.local
) that you configured above.#The URL of the SAML 2.0 Assertion Consumer SAML2.AssertionConsumerURL=http://wso2is.local:8080/travelocity.com/home.jsp #openid.return_to parameter OpenId.ReturnToURL=http://wso2is.local:8080/travelocity.com/home.jsp
Open the avis.properties file found in the
<SAMPLE_HOME>/sso/sso-agent-sample/src/main/resources
directory of the samples folder you just checked out. Configure the following properties with the hostname (wso2is.local
).#The URL of the SAML 2.0 Assertion Consumer SAML2.AssertionConsumerURL=http://wso2.is:8080/avis.com/home.jsp #openid.return_to parameter OpenId.ReturnToURL=http://wso2.is:8080/avis.com/home.jsp
Start the application server and access following URLs to make sure both apps are running.
travelocity.comavis.com
Registering the two service providers in the Identity Server
- Download WSO2 Identity Server and extract it.
- Run the server by executing
wso2is-5.0.0/bin/wso2server.sh
if on a Unix-based systems, or/bin/wso2server.bat
if on Windows. - On the management console, click Add under Service Providers in the Main menu.
- Enter travelocity.com as the Service Provider Name in the form that appears and click Register.
- In the page that appears next, expand the Inbound Authentication Configuration section and the SAML2 Web SSO Configuration section.
- Click Configure. The Register New Service Provider page appears.
Configure the following details for travelocity.com and repeat steps 1 to 6 and configure details for avis.com.
travelocity.com- Issuer: travelocity.com
- Assertion Consumer URL: http://wso2is.local:8080/travelocity.com/home.jsp
- Select Enable Response Signing
- Select Enable Single Logout
avis.com- Issuer: avis.com
- Assertion Consumer URL: http://wso2is.local:8080/avis.com/home.jsp
- Select Enable Response Signing
- Select Enable Single Logout
- When attempting to "login with SAML from WSO2 Identity Server" in Travelocity.com and Avis.com, you can see the following default page located at
<IS_HOME>/repository/deployment/server/webapps/authenticationendpoint/login.jsp
.
Configuring the login page
Understanding the authenticationendpoint web application
The login page that is displayed during SAML2 SSO, OAuth, OpenID Connect and Passive-STS flows is located inside the webapp named authenticationendpoint. The reason for storing this in a web app is:
- to easily customize the page according to user requirements
- if needed, place that whole web application in an external application server
The Identity Server knows the location of this web application as it is specified in the <IS_HOME>/repository/conf/identity/application-authentication.xml
configuration file. This is referenced as shown below.
<AuthenticationEndpointURL>/authenticationendpoint/login.do</AuthenticationEndpointURL> <AuthenticationEndpointRetryURL>/authenticationendpoint/retry.do</AuthenticationEndpointRetryURL>
By default it points to a location inside the Identity Server itself, thus the relative path is given. If it is necessary to point to an external application, the full path should be given instead.
If this web app is moved outside the Identity Server, we must ensure that no one can access the login credentials that are passed between this application and the Identity Server. This means that the external location should ideally be either inside a secured intranet or the transport should be HTTPS. Other similar precautions may be necessary to secure the communication.
The following is the structure of this web app.
The authenticationendpoint web application uses a carbon component called org.wso2.carbon.identity.application.authentication.endpoint.util
. This bundle includes a filter called the org.wso2.carbon.identity.application.authentication.endpoint.util.filter
.AuthenticationEndpointFilter
,
which acts as the Front Controller.
When a request is made to the authenticationendpoint web application, based on the authentication protocol type identified by the request parameter ‘type’, the controller first forwards the request to the protocol based login url patterns defined. For example, if the request to the authenticationendpoint web application is initiated as a result of a SAML SSO authentication request, the controller will forward the request to the url pattern /samlsso_login.do
. If you look inside the web.xml, you will see that this url pattern is mapped to the login.jsp file. The request is finally forwarded to this login.jsp page.
Everything on the authententicationendpoint web application is customizable. You can customize it by adding JSP pages or modifying them and configuring the web.xml respectively.
The only restriction involved is that the content already sent back by the pages inside the default web app must be submitted to the Identity Server. Additionally, you must point to the correct location via the <IS_HOME>/repository/conf/identity/application-authentication.xml
file.
Customizing the login page
When a request comes to the default login page, you can see several parameters being passed in the address bar. For this customization, the focus is on the following two parameters:
sessionDataKey: This is an identifier used by the Identity Server to maintain state information related to this particular request by the service provider.
Note: The 'sessionDataKey' query parameter is used to coordinate the request state across components participating in the request flow. It does not correlate with the user session. Furthermore, the request state maintained against the 'sessionDataKey' parameter value is cleared by each participating component at the end of request flow. This means that even if an external party grabs the 'sessionDataKey' they will not be able to get into the authentication sequence, as the user session is not associated with that key.
- relyingParty: This is the value we gave for the "Issuer" field when we registered the SAML2 SSO service provider (e.g., travelocity.com). This value is used to display different login pages to different service providers.
When customizing the pages, ensure that the following is applied.
Form submissions should happen to the "commonauth" servlet as a POST.
<form id="form" name="form" action="../../commonauth" method="POST">
Make sure to send back the "sessionDataKey" with the form submission, by using a hidden input field.
<%@ page import="org.owasp.encoder.Encode" %> <input type="hidden" name="sessionDataKey" value="<%=Encode.forHtmlAttribute(request.getParameter("sessionDataKey"))%>"/>
Using a JSP to redirect to SP relevant pages
- Rename the existing 'login.jsp' to 'default_login.jsp'
Create a new file with the name 'login.jsp' including the following code.
<% String relyingParty = request.getParameter("relyingParty"); if (relyingParty.equals("travelocity.com")) { RequestDispatcher dispatcher = request.getRequestDispatcher("travelocity_login.jsp"); dispatcher.forward(request, response); } else { RequestDispatcher dispatcher = request.getRequestDispatcher("default_login.jsp"); dispatcher.forward(request, response); } %>
What this code basically does is it forwards the request to a different login page by checking the value of
relyingParty
parameter.- Get the 'travelocity_login.jsp' from here and place it at the same level as 'login.jsp'. Also, download the contents of the 'css' and 'images' folders from that same link and put them inside the respective folders in the authenticationendpoint.
- Log in to the Travelocity.com web app again. You are presented with a different page.
If you access Avis.com, it still displays the default login page.