This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Configuring Default Authenticators
An authenticator is an instrument that confirms the identity of a user when performing digital authentication. The WSO2 Open Banking solution contains two authenticators by default.
- Basic Authenticator
- SMS OTP Authenticator
The Basic Authenticator is configured as the first factor of authentication. You can further strengthen the security of this authentication by adding additional authentication steps, such as SMS OTP to implement SCA.
If you need to configure SMS OTP as a second authentication factor, you need to configure the SMS OTP Authenticator. Follow the steps below to configure SMS OTP Authenticator. Select both the Enable and Default checkboxes. This is to enable and make the Based on your SMS provider, fill out the SMS OTP configurations. Go to https://www.twilio.com/try-twilio and create an account. While registering the account, verify your mobile number and click on console home https://www.twilio.com/console to get free credits (Account SID and Auth Token). Twilio uses a POST method with headers and the text message and phone number are sent as the payload. So the fields would be as follows. If you pass the text message and the phone number in any field, you have to replace them with Currently, the WSO2 Open Banking Identity and Access Management module supports only the following SMS providers. Open the To verify the SMSAuthentication authenticator: Add a Local Claim. Configure a Login Policy: Add mobile phone as a mandatory claim:Configuring SMS OTP Authenticator
https://<WSO2_OB_IAM_HOST>:9446/carbon
) as an administrator.
SMSAuthentication
authenticator the default one. $ctx.num
and $ctx.msg
respectively.
E.g., Body=$ctx.msg&To=$ctx.num&From=+12345678
<WSO2_OB_APIM_HOME>/repository/conf/deployment.toml
file. Update the value of the idp_name
parameter with the name of the identity provider.[open_banking.sca]
idp_name = "SMSAuthentication"
For more information, see Configuring Multi-factor Authentication using SMS OTP
If you want to configure a different authentication factor:
- Open the
<WSO2_OB_IAM_HOME>/repository/conf/deployment.toml
file. By default, two factors (basic, and smsotp) are configured to engage when a TPP creates an application and generates keys. If you want to configure a different authentication factor as the second authentication factor, configure that authenticator as a federated authentication in the Identity Server and configure the name here.
[open_banking.sca] idp_name = SMSAuthentication
Using a federated authenticator:
This is available only as WSO2 Updates and is effective from wso2-
obiam-2.0.0.68
andwso2-obam-2.0.0.61
onwards. For more information on updating WSO2 Open Banking, see Updating WSO2 Products.- Set the
enable
tag totrue
. Update the
idp_name
tag with the name of the identity provider you use. This given sample configuration is for Google authenticator.[open_banking.psu_federated_auth] enable=true idp_name="Google"
- For more information, see Configuring Google as a federated authenticator in the Identity Server. The redirect URI value is
https://<WSO2_OB_IAM_HOST>localhost:9446/commonauth
. - When using a federated authenticator, an identity provider should be created. For more information, see Adding and Configuring an Identity Provider
- Set the