This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 42 Next »

This topic provides instructions on how to configure the Inwebo app and the Identity Server to integrate using a sample app. See the following sections for more information.

Configuring the Inwebo app

  1. Go to http://www.inwebo.com/ and click free signup and register.
  2. Activate your email notification and go to https://www.myinwebo.com/.
  3. Go to Administration console and get the Service Id of admin user.

  4. Navigate to Secure Sites and download the certificate for API access (.p12 format).
  5. Go to MyInweboAccount and navigate to My Devices, click add a Device button. The following window appears.
  6. Download Inwebo app in your mobile or any other devices. Add the above secure site ID or scan the QR code to activate the account

Deploying Inwebo artifacts

  1. Place the inweboauthenticationendpoint.war file into the <IS_HOME>/repository/deployment/server/webapps directory.
  2. Place the org.wso2.carbon.identity.authenticator.inwebo-1.0.0.jar file into the <IS_HOME>/repository/components/dropins directory.

    If you want to upgrade the Inwebo Authenticator in your existing IS pack, please refer upgrade instructions.

To download the authenticator and artifacts, go to https://store.wso2.com/store/assets/isconnector/inwebo.

Deploying travelocity.com sample app

The next step is to deploy the travelocity.com sample app in order to use it in this scenario.

To configure this, see Deploying the Sample App.

Configuring the identity provider

Now you have to configure WSO2 Identity Server by adding a new identity provider.

  1. Download the WSO2 Identity Server from here and run it.
  2. Log in to the management console as an administrator.
  3. In the Identity section under the Main tab of the management console, click Add under Identity Providers.
  4. Give a suitable name as the Identity Provider Name and fill out the form to configure Inwebo by expanding Inwebo Configuration under Federated Authenticators.
    Fill in the following.

    FieldDescriptionSample Value
    EnableSelecting this option enables Inwebo to be used as an authenticator for users provisioned to the Identity Server.Selected
    DefaultSelecting the Default checkbox signifies that Inwebo is the main/default form of authentication. This removes the selection made for any other Default checkboxes for other authenticators.Selected
    Service IDEnter the Service ID of your Inwebo app.917
    Certificate idThis is the p12 password of the Inwebo app you created.fsh235xd3
    Configuration fileThis is the p12 file path values from the Inwebo app you created.

     

  5. Click Register.

You have now added the identity provider.

Configuring the service provider

The next step is to configure the service provider.

  1. Return to the management console.

  2. In the Identity section under the Main tab, click Add under Service Providers.

  3. Enter travelocity.com in the Service Provider Name text box and click Register.

  4. In the Inbound Authentication Configuration section, click Configure under the SAML2 Web SSO Configuration section.

  5. Now set the configuration as follows:

    1. Issuer: travelocity.com

    2. Assertion Consumer URL: http://localhost:8080/travelocity.com/home.jsp

  6. Select the following check-boxes:
    1. Enable Response Signing

    2. Enable Assertion Signing

    3. Enable Single Logout

    4. Enable Attribute Profile

    5. Include Attributes in the Response Always
  7. Click Update to save the changes. Now you will be sent back to the Service Providers page.

  8. Go to Local and Outbound Authentication Configuration section.

  9. Select the Advanced configuration radio button option.

  10. Add the basic authentication as first step and Inwebo authentication as the second step

You have now added and configured the service provider.

Configuring User Claim

  1. Go to Claims under IS Management Console
  2. Select Add New Claim 
  3. Add new claim UserId (Change Claim Uri as (http://wso2.org/claims/authentication/inwebo/userId)
  4. Go to Service provider, select travalocity.com→EditClaim configuration
  5. Update the claim UserId

  6. Now go to Users and Roles 
  7. Add the details and update the profile.

Testing the sample

  1. To test the sample, go to the following URL: http://localhost:8080/travelocity.com

  2. Click the link to log in with SAML from WSO2 Identity Server.

  3. Basic authentication page will be visible, use your IS username and password.

  4. Hit Click! Button to authenticate Inwebo.
  5.  You will get a notification in your external device(mobile).

  6.  Enter your Inwebo PIN

  7. Click accept
  8. Click ok and taken to the home page of the travelocity.com app



  • No labels