This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.

Configuring Yahoo

Yahoo can be used as a federated authenticator in the Identity Server. Do the following to configure the Identity Server to authenticate users using their Yahoo user accounts.

Before you begin

  1. Create a Yahoo developer account.
  2. Sign in to the WSO2 Identity Server Management Console at https://<Server Host>:9443/carbon using your username and password
  1. To navigate to the federated authenticators configuration section, do the following.
    1. Sign in. Enter your username and password to log on to the Management Console
    2. Navigate to the Main menu to access the Identity menu. Click Add under Identity Providers.
      For more information, see Adding and Configuring an Identity Provider.  
    3. Fill in the details in the Basic Information section. 

  2. Expand the Yahoo Configuration form
    Before you begin, you need to have an application registered in Yahoo. See Getting Started section in Yahoo document.
  3. Fill in the following fields where relevant.

    FieldDescriptionSample value
    EnableSelecting this option enables Yahoo to be used as an authenticator for users provisioned to the Identity Server.Selected
    DefaultSelecting the Default checkbox signifies that Yahoo is the main/default form of authentication. This removes the selection made for any other Default checkboxes for other authenticators.Selected
    Client SecretThis is the password from the Yahoo application. Click the Show button to view the value you enter.12ffb4dfb2fed67a00846b42126991f8
    Callback URLThis is the URL to which the browser should be redirected after the authentication is successful. It should have this format: https://(host-name):(port)/acs.https://localhost:9443/commonauth
    Client IdThis is the username from the Yahoo application.1421263438188909
Related Topics
  • Identity Federation is part of the process of configuring an identity provider. For more information on how to configure an identity provider, see Configuring an Identity Provider.