This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Configuring Yammer Authenticator
This page provides instructions on how to configure the Yammer authenticator and WSO2 Identity Server using a sample app. You can find more information in the following sections.
This is tested for the Yammer API version 1.0. Yammer Authenticator is supported by Identity Server 5.1.0 upwards.
Deploying Yammer artifacts
Place the authenticator .jar file into the
<IS_HOME>/repository/components/dropins
directory. You can download the .jar(org.wso2.carbon.identity.authenticator.yammer) file from the WSO2 Store.If you want to upgrade the Yammer Authenticator in your existing WSO2 Identity Server pack, please refer upgrade instructions.
Configuring the Yammer App
- Log in to Yammer using your account credentials.
- Register a new application in https://www.yammer.com/client_applications.
- Fill in the form provided to add your application.
Fill in the following required fields and click Continue:- Application name: The name of your application
- Organization: The organization that the app represents.
- Support e-mail: The email address used to communicate with the app.
- Website: The website represented by the app.
- Redirect URI: Use
https://localhost:9443/commonauth
as the Redirect URI when you register the app. This is an important step.
- Obtain the
Client ID
and theClient Secret
that were generated for your application via the App Dashboard.
Deploying travelocity.com sample app
Next, deploy the sample app in order to use it in this scenario.
Once this is done, configure the WSO2 Identity Server by adding an identity provider and service provider.
Configuring the identity provider
Now you have to configure WSO2 Identity Server by adding a new identity provider.
- Download the WSO2 Identity Server from here and run it.
- Log in to the management console as an administrator.
- In the Identity Providers section under the Main tab of the management console, click Add.
- Give a suitable name for Identity Provider Name.
- Give a suitable name for Identity Provider Name.
Next, navigate to the Federated Authenticators > Yammer Configuration.
Select the Enable and Default checkboxes. This will enable the Yammer authenticator and make it the default Identity provider.
Enter the following values and click Register.
Field | Description | Sample Value |
---|---|---|
Client ID | This is the client ID that wasgenerated for the application you registered via Yammer. | sGdyjvdPadOTAvYc7SZOg |
Client Secret | This is the client secret that wasgenerated for the application you registered via Yammer. | AV0acZHX1fPhJdk5VhTdCW6utt0hP7FHxOb72Gznqo |
Callback URL | This is the service provider's URL to which the code is sent to. | https://localhost:9443/commonauth |
You have now added the identity provider.
Configuring the service provider
The next step is to configure the service provider.
Return to the management console.
In the Service Providers section, click Add under the Main tab.
Since you are using travelocity as the sample, enter
travelocity.com
in the Service Provider Name text box and click Register.In the Inbound Authentication Configuration section, click Configure under the SAML2 Web SSO Configuration section.
Now set the configurations as follows:
Issuer: travelocity.com
Assertion Consumer URL: http://localhost:8080/travelocity.com/home.jsp
Select the following check-boxes:
Enable Response Signing
Enable Single Logout
Enable Attribute Profile
Include Attributes in the Response Always
Click Register to save the changes.
Now you will be sent back to the Service Providers page.
Navigate to the Local and Outbound Authentication Configuration section.
Select the identity provider you created from the dropdown list under Federated Authentication.
Ensure that the Federated Authentication radio button is selected and click Update to save the changes.
You have now added and configured the service provider.
Testing the sample
To test the sample, go to the following URL:
http://<TOMCAT_HOST>:<TOMCAT_PORT>/travelocity.com/index.jsp
E.g., http://localhost:8080/travelocity.comClick “Login with SAML” to log in with SAML from the WSO2 Identity Server.
Enter your Yammer credentials in the prompted login page to login. Once you log in successfully you will be taken to the home page of the travelocity.com app.