You can integrate WSO2 Identity Server with WSO2 API Manager and use your social media credentials to log in to the API Store and API Publisher. This tutorial shows you how to integrate Facebook authentication and log in to the API Store. Before following these steps, configure WSO2 Identity Server to provide Single Sign On for WSO2 API Manager by following Configuring External IDP through Identity Server for SSO.
Note that the Facebook application development UI might be slightly different from the demonstrated UIs in this tutorial due to the frequent updates in the Facebook Developer Portal.
Create a Facebook application
- Go to https://developers.facebook.com and log in using your Facebook credentials.
- Select MyApps in the navigation and create a new app by clicking Add a New App.
- Enter the name of your app and your email address. Click Create App ID.
- Click Set Up of Facebook Login Product.
Select Website here when working with this sample. You can select any other platform you wish to use
Change the port offset to 1 by modifying <Offset> element value in <Identity_server_home>/repository/conf/carbon.xml as following.
Add the serverURL of WSO2 Identity Server (which is configured with offset=1) https://localhost:9444/ and click Save and Continue.
If you have changed the hostname of identity server use that instead of localhost.
For example, if the host name is identity.com, then the server url is https://identity.com:9444/
- Click Dashboard and go to the Developer Dashboard. You can find your App ID and the App Secret as shown in the image below.
- Go to Settings from the navigation bar. Select a Category. Add the correct website URL as shown below and click Save Changes.
Click on the new Facebook Login on th enavigation menu product you have added and configure it as follows.
Client OAuth Login - Yes
Web OAuth Login - Yes
Valid OAuth redirect URLs - https://localhost:9444/commonauth
After the user authorizes the application, the authorization server redirects the user back to the application with access token or the authorization code in the URL. Since the redirected URL contains sensitive information, it is required to assure that the service does not redirect to arbitary locations. The best way to ensure that the user is directed to the appropriate location is to define an OAuth redirect URL as shown above.
Now you have configure Facebook as your Identity Provider
Configure Facebook login with Identity Server
Let's see how to configure WSO2 Identity Server to work with Facebook for user authentication, so that when you try to login to the API Publisher or Store, WSO2 Identity Server will redirect to Facebook to do the authentication. As a prerequisite, you have to configure WSO2 Identity Server by adding a new identity provider .
- Download the WSO2 Identity Server here .
- Configure Single Sign On with WSO2 API Manager 2.1.0.
- Log in to the Management Console of WSO2 Identity Server as an administrator.
- Go to the Identity section under the Main tab. Click Add under Identity Providers and enter following details.
Identity provider Name Alias https://localhost:9444/oauth2/token
To authenticate the user with Facebook (External System) we have to configure the federated authenticator. For more details, see Federated Authetication.
Go to Facebook Configuration under Federated Authenticators.
- Enter the Client ID and Client Secret values obtained from the Facebook app created in the previous section .
- Select Enable Facebook Authenticator and select Default to make it the default authentication method.
- Enter the User information feilds you want to retreive seperated by commas under User Information fields.
The Scope defines the permission to access particular information from a Facebook profile. See the Permissions Reference for a list of the different permission groups in Facebook APIs.
Configuring requested claims for user authentication in Facebook Identity Provider
We need to acquire the identity information by configuring claims for use Authentication in facebook. Let's see how you can configure Identity Server with Facebook by mapping the claims. For more information on claim Mapping refer Claim Management.
- Go to the Identity section under the Main tab. Select List under Identity Providers .
- Click Edit to edit the facebook identity provider you created.
- Go to Basic Claim Configuration under Claim Configuration
- Select the Define Custom Claim Dialect option under Select Claim mapping Dialect . Click Add Claim Mapping to add custom claim mappings as follows.
If you prefer to use the User ID as your first name of Facebook account, configure
first_nameclaim as above. You need to select the same claim as UserID Claim URI .
- The following are some common attribure names. You can map these names to any suitable Local Claim URI. (Local Claim is a set of standard claim values which are local to the WSO2 Identity Server)
For more information, see Permissions Reference - Facebook Login.
Configure service providers to the Publisher and Store with the Facebook Identity Provider
To federate logging in to the Publisher and Store with Facebook, you need to configure the the service provider with the Facebook Identity Provider.
- Go to the Management console of WSO2 Identity Server (
https://localhost:9444/carbon) and click on Service Providers.
- Click Edit to edit the
- Go to the Local and Outbound Authentication Configuration section. Select the Identity Provider you created from the dropdown list under Federated Authentication .
- Make sure that Federated Authentication is selected. Click Update to save the changes.
- Repeat steps 1 to 4 and configure the
You have to allow the usage of email addresses as usernames, to use email addresses in this step. To allow using email addresses as usernames, edit the
<IS_HOME>/repository/conf/carbon.xml file. For details, see Email Authentication .
Addition to this, change the Realm configuration in <API-M_HOME>/repository/conf/user-mgt.xml for the
AdminUser username to use the email attribute of the admin user like below.
Test Facebook authentication
- Access the API Publisher via https://localhost:<port-number>/publisher. Observe the request redirect to the WSO2 IS SAML2.0 based SSO login page and then Facebook login page.
- Enter the username and password of you facebook account.
- After the login is authenticated successfully, you will be logged into API Publisher. Your username will be the first name of your Facebook account. This is because you have already configured the first name as the UserID Claim URI.
If you configure your UserID Claim URI with
last_name, your username will be the last name of your Facebook account.
Configure associate social login in IS dashboard
Identity Server has a dashboard which offers multiple options for users to maintain user accounts. Associating a social login for their account is a one of the options provided in this dashboard.This dashboard can be accessed in the following url :
https://<IS_HOST>:<IS_PORT>/dashboard. By association the social login you have the option to use local claims, instead of showing the logged name as facebook username you can use logged users as the username in user local user store
- Login to the dashboard with API Store user account.
- Click View Details in the Social Login gadget.
- Click Associate Social Login to give your facebook account details.
- Enter your IDP ID (facebook) and your username (as configured in Subject Claim URI) and click Register.
- Select Local & Outbound Configuration and check Assert identity using mapped local subject identifier.
After logging in to API Publisher, you will see the configured local claim appearing as your username.
You have now successfully logged in to the API Publisher using your facebook credentials.