Page History
...
Configure the
<WSO2_OB_KM_HOME>/repository/conf/datasources/master-datasources.xml
file with the following configurations.Update the
URL
,username
,password
, anddriverClassName
with the database credentials, and relevant database driver name in the following datasources.WSO2AM_DB
,WSO2CONFIG_DB
,WSO2REG_DB
, andWSO2UM_DB
datasources. Given below is a sample of MySQL configurations.Note If you are using Oracle, update the
validationQuery
in each datasource with the value below.Code Block <validationQuery>SELECT 1 FROM DUAL</validationQuery>
Code Block language xml <datasource> <name>WSO2AM_DB</name> <description>The datasource used for API Manager database</description> <jndiConfig> <name>jdbc/WSO2AM_DB</name> </jndiConfig> <definition type="RDBMS"> <configuration> <configuration> <url>jdbc:mysql://localhost:3306/uk130_openbank_apimgtdb?autoReconnect=true&useSSL=false</url> <username>root</username> <username>root<<password>root</username>password> <driverClassName>com.mysql.jdbc.Driver</driverClassName> <password>root<<maxActive>150</password>maxActive> <maxWait>60000</maxWait> <driverClassName>com.mysql.jdbc.Driver</driverClassName><testOnBorrow>true</testOnBorrow> <validationQuery>SELECT 1</validationQuery> <maxActive>150<<validationInterval>30000</maxActive>validationInterval> <defaultAutoCommit>false</defaultAutoCommit> <maxWait>60000</maxWait></configuration> <testOnBorrow>true</testOnBorrow> <validationQuery>SELECT 1</validationQuery> <validationInterval>30000</validationInterval> <defaultAutoCommit>false</defaultAutoCommit> </configuration> </definition> </datasource> <datasource> <name>WSO2CONFIG_DB</name> <description>The datasource used by the registry</description> <jndiConfig> <name>jdbc/WSO2Config_DB</name> </jndiConfig> </definition> </datasource>
Copy the
<WSO2_OB_KM_HOME>/repository/resources/finance/scripts/wso2-obcommon-conf/open-banking-datasources.xml
file into the<WSO2_OB_KM_HOME>/repository/conf/datasources
directory.Open
<WSO2_OB_KM_HOME>/repository/conf/datasources/open-banking-datasources.xml
and update theWSO2_OPEN_BANKING_DB
datasource with the following configurations:Note If you are using Oracle, update the
validationQuery
in each datasource with the value below.Code Block <validationQuery>SELECT 1 FROM DUAL</validationQuery>
<configuration> <url>jdbc:mysql:Code Block language xml <datasource> <name>WSO2_OPEN_BANKING_DB</name> <description>The datasource used for registry and user manager</description> <jndiConfig> <name>jdbc/WSO2OpenBankingDB</name> </jndiConfig> <definition type="RDBMS">
uk130_<configuration> <url>jdbc:mysql://localhost:3306/
iskm_configdbopenbank_
amp;openbankingdb?autoReconnect=true&
useSSL=false</url>
<username>root</username>
<password>root</password>
<maxActive>150</maxActive> <maxWait>60000</maxWait><driverClassName>com.mysql.jdbc.Driver</driverClassName> <maxActive>150</maxActive> <maxWait>60000</maxWait> <testOnBorrow>true</testOnBorrow> <validationQuery>SELECT 1</validationQuery> <validationInterval>30000</validationInterval> <defaultAutoCommit>false</defaultAutoCommit>
</configuration> </definition> </datasource>
In the
<WSO2_OB_KM_HOME>/repository/conf/registry.xml
file, update the properties given below.
<testOnBorrow>true</testOnBorrow>Code Block language xml <dbConfig name="configRegistry">
<validationQuery>SELECT 1</validationQuery><dataSource>jdbc/WSO2Config_DB</dataSource> </dbConfig> <remoteInstance url="https://<WSO2_OB_KM_HOST>:9443/registry"> <id>configInstance</id> <dbConfig>configRegistry</dbConfig>
<validationInterval>30000<<readOnly>false</readOnly> <enableCache>true</enableCache> <registryRoot>/</registryRoot> </remoteInstance> <mount path="/_system/config" overwrite="true">
validationInterval><instanceId>configInstance</
instanceId>
<defaultAutoCommit>false</defaultAutoCommit><targetPath>/_system/config</targetPath> </mount> <dbConfig name="governanceRegistry"> <dataSource>jdbc/WSO2REG_DB</dataSource> </dbConfig>
<<remoteInstance url="https://<WSO2_OB_KM_HOST>:9443/registry"> <id>governanceInstance</id> <dbConfig>governanceRegistry</dbConfig>
configuration><readOnly>false</
readOnly> <enableCache>true</enableCache>
definition><registryRoot>/</
datasource>registryRoot> </
<datasource> <name>REGISTRY_DB</name> <description>The datasource used for registry- config/governance</description> <jndiConfig> <name>jdbc/WSO2RegistryDB</name> </jndiConfig> <definition type="RDBMS"> <configuration> <url>jdbc:mysql://localhost:3306/uk130_openbank_govdb?autoReconnect=true&useSSL=false</url>remoteInstance>
<mount path="/_system/governance" overwrite="true"> <instanceId>governanceInstance</instanceId> <targetPath>/_system/governance</targetPath> </mount>
In the
<WSO2_OB_KM_HOME>/repository/conf/user-mgt.xml
file, update the datasource property to point to theWSO2UM_DB
.Code Block language xml <Property name="dataSource">jdbc/WSO2UM_DB</Property>
Enable the internal JDBC user store in the
<WSO2_OB_KM_HOME>/repository/conf/user-mgt.xml
file. Update theUsernameJavaRegEx
,UsernameJavaScriptRegEx
,CaseInsensitiveUsername
, andUsernameWithEmailJavaScriptRegEx
properties. Follow the sample configuration given below:Code Block language xml <UserStoreManager class="org.wso2.carbon.user.core.jdbc.JDBCUserStoreManager"> <username>root</username><Property name="TenantManager">org.wso2.carbon.user.core.tenant.JDBCTenantManager</Property> <Property name="ReadOnly">false</Property> <password>root</password> <Property name="ReadGroups">true</Property> <driverClassName>com.mysql.jdbc.Driver</driverClassName><Property name="WriteGroups">true</Property> <maxActive>150</maxActive><Property name="UsernameJavaRegEx">[email protected]_-{3,30}$</Property> <maxWait>60000</maxWait> <Property name="UsernameJavaScriptRegEx">^[a-zA-Z0-9._-][email protected][a-zA-Z0-9.-]+\.[a-zA-Z]{2,4}$</Property> <testOnBorrow>true</testOnBorrow> <Property name="UsernameJavaRegExViolationErrorMsg">Username pattern policy violated</Property> <Property name="PasswordJavaRegEx">^[\S]{5,30}$</Property> <validationQuery>SELECT 1</validationQuery> <Property name="PasswordJavaScriptRegEx">^[\S]{5,30}$</Property> <validationInterval>30000</validationInterval> <Property name="PasswordJavaRegExViolationErrorMsg">Password length should be within 5 to 30 characters</Property> <defaultAutoCommit>false</defaultAutoCommit> <Property name="RolenameJavaRegEx">^[\S]{3,30}$</Property> </configuration> <Property name="RolenameJavaScriptRegEx">^[\S]{3,30}$</Property> </definition> </datasource> <datasource> <name>WSO2_USER_DB</name> <description>The datasource used for registry and user manager</description> <jndiConfig><Property name="CaseInsensitiveUsername">true</Property> <Property name="SCIMEnabled">false</Property> <name>jdbc/WSO2UMDB</name> </jndiConfig> <definition type="RDBMS"> <configuration> <Property name="IsBulkImportSupported">false</Property> <Property name="PasswordDigest">SHA-256</Property> <url>jdbc:mysql://localhost:3306/uk130_openbank_userdb?autoReconnect=true&useSSL=false</url> <Property name="StoreSaltedPassword">true</Property> <Property name="MultiAttributeSeparator">,</Property> <username>root</username> <Property name="MaxUserNameListLength">100</Property> <password>root</password><Property name="MaxRoleNameListLength">100</Property> <driverClassName>com.mysql.jdbc.Driver</driverClassName><Property name="UserRolesCacheEnabled">true</Property> <maxActive>150</maxActive> <Property name="UserNameUniqueAcrossTenants">false</Property> <Property name="UsernameWithEmailJavaScriptRegEx">^[\S]{3,30}$</Property> <maxWait>60000</maxWait> <testOnBorrow>true</testOnBorrow> <validationQuery>SELECT 1</validationQuery> <validationInterval>30000</validationInterval> <defaultAutoCommit>false</defaultAutoCommit> </configuration> </definition> </datasource>
Update the
WSO2_OPEN_BANKING_DB
datasource in the<WSO2_OB_KM_HOME>/repository/conf/datasources/open-banking-datasources.xml
file with the following configurations.Note If you are using Oracle, update the
validationQuery
in each datasource with the value below.Code Block <validationQuery>SELECT 1 FROM DUAL</validationQuery>
Code Block language xml <datasource> <name>WSO2_OPEN_BANKING_DB</name> <description>The datasource used for registry and user manager</description> <jndiConfig> <name>jdbc/WSO2OpenBankingDB</name> </jndiConfig> <definition type="RDBMS"> <configuration> <url>jdbc:mysql://localhost:3306/openbank_openbankingdb?autoReconnect=true&useSSL=false</url> <username>root</username> <password>root</password> <driverClassName>com.mysql.jdbc.Driver</driverClassName> <maxActive>150</maxActive> <maxWait>60000</maxWait> <testOnBorrow>true</testOnBorrow> <validationQuery>SELECT 1</validationQuery> <!--Use below for oracle--> <!-- <validationQuery>SELECT 1 FROM DUAL</validationQuery> --> <validationInterval>30000</validationInterval> <defaultAutoCommit>false</defaultAutoCommit> </configuration> </definition> </datasource>
In the
<WSO2_OB_KM_HOME>/repository/conf/registry.xml
file, update the properties given below.Code Block language xml <dbConfig name="configRegistry"> <dataSource>jdbc/WSO2Config_DB</dataSource> </dbConfig> <remoteInstance url="https://localhost:9443/registry"> <id>configInstance</id> <dbConfig>configRegistry</dbConfig> <readOnly>false</readOnly> <enableCache>true</enableCache> <registryRoot>/</registryRoot> </remoteInstance> <mount path="/_system/config" overwrite="true"> <instanceId>configInstance</instanceId> <targetPath>/_system/config</targetPath> </mount> <dbConfig name="governanceRegistry"> <dataSource>jdbc/WSO2REG_DB</dataSource> </dbConfig> <remoteInstance url="https://localhost:9443/registry"> <id>governanceInstance</id> <dbConfig>governanceRegistry</dbConfig> <readOnly>false</readOnly> <enableCache>true</enableCache> <registryRoot>/</registryRoot> </remoteInstance> <mount path="/_system/governance" overwrite="true"> <instanceId>governanceInstance</instanceId> <targetPath>/_system/governance</targetPath> </mount>
In the
<WSO2_OB_KM_HOME>/repository/conf/user-mgt.xml
file, update the datasource property to point to theWSO2UM_DB
.Code Block language xml <Property name="dataSource">jdbc/WSO2UM_DB</Property>
Enable the internal JDBC user store in the
<WSO2_OB_KM_HOME>/repository/conf/user-mgt.xml
file. Update theUsernameJavaRegEx
,UsernameJavaScriptRegEx
,CaseInsensitiveUsername
, andUsernameWithEmailJavaScriptRegEx
properties. Follow the sample configuration given below:Code Block language xml <UserStoreManager class="org.wso2.carbon.user.core.jdbc.JDBCUserStoreManager"> <Property name="TenantManager">org.wso2.carbon.user.core.tenant.JDBCTenantManager</Property> <Property name="ReadOnly">false</Property> <Property name="ReadGroups">true</Property> <Property name="WriteGroups">true</Property> <Property name="UsernameJavaRegEx">[email protected]_-{3,30}$</Property> <Property name="UsernameJavaScriptRegEx">^[a-zA-Z0-9._-][email protected][a-zA-Z0-9.-]+\.[a-zA-Z]{2,4}$</Property> <Property name="UsernameJavaRegExViolationErrorMsg">Username pattern policy violated</Property> <Property name="PasswordJavaRegEx">^[\S]{5,30}$</Property> <Property name="PasswordJavaScriptRegEx">^[\S]{5,30}$</Property> <Property name="PasswordJavaRegExViolationErrorMsg">Password length should be within 5 to 30 characters</Property> <Property name="RolenameJavaRegEx">^[\S]{3,30}$</Property> <Property name="RolenameJavaScriptRegEx">^[\S]{3,30}$</Property> <Property name="CaseInsensitiveUsername">true</Property> <Property name="SCIMEnabled">false</Property> <Property name="IsBulkImportSupported">false</Property> <Property name="PasswordDigest">SHA-256</Property> <Property name="StoreSaltedPassword">true</Property> <Property name="MultiAttributeSeparator">,</Property> <Property name="MaxUserNameListLength">100</Property> <Property name="MaxRoleNameListLength">100</Property> <Property name="UserRolesCacheEnabled">true</Property> <Property name="UserNameUniqueAcrossTenants">false</Property> <Property name="UsernameWithEmailJavaScriptRegEx">^[\S]{3,30}$</Property> </UserStoreManager>
Configuring the carbon.xml file
Apply the following changes in the
<WSO2_OB_KM_HOME>/repository/conf/carbon.xml
file:- Update
</UserStoreManager>
- Update
Configuring the carbon.xml file
Apply the following changes in the
<WSO2_OB_KM_HOME>/repository/conf/carbon.xml
file:Update the <
HostName>
and <MgtHostName>
with the IP addresses of the Key Manager server(s).- Update the <
KeyAlias>
under<KeyStore>
to match with the alias provided during the KeyStore creation for the Key Manager server.
Configuring the api-manager.xml file
Disable the
<PolicyDeployer>
property as false inside the<ThrottlingConfigurations>
section in<WSO2_OB_KM_HOME>/repository/conf/api-manager.xml
file as below.Code Block language xml <PolicyDeployer> <Enabled>false</Enabled> </PolicyDeployer>
- Update the <
ScopeWhitelist>
property inside the <OAuthConfigurations>
section in- server.
Configuring the application-authentication.xml file
- Update the
<WSO2_OB_KM_HOME>/repository/conf/identity/
apiapplication-
managerauthentication.xml
file and replace the <Scope>
elements with the following configurations. UpdateUpdate the <
AuthenticationEndpointURL>
and <AuthenticationEndpointRetryURL>
attributes with the URLs of the authentication web application, as shown below.Code Block language xml
<ScopeWhitelist> <Scope>openid</Scope> <Scope>extended_transaction_history</Scope> <Scope>^OB_.*</Scope> <Scope>^TIME_.*</Scope> </ScopeWhitelist>
Configuring the application-authentication.xml file
<AuthenticationEndpointURL>https://<WSO2_OB_KM_HOST>:9446/ob/authenticationendpoint/login.do</AuthenticationEndpointURL> <AuthenticationEndpointRetryURL>https://<WSO2_OB_KM_HOST>:9446/ob/authenticationendpoint/retry.do</AuthenticationEndpointRetryURL>
Add the
include
action to the <AutheticationEndpointRedirectParams>
request parameter in the<WSO2_OB_KM_HOME>/repository/conf/identity/application-authentication.xml
file
Update the <
AuthenticationEndpointURL>
and <AuthenticationEndpointRetryURL>
attributes with the URLs of the authentication web application, as shown below.Code Block language xml <AuthenticationEndpointURL>https://<WSO2_OB_KM_HOST>:9446/ob/authenticationendpoint/login.do</AuthenticationEndpointURL> <AuthenticationEndpointRetryURL>https://<WSO2_OB_KM_HOST>:9446/ob/authenticationendpoint/retry.do</AuthenticationEndpointRetryURL>
Add the
include
action to the <AutheticationEndpointRedirectParams>
request parameter in . When the action is set toinclude
, the defined parameters will be sent to theAuthenticationEndpoint
as query parameters.Code Block language xml <AuthenticationEndpointRedirectParams action="include" removeOnConsumeFromAPI="true"> <AuthenticationEndpointRedirectParam name="sessionDataKeyConsent"/> <AuthenticationEndpointRedirectParam name="relyingParty"/> <AuthenticationEndpointRedirectParam name="authenticators"/> <AuthenticationEndpointRedirectParam name="authFailureMsg"/> <AuthenticationEndpointRedirectParam name="authFailure"/> </AuthenticationEndpointRedirectParams>
Tip If you're using a customized authentication web app, you can access the hidden parameters using the
sessionDataKeyConsent
parameter. For more information, see Authentication Data API.
Configuring the identity.xml file
Update the <WSO2_OB_KM_HOME>/repository/conf/identity/
...
identity.xml
file
...
with the following configurations.
Define the Open Banking specific Request Object Validator under the <
OpenIDConnect>
as follows:
<AuthenticationEndpointRedirectParams action="include" removeOnConsumeFromAPI="true"> <AuthenticationEndpointRedirectParam name="sessionDataKeyConsent"/> <AuthenticationEndpointRedirectParam name="relyingParty"/>Code Block language xml <RequestObjectValidator>com.wso2.finance.request.object.validator.OBRequestObjectValidatorImpl</RequestObjectValidator>
Update the following configurations under the
<OAuth>
property with the hostname of the Open Banking API Manager Gateway.
<AuthenticationEndpointRedirectParam name="authenticators"/> <AuthenticationEndpointRedirectParam name="authFailureMsg"/> <AuthenticationEndpointRedirectParam name="authFailure"/> </AuthenticationEndpointRedirectParams>Code Block language xml <OAuth2AuthzEPUrl>${carbon.protocol}://<WSO2_OB_APIM_HOST>:8243/authorize</OAuth2AuthzEPUrl>
Configuring the identity.xml file
Update the <WSO2_OB_KM_HOME>/repository/conf/identity/identity.xml
file with the following configurations.
Define the Open Banking specific Request Object Validator under the <
OpenIDConnect>
as follows:Code Block language xml <RequestObjectValidator>com.wso2.finance.request.object.validator.OBRequestObjectValidatorImpl</RequestObjectValidator>
- Update the following configurations under the
<OAuth>
property with the hostname of the Open Banking API Manager Gateway<OAuth2TokenEPUrl>${carbon.protocol}://<WSO2_OB_APIM_HOST>:8243/token</OAuth2TokenEPUrl> <OAuth2UserInfoEPUrl>${carbon.protocol}://<WSO2_OB_APIM_HOST>:8243/userinfo</OAuth2UserInfoEPUrl> <OAuth2DCREPUrl>${carbon.protocol}://<WSO2_OB_APIM_HOST>:8243/register</OAuth2DCREPUrl>
Update the following configuration under the
<OpenIDConnect>
tag with the hostname of the Open Banking API Manager server.Code Block language xml <IDTokenIssuerID>https://<WSO2_OB_APIM_HOST>:8243/token</IDTokenIssuerID>
Make sure the
RenewRefreshTokenForRefreshGrant
value set to false. With this configuration, the refresh token that is received by the refresh token grant type is not renewed. This is used to enforce consent re-authorization.Code Block language xml <RenewRefreshTokenForRefreshGrant>false</RenewRefreshTokenForRefreshGrant>
Configure the ReceiverURL of the
<EventPublisher>
under<AdaptiveAuth>
with the hostname of the Open Banking Business Intelligence Server. By default, the relevant Siddhi Apps are configured to listen to port 8006.Code Block language xml <OAuth2AuthzEPUrl>${carbon.protocol}<ReceiverURL>http://<WSO2_OB_APIM_HOST>:8243/authorize</OAuth2AuthzEPUrl> <OAuth2TokenEPUrl>${carbon.protocol}://<WSO2_OB_APIM_HOST>:8243/token</OAuth2TokenEPUrl> <OAuth2UserInfoEPUrl>${carbon.protocol}://<WSO2_OB_APIMBI_HOST>:82438006/userinfo</OAuth2UserInfoEPUrl> <OAuth2DCREPUrl>${carbon.protocol}://<WSO2_OB_APIM_HOST>:8243/register</OAuth2DCREPUrl> <IDTokenIssuerID>https://<WSO2_OB_APIM_HOST>:8243/token</IDTokenIssuerID>
Make sure the
RenewRefreshTokenForRefreshGrant
value set to false. With this configuration, the refresh token that is received by the refresh token grant type is not renewed. This is used to enforce consent re-authorization.Code Block language xml <RenewRefreshTokenForRefreshGrant>false</RenewRefreshTokenForRefreshGrant>
Configure the ReceiverURL of the
<EventPublisher>
under<AdaptiveAuth>
with the hostname of the Open Banking Business Intelligence Server. By default, the relevant Siddhi Apps are configured to listen to port 8006.Code Block language xml <ReceiverURL>http://<WSO2_OB_BI_HOST>:8006/</ReceiverURL>
Make sure the following Open Banking specific response type handlers are added under the
<SupportedResponseTypes>.
Code Block language xml <SupportedResponseType> <ResponseTypeName>code</ResponseTypeName> <ResponseTypeHandlerImplClass>com</ReceiverURL>
Make sure the following Open Banking specific response type handlers are added under the
<SupportedResponseTypes>.
Code Block language xml <SupportedResponseType> <ResponseTypeName>code</ResponseTypeName> <ResponseTypeHandlerImplClass>com.wso2.finance.open.banking.identity.extensions.response.type.handlers.OBCodeResponseTypeHandler</ResponseTypeHandlerImplClass> </SupportedResponseType> <SupportedResponseType> <ResponseTypeName>code id_token</ResponseTypeName> <ResponseTypeHandlerImplClass>com.wso2.finance.open.banking.identity.extensions.response.type.handlers.OBHybridResponseTypeHandler</ResponseTypeHandlerImplClass> </SupportedResponseType>
Note In order to bind the MTLS certificate of the TPP that is sent in the requests to the user access token, update the
<GrantTypeHandlerImplClass>
parameter under<GrantTypeName>authorization_code</GrantTypeName>
as follows:
responseCode Block <GrantTypeHandlerImplClass>com.wso2.finance.open.banking.identity.extensions.
OBCodeResponseTypeHandler</ResponseTypeHandlerImplClass> </SupportedResponseType> <SupportedResponseType> <ResponseTypeName>code id_token</ResponseTypeName> <ResponseTypeHandlerImplClass>comgrant.type.handlers.
MTLSTokenBindingAuthorizationCodeGrantHandler</GrantTypeHandlerImplClass>
Add the following event listener under
<EventListeners>
and enable it as follows:
response.type.handlers.OBHybridResponseTypeHandler</ResponseTypeHandlerImplClass> </SupportedResponseType>Code Block <EventListener enable="true" name="com.wso2.finance.open.banking.identity.extensions.
listeners.OBIntrospectionResponseInterceptor" orderId="27" type="org.wso2.carbon.identity.core.handler.AbstractIdentityHandler"/>
The following Open Banking specific grant types should be there under <
SupportedGrantTypes>
property.Code Block language xml <SupportedGrantType> <GrantTypeName>authorization_code</GrantTypeName> <GrantTypeHandlerImplClass>com.wso2.finance.open.banking.identity.extensions.grant.type.handlers.OBAuthorizationCodeGrantHandler</GrantTypeHandlerImplClass> </SupportedGrantType> <SupportedGrantType> <GrantTypeName>client_credentials</GrantTypeName> <GrantTypeHandlerImplClass>com.wso2.finance.open.banking.identity.extensions.grant.type.handlers.OBClientCredentialsGrantHandler</GrantTypeHandlerImplClass> <IsRefreshTokenAllowed>false</IsRefreshTokenAllowed> <IdTokenAllowed>false</IdTokenAllowed> </SupportedGrantType>
The cache configurations are available in
<CacheConfig>
under<CacheManager>
element. You can update the configurations according to your requirements.To configure the The ID Token Builder and the algorithm that signs the ID Token Builder , follow the given configurationsare configurable.
By default, the
<IDTokenBuilder>
<IDTokenBuilder>
is set toorg.wso2.carbon.identity.openidconnect.DefaultIDTokenBuilder
. For example, to sign theIDTokenBuilder
<IDTokenBuilder>
with theSHA256withPS
algorithm the configurations are as follows:Code Block language xml <OpenIDConnect> <IDTokenBuilder>org.wso2.carbon.identity.openidconnect.DefaultIDTokenBuilder</IDTokenBuilder> <SignatureAlgorithm>SHA256withPS</SignatureAlgorithm> </OpenIDConnect>
Anchor BasicAuthConsentMgt BasicAuthConsentMgt By default, the Consent Management APIs are secured with basic authentication.
Each API resource is secured using a
<Resource>
element under<ResourceAccessControl>
.- Use the default user or create a new user in the Key Manager Management Console to access the Consent Management APIs.
- Update the
<Permissions>
element under<Resource>
with the role assigned to the user. This role is with the permissions. Thesepermissions
are used to restrict access to the APIs. For more information, see Configuring Roles and Permissions. Update the credentials in Open Banking API Manager with the created user details.
Expand title Click here to see how it is done - Open the
<WSO2_OB_APIM_HOME>/repository/conf/finance/open-banking.xml
file. Update the credentials under
<APISecurity><Global>
with the created user details.By default, this is set to the username and password of the super admin.
Code Block language xml <APISecurity> <Global> <Username>[email protected]</Username> <Password>wso2123</Password> </Global> </APISecurity>
- Open the
To disable basic authentication for an API, set the
secured
property tofalse
in the corresponding<Resource>
element. For example, to disable basic authentication foruk300
resources, update the configurations in the<WSO2_OB_KM_HOME>/repository/conf/identity/identity.xml
file as follows:Code Block language xml <ResourceAccessControl> <!-- Configuration for protecting consent management APIs. If not required, set secured to false. The credentials of the basic auth are from the registered user role with the permission as specified in the Permission tag. --> <Resource context="(.*)/uk300/(.*)" http-method="all" secured="false" allowed-auth-handlers="BasicAuthentication"> <Permissions>/permission/admin</Permissions> </Resource> <!-- END OF Configuration for protecting consent management APIs END OF Configuration for protecting consent management APIs --> </ResourceAccessControl>
...
--> </ResourceAccessControl>
Disabling weak ciphers
A cipher is an algorithm for performing encryption or decryption. When you set the SSL protocol of your server to TLS, the TLS and the default ciphers get enabled without considering the strength of the ciphers. This is a security risk as weak ciphers, also known as EXPORT ciphers, can make your system vulnerable to attacks. To prevent these types of security attacks, it is encouraged to disable the weak ciphers.
Refer to Disabling weak ciphers in the WSO2 Administration Guide and disable weak ciphers.