This documentation is for WSO2 Identity Server 5.3.0 . View documentation for the latest release.

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Authentication -STS that issues SAML tokens+can accept SAML tokens
  • OpenID Connect Provider + Relying party
  • SSO IDP + relying party
  • Authorization - XACML

Do WSO2 products support cross-domain federated identity management functionality to authenticate and authorize individuals of internal and external entities into the system, determine their permissions, and control access to the resources accordingly?

This can be achieved with WS-Trust (e.g., a service in WSO2 EI can be protected with a security policy to accept a security token issued by a trusted STS confirming the authentication of a user in a outside domain), XACML - PDP, PAP and PIP supported by WSO2 Identity Server. PEPs can communicate with the PDP of WSO2 Identity Server to grant authorization.

...

Follow the instructions given in Installing Features document. 

What are all the non-apache 2 licensed software in IS, if any ?

...

  1. Generate a public key from the WSO2 carbon keystore.
    Navigate to the <IS_HOME>\repository\resources\security directory via your terminal and run the command given below to export the public certificate.


    Code Block
    keytool -export -keystore wso2carbon.jks -alias wso2carbon -file wso2PubCert.cer
  2. You are prompted to enter the password. The default password is wso2carbon.
    Once the command is executed you see the newly created PubCert.cer file in this folder.

  3. Navigate to the <JAVA_HOME>/jre/lib/security directory via the terminal and run the following command to get the number of certificates that are currently in the certificate store.

    Code Block
    keytool -list -keystore cacerts
  4. You are prompted to enter a password. The default password is changeit.
    Scroll up on your terminal to see the list of certificates in the store.

  5. Import the WSO2 public certificate to the Java certificate store by running the command that is given below.
    If you are a Windows users, make sure to run the commands as an administrator.

    Code Block
    keytool -import -keystore cacerts -file <Certificate Path>\wso2PubCert.cer
  6. You are prompted to enter a password. The default password is changeit.

    Once the command is successfully executed, you get the confirmation that the certificate is successfully imported.

    Info

    Want to make sure that the certificate is created? Run the command given below to check if the wso2PubCert.cer file is in the list of certificates.

    Code Block
    keytool -list -keystore cacerts
  7. Restart WSO2 ISyour machine after the above changes.

Now you are able to use the WSO2 IS samples.

Why do I get an org.apache.jasper.JasperException Java error when I am trying to access a web app:

Are you are getting the error that is given below?

Example:

Code Block
TID: [-1234] [] [2018-01-19 12:18:23,596] ERROR {org.apache.catalina.core.StandardContext} -  Servlet [confirmregistration.do] in web application [/accountrecoveryendpoint] threw load() exception 
org.apache.jasper.JasperException: Unable to compile class for JSP: 

An error occurred at line: 56 in the jsp file: /self-registration-with-verification-confirm.jsp
'<>' operator is not allowed for source level below 1.7
53:     try {
54:         SelfRegisterApi selfRegisterApi = new SelfRegisterApi();
55:         CodeValidationRequest validationRequest = new CodeValidationRequest();
56:         List<Property> properties = new ArrayList<>();
57:         Property tenantDomainProperty = new Property();
58:         tenantDomainProperty.setKey(MultitenantConstants.TENANT_DOMAIN);
59:         tenantDomainProperty.setValue(tenantdomain);

Follow the steps given below to overcome the error:

  1. Open the <IS_HOME>/repository/conf/tomcat/web.xml file.

  2. Add the following properties below the <servlet-class>org.apache.jasper.servlet.JspServlet</servlet-class> property.


    Code Block
    <init-param>   <param-name>compilerSourceVM</param-name>
       <param-value>1.8</param-value>
    </init-param>
    <init-param>
       <param-name>compilerTargetVM</param-name>
       <param-value>1.8</param-value>
    </init-param>
    Expand
    titleClick here to see the servlet XML property block after you added the above properties.
    Code Block
    <servlet>
       <servlet-name>jsp</servlet-name>
       <servlet-class>org.apache.jasper.servlet.JspServlet</servlet-class>
       <init-param>
          <param-name>fork</param-name>
          <param-value>false</param-value>
       </init-param>
       <init-param>
          <param-name>xpoweredBy</param-name>
          <param-value>false</param-value>
       </init-param>
       <init-param>
          <param-name>compilerSourceVM</param-name>
          <param-value>1.8</param-value>
       </init-param>
       <init-param>
          <param-name>compilerTargetVM</param-name>
          <param-value>1.8</param-value>
       </init-param>
       <load-on-startup>3</load-on-startup>
    </servlet>

SAML and SSO Support

Do we support Enterprise Single Sign On (E-SSO) to enable internal desktop users to seamlessly access heterogeneous applications (including web applications)?

This not supported out of the box. But there are several extension points that can be implemented to support such capabilities.

Do WSO2 products provide single-sign-on (SSO) and identity assertion features for services, applications, portal, etc across the SDP?

WSO2 Identity Server supports SAML and SAML 2.0 web browser single sign-on profile. With this feature, WSO2 Identity Server can act as the Identity Provider in single sign-on scenarios while third party service providers can delegate user authentication to Identity Server. Also this SSO feature is supported for our entire product stack with the above mentioned security standards.

Does WSO2 Identity Server support SAML security token standard and a framework for exchanging security information?

WSO2Identity Server supports SAML 1.0/1.1 and SAML2.0. SAML token can be used to exchange security information using WS-trust scenarios.

When dealing with Credential Mapping it is possible to map different credentials such as User name Token, X.509 tokens, SAML tokens, Kerberos tokens, etc.

Do WSO2 products provide single-sign-on (SSO) and identity assertion features for services, applications, portal, etc across the SDP?

WSO2 Identity Server supports SAML and SAML 2.0 web browser single sign-on profile. With this feature, WSO2 Identity Server can act as the Identity Provider in single sign-on scenarios while third party service providers can delegate user authentication to Identity Server. Also this SSO feature is supported for our entire product stack with the above mentioned security standards.

WSO2Identity Server supports centralized and policy based access control mechanism based on XACML. Authentication mechanism, such as username token, X.509 SAML , OAuth and kerberos can be easily plugged with the XACML access control engine.


What is the difference between SP-Initiated SSO and IDP-Initiated SSO? Do WSO2 products support both scenarios?

In SP-Initiated SSO, user tries to access a resource on SP without logging in. The service provider initiates the SSO message flow by sending authentication request to the Identity Provider (IdP)

But in IdP-Initiated flow, user loges on to IdP first and then tries to access the resource on SP. So IdP initiate the flow by sending an authentication response to the SP directly.


What are differences between SAML2 and PassiveSTS based authentication ?

SAML2 enables a SSO system where users can login to multiple applications within a "trust domain". Identities of the users in the "trust domain" are managed by the identity provider/s withing the same "trust domain". So only the users whose identities are managed within the same "trust domain" can access applications withing the "trust domain".

But PassiveSTS is a cross domain authentication mechanism where users in one "trust domain" can access applications in another "trust domain". The mechanism of brokering trust between "trust domain"s is defined in the WS-Federation specification. PassiveSTS is defined under the topic "Web (Passive) Requesters" of the specification.

STS

Do WSO2 products provide authentication services to authenticate client access to various services across platforms by supporting security tokens and STS?

STS is shipped with WSO2 Identity Server. Services can be protected with a security policy to accept a token issued by STS.


Is it possible to have STS exposed to the external world for external clients?

It is possible for external users (who reside outside the domain where STS is setup) to connect to the STS and get a security token. However, in order to do so, the user store which is associated with the STS, should have these external users' data (credentials etc.) stored in there. 

Does a client need to make a call for each and every request to get the token from STS server, or could it be session based? 

This can be configured at the client's end according to your requirement. For example, if the user needs to keep the token alive for the whole session, you can set up an expiry time for the token. Then the end service (ESB here) successfully authenticates this token until the specified expiration time limit is exceeded.


XACML

How can I write a custom PIP extension for WSO2 IS XACML engine?

See Writing a Custom Policy Info Point .

Do you support hierarchical roles in Carbon based products?

Carbon products do not support hierarchical roles out of the box, but with the support of WSO2 XACML engine(feature of Identity server), we can define set of policies to cater the requirement.

Do WSO2 products provide complex user entitlement support with XACML?

WSO2 products support authorization through entitlement policies defined in XACML. In XACML, complex user entitlement can be defined.


Do WSO2 products provide policy based authorization services?

WSO2 products support centralized, policy-based authorization through entitlement policies defined in XACML.

Do WSO2 products provide fine grained authorization services to determine access rights for users and user groups?

To support authorization requirements, we support RBAC (Role Based Access Control) and XACML. XACML is specifically used to define fine-grained authorization policies that help align your business level security requirements with the security implementation.


...