forked from wso2/docs-is
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request wso2#4560 from divyaamunugama/guides-updates
Updated oidc attributes doc
- Loading branch information
Showing
12 changed files
with
80 additions
and
23 deletions.
There are no files selected for viewing
Binary file modified
BIN
+4.19 MB
(930%)
en/asgardeo/docs/assets/img/guides/applications/attributes/oidc/how-it-works.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+74.3 KB
...eo/docs/assets/img/guides/applications/attributes/oidc/select-sub-attribute.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified
BIN
+12.4 KB
(130%)
...eo/docs/assets/img/guides/applications/attributes/saml/select-sub-attribute.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
1 change: 1 addition & 0 deletions
1
...eo/docs/guides/authentication/user-attributes/enable-attributes-for-oidc-app.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,4 @@ | ||
{% set product_name = "Asgardeo" %} | ||
{% set product_url_sample = "https://api.asgardeo.io/t/bifrost" %} | ||
{% set configure_subject_identifier = "" %} | ||
{% include "../../../../../includes/guides/authentication/user-attributes/enable-attributes-for-oidc-app.md" %} |
Binary file added
BIN
+56.2 KB
...img/guides/applications/attributes/oidc/prioritize-local-account-attributes.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+74.3 KB
....0/docs/assets/img/guides/applications/attributes/oidc/select-sub-attribute.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
27 changes: 27 additions & 0 deletions
27
....0/docs/guides/authentication/user-attributes/enable-attributes-for-oidc-app.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,30 @@ | ||
{% set product_name = "WSO2 Identity Server" %} | ||
{% set product_url_sample = "https://localhost:9443" %} | ||
{% set configure_subject_identifier = " | ||
## Configure the subject identifier | ||
|
||
WSO2 Identity Server uses a subject attribute to uniquely identify users logging into OIDC applications. This is set to be the **user ID** of the user which can be found in the user's profile in **User Management** > **Users**. | ||
|
||
However, having a single subject identifier for multiple applications may enable external entities to track the activity of a user across applications based on a single attribute. | ||
|
||
You can opt for a pairwise subject identifier to mitigate this issue. With a pairwise subject identifier, WSO2 Identity Server generates a unique pseudonymous ID for each user-application pair protecting the user's identity when accessing multiple applications. | ||
|
||
Follow the steps below to configure the subject identifier type: | ||
|
||
1. On the WSO2 Identity Server Console, go to **Applications**. | ||
|
||
2. Select the application and go to its **User Attributes** tab. | ||
|
||
3. Under **Subject type**, select **Pairwise**. | ||
|
||
4. Enter a **Sector Identifier URI**. | ||
|
||
!!! info | ||
The sector identifier URI is used to group clients belonging to the same security domain so that the same pairwise identifier is used for a given user accessing these clients. | ||
|
||
![Enter a sector identifier for pairwise subject identifier](../../../assets/img/guides/applications/fapi-compliant-apps/fapi-compliant-subject-identifier.png) | ||
|
||
4. Click **Update** to save the changes. | ||
|
||
" %} | ||
{% include "../../../../../../includes/guides/authentication/user-attributes/enable-attributes-for-oidc-app.md" %} |
Binary file added
BIN
+56.2 KB
...img/guides/applications/attributes/oidc/prioritize-local-account-attributes.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+74.3 KB
...xt/docs/assets/img/guides/applications/attributes/oidc/select-sub-attribute.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
27 changes: 27 additions & 0 deletions
27
...xt/docs/guides/authentication/user-attributes/enable-attributes-for-oidc-app.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,30 @@ | ||
{% set product_name = "WSO2 Identity Server" %} | ||
{% set product_url_sample = "https://localhost:9443" %} | ||
{% set configure_subject_identifier = " | ||
## Configure the subject identifier | ||
|
||
WSO2 Identity Server uses a subject attribute to uniquely identify users logging into OIDC applications. This is set to be the **user ID** of the user which can be found in the user's profile in **User Management** > **Users**. | ||
|
||
However, having a single subject identifier for multiple applications may enable external entities to track the activity of a user across applications based on a single attribute. | ||
|
||
You can opt for a pairwise subject identifier to mitigate this issue. With a pairwise subject identifier, WSO2 Identity Server generates a unique pseudonymous ID for each user-application pair protecting the user's identity when accessing multiple applications. | ||
|
||
Follow the steps below to configure the subject identifier type: | ||
|
||
1. On the WSO2 Identity Server Console, go to **Applications**. | ||
|
||
2. Select the application and go to its **User Attributes** tab. | ||
|
||
3. Under **Subject type**, select **Pairwise**. | ||
|
||
4. Enter a **Sector Identifier URI**. | ||
|
||
!!! info | ||
The sector identifier URI is used to group clients belonging to the same security domain so that the same pairwise identifier is used for a given user accessing these clients. | ||
|
||
![Enter a sector identifier for pairwise subject identifier](../../../assets/img/guides/applications/fapi-compliant-apps/fapi-compliant-subject-identifier.png) | ||
|
||
4. Click **Update** to save the changes. | ||
|
||
" %} | ||
{% include "../../../../../../includes/guides/authentication/user-attributes/enable-attributes-for-oidc-app.md" %} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters