Skip to content

Commit

Permalink
added redirect links + minor updates
Browse files Browse the repository at this point in the history
  • Loading branch information
divyaamunugama committed May 21, 2024
1 parent 9b57e88 commit 8521f00
Show file tree
Hide file tree
Showing 3 changed files with 30 additions and 12 deletions.
1 change: 1 addition & 0 deletions en/identity-server/7.0.0/mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ plugins:
'guides/login/webapp-ws-federation.md': 'guides/authentication/enterprise-login/add-iwa-login.md'
'guides/login/sso-for-oidc.md': 'guides/authentication/enterprise-login/add-oidc-idp-login.md'
'guides/login/sso-for-saml.md': 'guides/authentication/enterprise-login/add-saml-idp-login.md'
'guides/login/oidc-backchannel-logout.md': 'guides/authentication/oidc/add-back-channel-logout.md'
'guides/authentication/enterprise-login/index.md': 'guides/authentication/standard-based-login/index.md'
'guides/authentication/enterprise-login/add-oidc-idp-login.md': 'guides/authentication/standard-based-login/add-oidc-idp-login.md'
'guides/authentication/enterprise-login/add-saml-idp-login.md': 'guides/authentication/standard-based-login/add-saml-idp-login.md'
Expand Down
1 change: 1 addition & 0 deletions en/identity-server/next/mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ plugins:
'guides/login/webapp-ws-federation.md': 'guides/authentication/enterprise-login/add-iwa-login.md'
'guides/login/sso-for-oidc.md': 'guides/authentication/enterprise-login/add-oidc-idp-login.md'
'guides/login/sso-for-saml.md': 'guides/authentication/enterprise-login/add-saml-idp-login.md'
'guides/login/oidc-backchannel-logout.md': 'guides/authentication/oidc/add-back-channel-logout.md'
'guides/authentication/enterprise-login/index.md': 'guides/authentication/standard-based-login/index.md'
'guides/authentication/enterprise-login/add-oidc-idp-login.md': 'guides/authentication/standard-based-login/add-oidc-idp-login.md'
'guides/authentication/enterprise-login/add-saml-idp-login.md': 'guides/authentication/standard-based-login/add-saml-idp-login.md'
Expand Down
40 changes: 28 additions & 12 deletions en/includes/guides/authentication/oidc/add-back-channel-logout.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,22 +27,31 @@ To get started, you need to:
3. If required, update the `<param-value>` parameters for the `serverUrl`, `username` and `password` in the `WEB-INF/web.xml` file.
4. Restart the Tomcat server, if you have done any changes to the `WEB-INF/web.xml` file.


## Configure back-channel logout

To configure back-channel logout:
- To configure back-channel logout for `Playground_app1`:

1. On the WSO2 Identity Server Console, go to **Applications** and select your OIDC application.
2. Go to the **Protocol** tab and enter the following details:

| Field Name | Value |
|---------------|-------|
| Grant type | Implicit |
| Back channel logout URL | http://localhost:8080/playground3/bclogout |

1. On the WSO2 Identity Server Console, go to **Applications** and select your OIDC application.
2. Go to the **Protocol** tab and enter the following details:
3. Click **Update** to save your configurations.

| Field Name | Value |
|---------------|-------|
| Grant type | Implicit |
| Back channel logout URL | http://localhost:8080/playground2/bclogout |
- To configure back-channel logout for `Playground_app2`:

3. Click **Update** to save your configurations.
1. On the WSO2 Identity Server Console, go to **Applications** and select your OIDC application.
2. Go to the **Protocol** tab and enter the following details:

Configure this for both `Playground_app1` and `Playground_app2`.
| Field Name | Value |
|---------------|-------|
| Grant type | Implicit |
| Back channel logout URL | http://localhost:8080/playground2/bclogout |

3. Click **Update** to save your configurations.

## Try it out

Expand All @@ -55,7 +64,7 @@ Configure this for both `Playground_app1` and `Playground_app2`.
| Field name | Value |
|-------------|-------|
| **Authorization Grant Type** | `Implicit` |
| **Client ID** | The OAuth Client ID received when registering the application in WSO2 Identity Server. |
| **Client ID** | The OAuth Client ID received when registering the Playground_app1 in WSO2 Identity Server. |
| **Callback URL** | `http://localhost:8080/playground2/oauth2client` |
| **Authorize Endpoint** | `https://localhost:9443/oauth2/authorize` |

Expand All @@ -65,7 +74,14 @@ Configure this for both `Playground_app1` and `Playground_app2`.

6. Access the **Playground_app2** application using the follwoing URL: http://localhost:8080/playground3/

7. Repeat steps 2-5 for **Playground_app2** application.
7. Repeat steps 2-5 for **Playground_app2** application with the following values:

| Field name | Value |
|-------------|-------|
| **Authorization Grant Type** | `Implicit` |
| **Client ID** | The OAuth Client ID received when registering the Playground_app2 in WSO2 Identity Server. |
| **Callback URL** | `http://localhost:8080/playground3/oauth2client` |
| **Authorize Endpoint** | `https://localhost:9443/oauth2/authorize` |

8. Click **Logout** on one of the applications. You will be prompted to consent to the logout.

Expand Down

0 comments on commit 8521f00

Please sign in to comment.