From 8521f00da14fe4a49c1cda5d0f78fb25a86c1d7f Mon Sep 17 00:00:00 2001 From: wso2 Date: Tue, 21 May 2024 11:24:42 +0530 Subject: [PATCH] added redirect links + minor updates --- en/identity-server/7.0.0/mkdocs.yml | 1 + en/identity-server/next/mkdocs.yml | 1 + .../oidc/add-back-channel-logout.md | 40 +++++++++++++------ 3 files changed, 30 insertions(+), 12 deletions(-) diff --git a/en/identity-server/7.0.0/mkdocs.yml b/en/identity-server/7.0.0/mkdocs.yml index f78d8eec3d..59ebd4b74e 100644 --- a/en/identity-server/7.0.0/mkdocs.yml +++ b/en/identity-server/7.0.0/mkdocs.yml @@ -43,6 +43,7 @@ plugins: 'guides/login/webapp-ws-federation.md': 'guides/authentication/enterprise-login/add-iwa-login.md' 'guides/login/sso-for-oidc.md': 'guides/authentication/enterprise-login/add-oidc-idp-login.md' 'guides/login/sso-for-saml.md': 'guides/authentication/enterprise-login/add-saml-idp-login.md' + 'guides/login/oidc-backchannel-logout.md': 'guides/authentication/oidc/add-back-channel-logout.md' 'guides/authentication/enterprise-login/index.md': 'guides/authentication/standard-based-login/index.md' 'guides/authentication/enterprise-login/add-oidc-idp-login.md': 'guides/authentication/standard-based-login/add-oidc-idp-login.md' 'guides/authentication/enterprise-login/add-saml-idp-login.md': 'guides/authentication/standard-based-login/add-saml-idp-login.md' diff --git a/en/identity-server/next/mkdocs.yml b/en/identity-server/next/mkdocs.yml index d50673037d..1121060a83 100644 --- a/en/identity-server/next/mkdocs.yml +++ b/en/identity-server/next/mkdocs.yml @@ -43,6 +43,7 @@ plugins: 'guides/login/webapp-ws-federation.md': 'guides/authentication/enterprise-login/add-iwa-login.md' 'guides/login/sso-for-oidc.md': 'guides/authentication/enterprise-login/add-oidc-idp-login.md' 'guides/login/sso-for-saml.md': 'guides/authentication/enterprise-login/add-saml-idp-login.md' + 'guides/login/oidc-backchannel-logout.md': 'guides/authentication/oidc/add-back-channel-logout.md' 'guides/authentication/enterprise-login/index.md': 'guides/authentication/standard-based-login/index.md' 'guides/authentication/enterprise-login/add-oidc-idp-login.md': 'guides/authentication/standard-based-login/add-oidc-idp-login.md' 'guides/authentication/enterprise-login/add-saml-idp-login.md': 'guides/authentication/standard-based-login/add-saml-idp-login.md' diff --git a/en/includes/guides/authentication/oidc/add-back-channel-logout.md b/en/includes/guides/authentication/oidc/add-back-channel-logout.md index ad485875c2..3a081eea88 100644 --- a/en/includes/guides/authentication/oidc/add-back-channel-logout.md +++ b/en/includes/guides/authentication/oidc/add-back-channel-logout.md @@ -27,22 +27,31 @@ To get started, you need to: 3. If required, update the `` parameters for the `serverUrl`, `username` and `password` in the `WEB-INF/web.xml` file. 4. Restart the Tomcat server, if you have done any changes to the `WEB-INF/web.xml` file. - ## Configure back-channel logout -To configure back-channel logout: +- To configure back-channel logout for `Playground_app1`: + + 1. On the WSO2 Identity Server Console, go to **Applications** and select your OIDC application. + 2. Go to the **Protocol** tab and enter the following details: + + | Field Name | Value | + |---------------|-------| + | Grant type | Implicit | + | Back channel logout URL | http://localhost:8080/playground3/bclogout | -1. On the WSO2 Identity Server Console, go to **Applications** and select your OIDC application. -2. Go to the **Protocol** tab and enter the following details: + 3. Click **Update** to save your configurations. - | Field Name | Value | - |---------------|-------| - | Grant type | Implicit | - | Back channel logout URL | http://localhost:8080/playground2/bclogout | +- To configure back-channel logout for `Playground_app2`: -3. Click **Update** to save your configurations. + 1. On the WSO2 Identity Server Console, go to **Applications** and select your OIDC application. + 2. Go to the **Protocol** tab and enter the following details: -Configure this for both `Playground_app1` and `Playground_app2`. + | Field Name | Value | + |---------------|-------| + | Grant type | Implicit | + | Back channel logout URL | http://localhost:8080/playground2/bclogout | + + 3. Click **Update** to save your configurations. ## Try it out @@ -55,7 +64,7 @@ Configure this for both `Playground_app1` and `Playground_app2`. | Field name | Value | |-------------|-------| | **Authorization Grant Type** | `Implicit` | - | **Client ID** | The OAuth Client ID received when registering the application in WSO2 Identity Server. | + | **Client ID** | The OAuth Client ID received when registering the Playground_app1 in WSO2 Identity Server. | | **Callback URL** | `http://localhost:8080/playground2/oauth2client` | | **Authorize Endpoint** | `https://localhost:9443/oauth2/authorize` | @@ -65,7 +74,14 @@ Configure this for both `Playground_app1` and `Playground_app2`. 6. Access the **Playground_app2** application using the follwoing URL: http://localhost:8080/playground3/ -7. Repeat steps 2-5 for **Playground_app2** application. +7. Repeat steps 2-5 for **Playground_app2** application with the following values: + + | Field name | Value | + |-------------|-------| + | **Authorization Grant Type** | `Implicit` | + | **Client ID** | The OAuth Client ID received when registering the Playground_app2 in WSO2 Identity Server. | + | **Callback URL** | `http://localhost:8080/playground3/oauth2client` | + | **Authorize Endpoint** | `https://localhost:9443/oauth2/authorize` | 8. Click **Logout** on one of the applications. You will be prompted to consent to the logout.