Not directly relate to $subject, but we have seen following use cases when
customers have third party IdPs.

1. Configure Store/Publisher to SSO directly with third party IdP using
SAML SSO (without using WSO2 IS)
2. Configure Store/Publisher to SSO directly with third party IdP using
OIDC (without using WSO2 IS)

In APIM-2.x.x versions, we can do the above two use cases either with JIT
provisioning the user to APIM or sharing the same user store between third
party IdP and APIM. Reference [1].
Does APIM-3.x.x also support for both of the use cases mentioned above ?

[1].  https://dzone.com/articles/sso-wso2-api-manager-amp-keycloak

Regards,
Dinusha

On Tue, Jan 7, 2020 at 6:15 PM Malintha Amarasinghe <malint...@wso2.com>
wrote:

> Hi,
>
> On Tue, Jan 7, 2020 at 3:20 PM Ishara Cooray <isha...@wso2.com> wrote:
>
>> Hi,
>>
>> In addition to the above,
>> if we want to enable customer url per tenant we need to add callback URLs
>> of each tenant in the service provider config.
>> Which seems to be not scalable.
>>
>> This can be mitigated to some extent by creating SPs per tenant.
>> Any thoughts?
>>
> Can we identify which SP to use when redirecting to /authorize endpoint as
> we get to know the tenant name later on during login.
>
> Thanks.
>
>>
>> Thanks & Regards,
>> Ishara Cooray
>> Associate Technical Lead
>> Mobile : +9477 262 9512
>> WSO2, Inc. | http://wso2.com/
>> Lean . Enterprise . Middleware
>>
>>
>> On Tue, Jan 7, 2020 at 12:32 PM Harsha Kumara <hars...@wso2.com> wrote:
>>
>>>
>>>
>>> On Tue, Jan 7, 2020 at 12:27 PM Malintha Amarasinghe <malint...@wso2.com>
>>> wrote:
>>>
>>>>
>>>>
>>>> On Tue, Jan 7, 2020 at 12:23 PM Harsha Kumara <hars...@wso2.com> wrote:
>>>>
>>>>>
>>>>>
>>>>> On Tue, Jan 7, 2020 at 12:20 PM Malintha Amarasinghe <
>>>>> malint...@wso2.com> wrote:
>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> Currently, we do not support $subject and we always use the local IDP
>>>>>> as the login/logout URLs (/authorize and /oidc/logout). In normal cases,
>>>>>> this works without issues. But when it comes to configuring federated 
>>>>>> login
>>>>>> with facebook, google etc, it is required to use IS (IS as KM) as the
>>>>>> intermediate IDP which has the required authenticators to support
>>>>>> facebook/google logins. In those cases, we need to point the local IDP to
>>>>>> the IS/KM and the IS/KM points to Facebook as a federated login. But this
>>>>>> flow has unnecessary one additional hop caused by the local IDP.
>>>>>>
>>>>>> As a solution, we plan to support externalizing the IDP URL (used for
>>>>>> /authorize and /oidc/logout).
>>>>>>
>>>>>> [image: image.png]
>>>>>>
>>>>>> The plan is to introduce new configs as below:
>>>>>>
>>>>>> *api-manager.xml*
>>>>>>
>>>>>> {% if apim.idp is defined %}
>>>>>> <IdentityProvider>
>>>>>>     <!-- Server URL of the Identity Provider used for login/logout
>>>>>> operations in API Publisher and API Developer Portal -->
>>>>>>
>>>>>> <AuthorizeEndpoint>{{apim.idp.authorize_endpoint}}</AuthorizeEndpoint>
>>>>>>
>>>>>> <OIDCLogoutEndpoint>{{apim.idp.oidc_logout_endpoint}}</OIDCLogoutEndpoint>
>>>>>>
>>>>>> </IdentityProvider>
>>>>>> {% endif %}
>>>>>>
>>>>>> *deployment.toml*
>>>>>>
>>>>>> #[api.idp]
>>>>>> #authorize_endpoint = "https://localhost:9444/oauth2/authorize";
>>>>>> #oidc_logout_endpoint = "https://localhost:9444/oidc/logout";
>>>>>>
>>>>> Token endpoint will be pointed to  gateway?
>>>>>
>>>>
>>>> No, it will still use the local endpoints eg;
>>>> https://localhost:9443/oauth2/token. All the backend calls (generate
>>>> token, DCR, refresh token) will use the local hardcoded endpoints in 9443
>>>> port.
>>>> Hope that would not cause an issue?
>>>>
>>> Yes that should be fine.  Since we do share databases in this scenario,
>>> it should be fine to go with the local endpoints.
>>>
>>>>
>>>> Thanks!
>>>>
>>>>>
>>>>>> By default, the server will use the local IDP for login/logout. Only,
>>>>>> if the above URLs are configured, they will be used instead of the 
>>>>>> default
>>>>>> ones.
>>>>>>
>>>>>> Thoughts are highly appreciated.
>>>>>>
>>>>>> Thanks!
>>>>>> Malintha
>>>>>>
>>>>>> --
>>>>>> Malintha Amarasinghe
>>>>>> *WSO2, Inc. - lean | enterprise | middleware*
>>>>>> http://wso2.com/
>>>>>>
>>>>>> Mobile : +94 712383306
>>>>>>
>>>>>
>>>>>
>>>>> --
>>>>>
>>>>> *Harsha Kumara*
>>>>>
>>>>> Technical Lead, WSO2 Inc.
>>>>> Mobile: +94775505618
>>>>> Email: hars...@wso2.coim
>>>>> Blog: harshcreationz.blogspot.com
>>>>>
>>>>> GET INTEGRATION AGILE
>>>>> Integration Agility for Digitally Driven Business
>>>>>
>>>>
>>>>
>>>> --
>>>> Malintha Amarasinghe
>>>> *WSO2, Inc. - lean | enterprise | middleware*
>>>> http://wso2.com/
>>>>
>>>> Mobile : +94 712383306
>>>>
>>>
>>>
>>> --
>>>
>>> *Harsha Kumara*
>>>
>>> Technical Lead, WSO2 Inc.
>>> Mobile: +94775505618
>>> Email: hars...@wso2.coim
>>> Blog: harshcreationz.blogspot.com
>>>
>>> GET INTEGRATION AGILE
>>> Integration Agility for Digitally Driven Business
>>>
>>
>
> --
> Malintha Amarasinghe
> *WSO2, Inc. - lean | enterprise | middleware*
> http://wso2.com/
>
> Mobile : +94 712383306
> _______________________________________________
> Architecture mailing list
> Architecture@wso2.org
> https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
>


-- 
Dinusha Dilrukshi
Senior Technical Lead
WSO2 Inc.: http://wso2.com/
Mobile: +94764069991
Blog: http://dinushasblog.blogspot.com/
_______________________________________________
Architecture mailing list
Architecture@wso2.org
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to