Hi, In addition to the above, if we want to enable customer url per tenant we need to add callback URLs of each tenant in the service provider config. Which seems to be not scalable.
This can be mitigated to some extent by creating SPs per tenant. Any thoughts? Thanks & Regards, Ishara Cooray Associate Technical Lead Mobile : +9477 262 9512 WSO2, Inc. | http://wso2.com/ Lean . Enterprise . Middleware On Tue, Jan 7, 2020 at 12:32 PM Harsha Kumara <[email protected]> wrote: > > > On Tue, Jan 7, 2020 at 12:27 PM Malintha Amarasinghe <[email protected]> > wrote: > >> >> >> On Tue, Jan 7, 2020 at 12:23 PM Harsha Kumara <[email protected]> wrote: >> >>> >>> >>> On Tue, Jan 7, 2020 at 12:20 PM Malintha Amarasinghe <[email protected]> >>> wrote: >>> >>>> Hi, >>>> >>>> Currently, we do not support $subject and we always use the local IDP >>>> as the login/logout URLs (/authorize and /oidc/logout). In normal cases, >>>> this works without issues. But when it comes to configuring federated login >>>> with facebook, google etc, it is required to use IS (IS as KM) as the >>>> intermediate IDP which has the required authenticators to support >>>> facebook/google logins. In those cases, we need to point the local IDP to >>>> the IS/KM and the IS/KM points to Facebook as a federated login. But this >>>> flow has unnecessary one additional hop caused by the local IDP. >>>> >>>> As a solution, we plan to support externalizing the IDP URL (used for >>>> /authorize and /oidc/logout). >>>> >>>> [image: image.png] >>>> >>>> The plan is to introduce new configs as below: >>>> >>>> *api-manager.xml* >>>> >>>> {% if apim.idp is defined %} >>>> <IdentityProvider> >>>> <!-- Server URL of the Identity Provider used for login/logout >>>> operations in API Publisher and API Developer Portal --> >>>> >>>> <AuthorizeEndpoint>{{apim.idp.authorize_endpoint}}</AuthorizeEndpoint> >>>> >>>> <OIDCLogoutEndpoint>{{apim.idp.oidc_logout_endpoint}}</OIDCLogoutEndpoint> >>>> >>>> </IdentityProvider> >>>> {% endif %} >>>> >>>> *deployment.toml* >>>> >>>> #[api.idp] >>>> #authorize_endpoint = "https://localhost:9444/oauth2/authorize" >>>> #oidc_logout_endpoint = "https://localhost:9444/oidc/logout" >>>> >>> Token endpoint will be pointed to gateway? >>> >> >> No, it will still use the local endpoints eg; >> https://localhost:9443/oauth2/token. All the backend calls (generate >> token, DCR, refresh token) will use the local hardcoded endpoints in 9443 >> port. >> Hope that would not cause an issue? >> > Yes that should be fine. Since we do share databases in this scenario, it > should be fine to go with the local endpoints. > >> >> Thanks! >> >>> >>>> By default, the server will use the local IDP for login/logout. Only, >>>> if the above URLs are configured, they will be used instead of the default >>>> ones. >>>> >>>> Thoughts are highly appreciated. >>>> >>>> Thanks! >>>> Malintha >>>> >>>> -- >>>> Malintha Amarasinghe >>>> *WSO2, Inc. - lean | enterprise | middleware* >>>> http://wso2.com/ >>>> >>>> Mobile : +94 712383306 >>>> >>> >>> >>> -- >>> >>> *Harsha Kumara* >>> >>> Technical Lead, WSO2 Inc. >>> Mobile: +94775505618 >>> Email: [email protected] >>> Blog: harshcreationz.blogspot.com >>> >>> GET INTEGRATION AGILE >>> Integration Agility for Digitally Driven Business >>> >> >> >> -- >> Malintha Amarasinghe >> *WSO2, Inc. - lean | enterprise | middleware* >> http://wso2.com/ >> >> Mobile : +94 712383306 >> > > > -- > > *Harsha Kumara* > > Technical Lead, WSO2 Inc. > Mobile: +94775505618 > Email: [email protected] > Blog: harshcreationz.blogspot.com > > GET INTEGRATION AGILE > Integration Agility for Digitally Driven Business >
_______________________________________________ Architecture mailing list [email protected] https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
